Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provide a native encryption of the communication between cloud-edge #266

Closed
JoeyHwong-gk opened this issue Jan 17, 2022 · 3 comments
Closed
Labels
kind/feature Categorizes issue or PR as related to a new feature.

Comments

@JoeyHwong-gk
Copy link
Contributor

What would you like to be added/modified:

When using sedna with clients being on different networks, it is safer to encrypt communication to be sure messages are not intercepted. Currently, our data exchange between the server and clients is base on http/ws protocol.
We should add TLS support on the communication between cloud-edge. This option should be configurable through the yaml file. It should allow activation and deactivation, but also allow the user to provide paths of the certificates to be used.

Why is this needed:

In our previous version, there is no particular need to be able to verify client certificates, but it should be definitely added if the cost is low.

@JoeyHwong-gk JoeyHwong-gk added the kind/feature Categorizes issue or PR as related to a new feature. label Jan 17, 2022
@JoeyHwong-gk
Copy link
Contributor Author

cc @jaypume @llhuii @JimmyYang20

@JoeyHwong-gk
Copy link
Contributor Author

/close

@kubeedge-bot
Copy link
Collaborator

@JoeyHwong-gk: Closing this issue.

In response to this:

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature Categorizes issue or PR as related to a new feature.
Projects
None yet
Development

No branches or pull requests

2 participants