Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Patterns for injecting SSL certificate and key #38

Open
misterbisson opened this issue Oct 31, 2016 · 0 comments
Open

Patterns for injecting SSL certificate and key #38

misterbisson opened this issue Oct 31, 2016 · 0 comments

Comments

@misterbisson
Copy link
Contributor

#30 implemented Let's Encrypt support for east and automatic SSL encryption, but there are times when a traditional SSL cert is more desirable:

  1. When you wish to have a well-recognized cert, but don't wish to publish the resource on the public internet to serve ACME challenges
  2. When you wish to use an extended validation certificate
  3. Because you want to, dangit

In those situations, we need a pattern to inject the certificate and key. This will need two patterns to account for the different contexts in which it might be used. In all cases (because it's how Nginx works, we'll have to trust the security of the Nginx container and filesystem to store the SSL key, however, we may have different levels of trust for the service discovery layer:

  1. The service catalog is being used for application discovery (not infrastructure discovery), and access is limited to trusted application operators, and therefore is a trustworthy store for secrets
  2. The service catalog is, for one reason or another, not trusted (though, remember, that anybody with access to the Nginx instances will have access to the certificate and key), so a different store, perhaps Vault, will be used for the secrets

This ticket will stand for developing the first pattern. A new ticket shall be opened for the eventual development of the second pattern.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant