-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
S3 driver should support Insecure TLS #2204
Comments
Does not prevent it, just currently requires that such solutions trust the certificate at the OS level. I would be OK with a PR to add an option to use a custom certificate chain, could be added via the http transport like the user agent is doing (https://github.com/docker/distribution/blob/master/registry/storage/driver/s3-aws/s3.go#L418) |
What about a PR adding an option to set |
@whoshuu I don't like adding support for |
It's strictly more secure than The ideal solution would be for every user to know how to properly set up certs on their clients and servers. Understandably that can be difficult for some class of users. An option to skip the verification step of the server certificate isn't one we would encourage, obviously. There should definitely be a strong push to get users to set up true TLS, but for getting things up and running without sending unencrypted data over the network I think this is a fair compromise. @pdevine, thoughts? |
@whoshuu definitely agree. I think we should add Some storage, like StorageGRID comes with a baked in CA, and it's impossible to use it with distribution right now, even to test, without having to bake the CA cert or the cert chain into your distribution container image. |
Closing. Addressed in #3841 |
The S3 driver currently has the "secure" option which will turn off TLS, however there is currently no option for using TLS but with an untrusted cert.
This prevents alternative S3 storage such as Minio, Scality and StorageGRID from running encrypted but with an invalid cert.
The text was updated successfully, but these errors were encountered: