Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deprecate misconfigured SSL server config #49280

Conversation

tvernum
Copy link
Contributor

@tvernum tvernum commented Nov 19, 2019

This commit adds a deprecation warning when starting
a node where either of the server contexts
(xpack.security.transport.ssl and xpack.security.http.ssl)
meet either of these conditions:

  1. The server lacks a certificate/key pair (i.e. neither
    ssl.keystore.path not ssl.certificate are configured)
  2. The server has some ssl configuration, but ssl.enabled is not
    specified. This new validation does not care whether ssl.enabled is
    true or false (though other validation might), it simply makes it
    an error to configure server SSL without being explicit about
    whether to enable that configuration.

Backport of: #45892

This commit adds a deprecation warning when starting
a node where either of the server contexts
(xpack.security.transport.ssl and xpack.security.http.ssl)
meet either of these conditions:

1. The server lacks a certificate/key pair (i.e. neither
   ssl.keystore.path not ssl.certificate are configured)
2. The server has some ssl configuration, but ssl.enabled is not
   specified. This new validation does not care whether ssl.enabled is
   true or false (though other validation might), it simply makes it
   an error to configure server SSL without being explicit about
   whether to enable that configuration.

Backport of: elastic#45892
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security (:Security/Network)

@tvernum
Copy link
Contributor Author

tvernum commented Nov 19, 2019

This is a backport of #45892 but changed to a deprecation warning instead of an error.

Copy link
Member

@jkakavas jkakavas left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants