-
Notifications
You must be signed in to change notification settings - Fork 175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The number of TLS configuration flags needed to secure a backend is too high #3649
Comments
Something we can address in 6.0! |
I am concerned that setting a default value for the etcd keys could be problematic as it would force encryption when it may not be desired. Further discussion is needed, removing from the 6.0 milestone. |
Cyril's comment: "we intentionally split these out in response to user demand" |
@cwjohnston I would like us to discuss this one before I close it. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Expected Behavior
For simple scenarios, only one certificate, key and trusted CA need be specified in the backend configuration to secure all listening ports.
Current Behavior
Securing all listening ports with a single TLS certificate/key pair requires providing values for the following parameters:
Possible Solution
Allow
cert-file
,key-file
andtrusted-ca-file
values to act as defaults for corresponding flags prefixed withetcd-
andetcd-peer-
.Context
The text was updated successfully, but these errors were encountered: