diff --git a/pkg/auth/grpc.go b/pkg/auth/grpc.go index e2b89c4f0c2c22ac7e921d78aefca70e10682142..a947a33bab75da4c55ca9575e15d915fbc480b67 100644 --- a/pkg/auth/grpc.go +++ b/pkg/auth/grpc.go @@ -131,6 +131,15 @@ func WithOAuth2Credentials(ctx context.Context, tokenURL, clientID, clientSecret // WithTLSCredentials возвращает опции для создания grpc-соединения с TLS-сертификатами func WithTLSCredentials(ctx context.Context, cert, cacert, key []byte) (grpc.DialOption, error) { + creds, err := TLSCredentials(ctx, cert, cacert, key) + if err != nil { + return nil, err + } + return grpc.WithTransportCredentials(creds), nil +} + +// TLSCredentials возвращает TransportCredentials для создания grpc-соединения с TLS-сертификатами +func TLSCredentials(ctx context.Context, cert, cacert, key []byte) (credentials.TransportCredentials, error) { certPool := x509.NewCertPool() if !certPool.AppendCertsFromPEM(cacert) { return nil, errors.New("CA certificate not loaded") @@ -139,5 +148,5 @@ func WithTLSCredentials(ctx context.Context, cert, cacert, key []byte) (grpc.Dia if err != nil { return nil, err } - return grpc.WithTransportCredentials(credentials.NewTLS(&tls.Config{Certificates: []tls.Certificate{clientCert}, RootCAs: certPool})), nil + return credentials.NewTLS(&tls.Config{Certificates: []tls.Certificate{clientCert}, RootCAs: certPool}), nil }