Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cli: Introduce defaults for cert/key locations #6262

Closed
bdarnell opened this issue Apr 23, 2016 · 1 comment
Closed

cli: Introduce defaults for cert/key locations #6262

bdarnell opened this issue Apr 23, 2016 · 1 comment
Milestone

Comments

@bdarnell
Copy link
Contributor

Using the CLI with a secure cluster is tedious because it requires three separate security-related paths to be passed. This can be fixed by using environment variables, but it would be even better if there were defaults (defaults would also answer the question of "where should i put these files?").

One downside to supporting defaults here is that we lose the explicit signal that the user intended to use secure mode, so it would be difficult to reconcile with our default insecure mode. We'd probably have to make the --insecure flag required again in this case, so we may want to postpone implementing this until we have a better handle on key management issues.

For comparison, postgresql looks for keys by default in ~/.postgresql/{postgres.key,postgres.crt,root.crt} on the client side, and $DATADIR/{server.key,server.crt,root.crt} on the server. (in postgresql's terminology, root.crt contains CA certificates like our ca.crt)

@mberhault
Copy link
Contributor

moving discussion to #1674

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants