Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Multiple SSL certificates - certificate rotation #1190

Open
fragkakis opened this issue May 3, 2023 · 1 comment
Open

Multiple SSL certificates - certificate rotation #1190

fragkakis opened this issue May 3, 2023 · 1 comment

Comments

@fragkakis
Copy link

I would like some advice on how to handle SSL certificate rotation using the library. I would imagine there is a way to pass on to the SLL context multiple certificates (ie the current one and the one to be used), however I can't find anything like that in the documentation.

As per the documentation, the ssl_params params hash is passed on to the OpenSSL::SSL::SSLContext#set_params. In the example you use the cert key to pass the client certificate. In turn, the SSLContext documentation mentions that the initialization params are used to invoke setter methods.

Apart from only accepting a single certificate, the SSLContext#cert= is deprecated in favor of the SSLContext#add_certificate method, which would (presumably) also allow me to solve my original problem.

Questions:

Is there a way to perform certificate rotation currently with the gem?
Are there plans to support the SSLContext#add_certificate method?

@byroot
Copy link
Collaborator

byroot commented May 3, 2023

Is there a way to perform certificate rotation currently with the gem?

I suppose you can try connecting with one certificate, and if you get an error, connect with the other.

Are there plans to support the SSLContext#add_certificate method?

Perhaps, the difficulty is that it wouldn't be supported by the hiredis driver.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants