Consider making TLS support mandatory #58
Labels
No labels
bug
compatibility
contribution welcome
duplicate
enhancement
good first issue
help wanted
invalid
pre-dates redict
question
upstream
No milestone
No project
No assignees
2 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
redict/redict#58
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
And make OpenSSL a mandatory dependency. We may also consider suitably annoying warnings if, for instance, listening on a public IP address without TLS enabled.
While I wholeheartedly agree with the concept, I would like to point out that redict's configuration with regards to TLS is - in my opinion - a bit too simplistic. Consider the following:
Given the potential performance impact, I think it is reasonable that one might want to use the cluster without TLS on an internal network, but expose TLS to the outside. At the very least, it might be desirable to run the cluster port without TLS on a different address?
I understand that this is all for historical reasons, and that one main goal of redict is be a drop-in replacement for redis. Is adding support for something like this, maybe by means of new config directives (while keeping the old ones working as expected) something that would be in scope for redict?