mirror of
https://github.com/dragonflydb/dragonfly.git
synced 2025-05-10 18:05:44 +02:00
feat: Change tls command line argument to conform with Redis (#276)
Change tls command line argument to conform with Redis Signed-off-by: Oded Poncz <oded@poncz.com> Signed-off-by: Oded Poncz <oded@poncz.com>
This commit is contained in:
parent
a793125599
commit
0fbd1afa36
3 changed files with 15 additions and 15 deletions
|
@ -71,8 +71,8 @@ spec:
|
|||
{{- end }}
|
||||
{{- if .Values.tls.enabled }}
|
||||
- "--tls"
|
||||
- "--tls_client_cert_file=/etc/dragonfly/tls/tls.crt"
|
||||
- "--tls_client_key_file=/etc/dragonfly/tls/tls.key"
|
||||
- "--tls_cert_file=/etc/dragonfly/tls/tls.crt"
|
||||
- "--tls_key_file=/etc/dragonfly/tls/tls.key"
|
||||
{{- end }}
|
||||
resources:
|
||||
{{- toYaml .Values.resources | nindent 12 }}
|
||||
|
|
|
@ -74,8 +74,8 @@ spec:
|
|||
{{- end }}
|
||||
{{- if .Values.tls.enabled }}
|
||||
- "--tls"
|
||||
- "--tls_client_cert_file=/etc/dragonfly/tls/tls.crt"
|
||||
- "--tls_client_key_file=/etc/dragonfly/tls/tls.key"
|
||||
- "--tls_cert_file=/etc/dragonfly/tls/tls.crt"
|
||||
- "--tls_key_file=/etc/dragonfly/tls/tls.key"
|
||||
{{- end }}
|
||||
resources:
|
||||
{{- toYaml .Values.resources | nindent 12 }}
|
||||
|
|
|
@ -22,8 +22,8 @@ ABSL_FLAG(bool, conn_use_incoming_cpu, false,
|
|||
"If true uses incoming cpu of a socket in order to distribute"
|
||||
" incoming connections");
|
||||
|
||||
ABSL_FLAG(string, tls_client_cert_file, "", "cert file for tls connections");
|
||||
ABSL_FLAG(string, tls_client_key_file, "", "key file for tls connections");
|
||||
ABSL_FLAG(string, tls_cert_file, "", "cert file for tls connections");
|
||||
ABSL_FLAG(string, tls_key_file, "", "key file for tls connections");
|
||||
|
||||
#if 0
|
||||
enum TlsClientAuth {
|
||||
|
@ -54,8 +54,8 @@ namespace {
|
|||
// To connect: openssl s_client -cipher "ADH:@SECLEVEL=0" -state -crlf -connect 127.0.0.1:6380
|
||||
static SSL_CTX* CreateSslCntx() {
|
||||
SSL_CTX* ctx = SSL_CTX_new(TLS_server_method());
|
||||
const auto& tls_client_key_file = GetFlag(FLAGS_tls_client_key_file);
|
||||
if (tls_client_key_file.empty()) {
|
||||
const auto& tls_key_file = GetFlag(FLAGS_tls_key_file);
|
||||
if (tls_key_file.empty()) {
|
||||
// To connect - use openssl s_client -cipher with either:
|
||||
// "AECDH:@SECLEVEL=0" or "ADH:@SECLEVEL=0" setting.
|
||||
CHECK_EQ(1, SSL_CTX_set_cipher_list(ctx, "aNULL"));
|
||||
|
@ -66,17 +66,17 @@ static SSL_CTX* CreateSslCntx() {
|
|||
// you can still connect with redis-cli with :
|
||||
// redis-cli --tls --insecure --tls-ciphers "ADH:@SECLEVEL=0"
|
||||
LOG(WARNING)
|
||||
<< "tls-client-key-file not set, no keys are loaded and anonymous ciphers are enabled. "
|
||||
<< "tls-key-file not set, no keys are loaded and anonymous ciphers are enabled. "
|
||||
<< "Do not use in production!";
|
||||
} else { // tls_client_key_file is set.
|
||||
CHECK_EQ(1, SSL_CTX_use_PrivateKey_file(ctx, tls_client_key_file.c_str(), SSL_FILETYPE_PEM));
|
||||
const auto& tls_client_cert_file = GetFlag(FLAGS_tls_client_cert_file);
|
||||
} else { // tls_key_file is set.
|
||||
CHECK_EQ(1, SSL_CTX_use_PrivateKey_file(ctx, tls_key_file.c_str(), SSL_FILETYPE_PEM));
|
||||
const auto& tls_cert_file = GetFlag(FLAGS_tls_cert_file);
|
||||
|
||||
if (!tls_client_cert_file.empty()) {
|
||||
// TO connect with redis-cli you need both tls-client-key-file and tls-client-cert-file
|
||||
if (!tls_cert_file.empty()) {
|
||||
// TO connect with redis-cli you need both tls-key-file and tls-cert-file
|
||||
// loaded. Use `redis-cli --tls -p 6380 --insecure PING` to test
|
||||
|
||||
CHECK_EQ(1, SSL_CTX_use_certificate_chain_file(ctx, tls_client_cert_file.c_str()));
|
||||
CHECK_EQ(1, SSL_CTX_use_certificate_chain_file(ctx, tls_cert_file.c_str()));
|
||||
}
|
||||
CHECK_EQ(1, SSL_CTX_set_cipher_list(ctx, "DEFAULT"));
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue