Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add https #68

Open
clement94310 opened this issue Jan 24, 2024 · 3 comments
Open

Add https #68

clement94310 opened this issue Jan 24, 2024 · 3 comments
Labels
enhancement New feature or request help wanted Extra attention is needed

Comments

@clement94310
Copy link

Hello
do you think to add https on rocket service to manage end to end encryption ?

@guerzon
Copy link
Owner

guerzon commented Jan 25, 2024

Hi @clement94310,

The recommended way is to terminate SSL/TLS using a reverse proxy or, in Kubernetes context, using the ingress. The Vaultwarden maintainers have the same recommendation for Vaultwarden (see https://github.com/dani-garcia/vaultwarden/wiki/Enabling-HTTPS#via-rocket).

If you really require this, let me know and I will find time, but also feel free to submit a PR.

Cheers,
Lester

@clement94310
Copy link
Author

Hello
yes i used a alb as a proxy but it does not protect to sniffing data on nodes kubernetes isnt it

@guerzon
Copy link
Owner

guerzon commented Jan 31, 2024

If you have actual concerns about pod traffic being sniffed, IMO you have a much bigger problem.

Nevertheless, for secure pod communication, the pattern I often see is using the service mesh to manage SSL/TLS rather than letting each application handle its own SSL/TLS implementation.

If you really want to implement the TLS on Rocket, I recommend checking this guide and submitting a PR.

@guerzon guerzon added enhancement New feature or request help wanted Extra attention is needed labels Feb 21, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

2 participants