Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

enforce only HTTPS for content delivery #8

Closed
yegor256 opened this issue Aug 28, 2012 · 19 comments
Closed

enforce only HTTPS for content delivery #8

yegor256 opened this issue Aug 28, 2012 · 19 comments

Comments

@yegor256
Copy link
Owner

yegor256 commented Aug 28, 2012

Let's enforce SSL connections only for content delivery


@davvd
Copy link

davvd commented Mar 3, 2014

@carlosmiranda please pick this up, and keep in mind these instructions. Any technical questions - ask right here

@davvd
Copy link

davvd commented Mar 3, 2014

@carlosmiranda 30 mins is the budget of the task. This is exactly how much will be paid when the problem is solved (no matter how much time you will actually spend). See this for more information

@carlosmiranda
Copy link
Collaborator

What mechanism can we use to store the SSL keys?

@yegor256
Copy link
Owner Author

aha, right, we can't "enforce" SSL for all domains, because some of them won't have SSL keys. So, let's add an option to upload an SSL key for any domain. We'll store them in Dynamo. Makes sense?

@jwal
Copy link

jwal commented Jun 17, 2014

Option 1 (here): Users can upload their own SSL key for their domain
Option 2 (#181): Default subdomain {bucket}.buckets.s3auth.com with wildcard certificate

@yegor256
Copy link
Owner Author

Actually I like the second option... Let's try to implement it first and then will continue thinking about the first one :) @jwal thanks for contribution!

@jwal
Copy link

jwal commented Jun 20, 2014

You are most welcome :)

@carlosmiranda
Copy link
Collaborator

@yegor256 I am having trouble with this ticket, especially with the creation of unit tests for SSL connections (always getting some SSL error or another). Could you give me some time? Also, do you have something like this implemented before in another project that I can take a look at?

@yegor256
Copy link
Owner Author

@davvd we need more time here

@yegor256
Copy link
Owner Author

@carlosmiranda look at this plugin I created some time ago: https://github.com/jcabi/jcabi-ssl-maven-plugin

carlosmiranda added a commit to carlosmiranda/s3auth that referenced this issue Jun 25, 2014
@carlosmiranda
Copy link
Collaborator

Thanks! I incorporated that plugin and it's saving me a lot of headaches from managing the keystore, especially unit testing with Maven. Please see my pull request at #184.

carlosmiranda added a commit to carlosmiranda/s3auth that referenced this issue Jun 25, 2014
@yegor256
Copy link
Owner Author

Yeah, good plugin. Maybe we should try to promote it a bit :)

@davvd
Copy link

davvd commented Jun 25, 2014

@davvd we need more time here

@yegor256 yes, take your time, thanks for letting me know

carlosmiranda added a commit to carlosmiranda/s3auth that referenced this issue Jun 26, 2014
carlosmiranda added a commit to carlosmiranda/s3auth that referenced this issue Jun 26, 2014
carlosmiranda added a commit to carlosmiranda/s3auth that referenced this issue Jun 26, 2014
ghost pushed a commit that referenced this issue Jun 26, 2014
#184: pull request #8 Added SSLServerSocket listener to HttpFacade
@carlosmiranda
Copy link
Collaborator

@yegor256 , #184 has been merged, is all in order?

@yegor256
Copy link
Owner Author

yes, thanks!

@davvd
Copy link

davvd commented Jun 27, 2014

@carlosmiranda Thanks so much! Your account was topped up for 30 mins (transaction ID is 41305115)

@tjperovich
Copy link

From the comments on this issue it looks complete, but I don't see any documentation for implementing https. I attempted to access my bucket via https and it did not work (ERR_CONNECTION_TIMED_OUT in chrome).

Also attempting to access https://s3auth.com fails. Am I missing something?

@davvd
Copy link

davvd commented Nov 18, 2014

these puzzles are in progress: 8-5eb4ae33/#191 (once finished this ticket is done)

@davvd
Copy link

davvd commented Jan 30, 2017

@yegor256 last puzzled solved 191-7e266bd1/#290

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants