Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add: support specifying cipher suites in tls connection #3019 #3026

Closed
wants to merge 1 commit into from

Conversation

clock21am
Copy link
Contributor

@clock21am clock21am commented May 22, 2021

Which problem is this PR solving?

Short description of the changes

  • Add cipher parameter in tls config

@clock21am clock21am requested a review from a team as a code owner May 22, 2021 19:32
@clock21am clock21am requested a review from yurishkuro May 22, 2021 19:32
@clock21am clock21am force-pushed the rajdeep/issue-3019 branch from ae6cbd1 to 986a4ce Compare May 23, 2021 18:56
@clock21am
Copy link
Contributor Author

@yurishkuro Let me know what do you think?

@@ -18,6 +18,7 @@ import (
"crypto/tls"
"crypto/x509"
"fmt"
"github.com/coreos/etcd/pkg/tlsutil"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think we want an external dependency for such minor functionality. Also, I am not seeing this package in https://github.com/etcd-io/etcd/tree/main/pkg

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@yurishkuro removed this external dependency and made it a sample. Hope this makes sense.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

as it was mentioned in this document https://docs.fluentd.org/configuration/transport-section#tls-setting do you want to provide some default cipher in the repo itself?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

and one more doubt why naming ciphers if want to pass just string ? are we expecting multiple ciphers ?

@clock21am clock21am force-pushed the rajdeep/issue-3019 branch from 986a4ce to e47eeab Compare May 23, 2021 20:24
@clock21am clock21am force-pushed the rajdeep/issue-3019 branch from e47eeab to 4a7310c Compare May 23, 2021 20:28
@yurishkuro
Copy link
Member

I have questions on the original ticket.

@jpkrohling
Copy link
Contributor

What's the status of this PR?

@clock21am
Copy link
Contributor Author

@jpkrohling there were questions on the original tickets have to look but haven’t got the chance can take a look in the evening though

@stale
Copy link

stale bot commented Apr 16, 2022

This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. You may re-open it if you need more time.

@stale stale bot added the stale The issue/PR has become stale and may be auto-closed label Apr 16, 2022
@yurishkuro
Copy link
Member

Already addressed by #3564

@stale stale bot removed the stale The issue/PR has become stale and may be auto-closed label Apr 16, 2022
@yurishkuro yurishkuro closed this Apr 16, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants