Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Orchestration of LASR private TLS CA #117

Open
Tracked by #114
mattgeddes opened this issue Apr 15, 2024 · 0 comments
Open
Tracked by #114

Orchestration of LASR private TLS CA #117

mattgeddes opened this issue Apr 15, 2024 · 0 comments
Assignees
Labels
feature New feature

Comments

@mattgeddes
Copy link
Contributor

mattgeddes commented Apr 15, 2024

For some services between LASR nodes, we'll need support for TLS certificates. These should be signed by a CA, but don't need to signed by a public CA. The simplest approach here might be to reuse some of @mattgeddes ' existing code to deploy a Versatus CA, and to then have all the nodes trust it, and to generate a Versatus certificate for each node. That will allow any Versatus alphanet services to be able to use TLS to communicate with services on any other Versatus alphanet machine. This could apply to Prometheus, MongoDB, Nginx, Kubo, and any other services that are used within the LASR alphanet network.

@mattgeddes mattgeddes self-assigned this Apr 15, 2024
@mattgeddes mattgeddes added the feature New feature label Apr 15, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature New feature
Projects
None yet
Development

No branches or pull requests

1 participant