Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Utility] allow configuration of TLS Settings for HTTPS services #887

Open
10 tasks
adshmh opened this issue Jul 6, 2023 · 2 comments
Open
10 tasks

[Utility] allow configuration of TLS Settings for HTTPS services #887

adshmh opened this issue Jul 6, 2023 · 2 comments
Assignees
Labels
utility Utility specific changes

Comments

@adshmh
Copy link
Contributor

adshmh commented Jul 6, 2023

Objective

HTTPS services may need custom, individualized configuration, e.g. allowing self-signed certificates in some cases.

Origin Document

image

Goals

  • Allow custom TLS configuration for each service

Deliverable

  • PR to add the feature
  • Updated user documentation

Non-goals / Non-deliverables

General issue deliverables

  • Update any relevant local/global README(s)
  • Update relevant source code tree explanations
  • Add or update any relevant or supporting mermaid diagrams

Testing Methodology

  • Task specific tests or benchmarks: make ...
  • New tests or benchmarks: make ...
  • All tests: make test_all
  • LocalNet: verify a LocalNet is still functioning correctly by following the instructions at docs/development/README.md
  • k8s LocalNet: verify a k8s LocalNet is still functioning correctly by following the instructions here

Creator: [@adshmh]
Co-Owners: [@Olshansk ]

@adshmh adshmh added the utility Utility specific changes label Jul 6, 2023
@adshmh adshmh added this to the M3: Pocket RoS (Relay or Slash) milestone Jul 6, 2023
@adshmh adshmh self-assigned this Jul 6, 2023
@Olshansk Olshansk moved this to Backlog in V1 Dashboard Jul 6, 2023
@Olshansk
Copy link
Member

Olshansk commented Jul 6, 2023

Thanks for putting this together @adshmh. Ccing @bryanchriswhite for visibility since he has thought about TLS as well.


Questino about this:

, e.g. allowing self-signed certificates in some cases.

Since this is a decentralized, permissionless network, aren't all TLS certs going to be self-signed?

@adshmh
Copy link
Contributor Author

adshmh commented Jul 6, 2023

Since this is a decentralized, permissionless network, aren't all TLS certs going to be self-signed?

One exception could be specific services, e.g. a Portal, with easy-to-establish identity. The TLS here is more about privacy, integrity, and/or identity than permission (I think, but not sure yet whether the decentralized nature of the network could make this a non-issue)

@adshmh adshmh moved this from Backlog to Up Next in V1 Dashboard Jul 17, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
utility Utility specific changes
Projects
Status: Up Next
Development

No branches or pull requests

2 participants