connector/ldap: Always set tls.Config.ServerName, to support LDAP servers with public CA certs.
This commit is contained in:
		| @@ -212,7 +212,7 @@ func (c *Config) OpenConnector() (interface { | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	tlsConfig := new(tls.Config) | ||||
| 	tlsConfig := &tls.Config{ServerName: host} | ||||
| 	if c.RootCA != "" || len(c.RootCAData) != 0 { | ||||
| 		data := c.RootCAData | ||||
| 		if len(data) == 0 { | ||||
| @@ -226,9 +226,6 @@ func (c *Config) OpenConnector() (interface { | ||||
| 			return nil, fmt.Errorf("ldap: no certs found in ca file") | ||||
| 		} | ||||
| 		tlsConfig.RootCAs = rootCAs | ||||
| 		// NOTE(ericchiang): This was required for our internal LDAP server | ||||
| 		// but might be because of an issue with our root CA. | ||||
| 		tlsConfig.ServerName = host | ||||
| 	} | ||||
| 	userSearchScope, ok := parseScope(c.UserSearch.Scope) | ||||
| 	if !ok { | ||||
|   | ||||
		Reference in New Issue
	
	Block a user