-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for mutual TLS #39
Comments
Thanks! It should be possible as mentioned in https://github.com/into-docker/unixsocket-http#tls but I need to write the HTTPS protocol support into clj-docker-client first. I have some other issues to push in the coming days and will take this into account too! 😄 |
@AustinC I have implemented the first version of support for mTLS. It turned out to be much more complex than I anticipated 🙁
Any feedback here would be really helpful for me specially around your user experience and if you have better ideas please do share! This seems to be weirdly complex. |
@xsc Do you have some better ideas for this implementation? Would be really helpful if you do! 😄 |
@lispyclouds At the very least we should not require users to convert between key formats, I think. :) I've previously (5 years ago!) written a pem-reader which I now pulled into the But there are other libraries we could have a look at, e.g. pem-keystore. Most of the ones I've seen pull in BouncyCastle, which is a comparatively large dependency. (And generally, once stable, we might want to consider extracting the |
Using |
@xsc This is awesome! I definitely think this is better and we should work with the pems produced by docker. I could not get a good way of loading those pems with java/clj given my limited knowledge on these formats 🙁 Also since this is kinda docker specific, would it make sense to implement this as part of this rather than unixsocket-http? |
@lispyclouds I'd not have it in Ah, and don't forget the caveat about passphrases not being supported - that could be a problem. |
@xsc I too am thinking of using the I guess expecting a non password protected key is less intrusive than a whole different format 😄 |
Let me make some last adjustments tonight, then I'll release 1.0.0. |
Awesome! I'll get the code ready in the meantime. |
@AustinC the simpler version of the code is pushed now, similar to the above comment, the steps to test are:
When @xsc is ready with the 1.0.0 release of pem-reader, I can cut the 1.0.3 release of this. |
@lispyclouds |
@AustinC this is great to hear! If possible could you share maybe how you folks are using the lib? That would be of great help in improving the usability of this! |
Implemented in |
Is there a way to communicate with a docker engine that requires mutual TLS connections?
Thanks for your efforts on this library.
The text was updated successfully, but these errors were encountered: