-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add options of TLS backend and Basic HTTP Authentication #12
Comments
Ah, somehow I missed that TF does indeed support HTTP basic authentication with login/password. I even explicitly called it out in the readme lol. I can implement that, no problem. As to the TLS, technically yes TF does support TLS encryption like any other HTTP client. If you somehow get a trusted cert for it - it'll work. I can implement the option to provide a certificate path to the listener. However I envision a "wrapper" mode to be a default and a most commonly used choice, and getting a self-signed certificate for Also just out of curiosity - what's your motivation for not using wrapper mode and setting up standalone backend in a centralized fashion? I might be missing something and understanding your use case might help me prioritize different modes support better. In my mind not using wrapper mode means something you need not supported in the wrapper mode - maybe if that something gets implemented that would be less compelling to use the alternative standalone mode? Thanks for the interest in this project. |
Thanks for the fast response!
But anyway even with |
Relatively motivation even with the local wrapper (e.g. |
@binlab please check this out https://github.com/plumber-cd/terraform-backend-git/releases/tag/v0.0.14 - I've added basic HTTP Auth. I will be looking into TLS encryption later, so I am leaving this issue open. However also please check out recent additions to the readme regarding remote operations mode.
Please let me know if that makes sense or if you have any feedback. Above is my current stance on remote mode but of course the world changes on a daily basis - I am open to suggestions. |
Regarding running backend remotely https://github.com/plumber-cd/terraform-backend-git#running-backend-remotely, I agree it's not so good idea at all, but for some cases, it might be very powerful (e.g. service inside a private local network for a couple of users). And basically it's not so bad as Terraform currently supports TLS encryption for HTTP backend and HTTP basic authentication with login/password https://www.terraform.io/docs/backends/types/http.html#password.
A combination of TLS + Basic HTTP auth gives enough protection for small integrations. So, could you implement options TLS backend and Basic HTTP authentication for service? It also is very useful even for running on localhost (e.g. systemd) as an additional layer of security
The text was updated successfully, but these errors were encountered: