Skip to content

Conversation

@themilchenko
Copy link
Contributor

@themilchenko themilchenko commented Nov 5, 2025

This patch allows to set a new ssl_verify_client option. It uses in pair with ssl_ca_file option and needs for client validation. It could have following values:

  • off (default one) means that no client's certs will be verified;
  • on means that server will verify client's certs;
  • optional means that server will verify client's certs only if it exist.

In effect, this option forces the server to work with mutual TLS.

The same parameter was supported for httpd role as well.

Closes #207
Closes #217

@themilchenko themilchenko force-pushed the themilchenko/support-mtls branch from 7fed070 to b5f1cf3 Compare November 5, 2025 13:45
@themilchenko themilchenko marked this pull request as ready for review November 5, 2025 13:50
Copy link
Member

@DifferentialOrange DifferentialOrange left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's wait for the default option feedback

@themilchenko themilchenko force-pushed the themilchenko/support-mtls branch from b5f1cf3 to 0736446 Compare November 5, 2025 15:08
@themilchenko themilchenko force-pushed the themilchenko/support-mtls branch 2 times, most recently from 444f181 to e583940 Compare November 10, 2025 14:43
@DifferentialOrange
Copy link
Member

Fixed CI requiring removed job, see https://stackoverflow.com/a/78611313 for a guide

By default server checked server and client certificates which should do
with mTLS configuration.

Since it is not expected behaviour, after the patch `ca_file`
configuration won't ask for client certificates authorization.

Closes #217
This patch allows to set a new `ssl_verify_client` option. It uses in
pair with `ssl_ca_file` option and needs for client validation. It could
have following values:

* `off` (default one) means that no client's certs will be verified;
* `on` means that server will verify client's certs;
* `optional` means that server will verify client's certs only if it exist.

This set of options was was built on top of the NGINX API
(https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_verify_client).

In effect, this option forces the server to work with mutual TLS.

Part of #207
Since http server supports a new `ssl_verify_client` option it is
necessary to support it in role api as well.

This patch introduces a new config parameter in httpd role with the same
`ssl_verify_client` name.

Closes #207
@themilchenko themilchenko force-pushed the themilchenko/support-mtls branch from e583940 to 88af183 Compare November 11, 2025 10:13
Copy link
Member

@DifferentialOrange DifferentialOrange left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ready to merge

@themilchenko themilchenko merged commit 5ebd39d into master Nov 11, 2025
33 checks passed
@themilchenko themilchenko deleted the themilchenko/support-mtls branch November 11, 2025 10:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

ssl_ca_file field enables MTLS by default add support mtls

4 participants