-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TTSD-5652 enforce minimum TLS version 1.2 #9
Conversation
CHANGELOG.md
Outdated
@@ -1,5 +1,9 @@ | |||
## Changelog | |||
|
|||
### `1.3.0` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wasn't sure whether to make this a patch release or a minor release since previous attempts to enforce TLS 1.2 were already made. Open to suggestions.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Patch seems reasonable. 👍
acm_certificate_arn = aws_acm_certificate.cert.arn | ||
ssl_support_method = "sni-only" | ||
acm_certificate_arn = aws_acm_certificate.cert.arn | ||
minimum_protocol_version = "TLSv1.2_2021" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
New Issues
Fixed Issues
|
CHANGELOG.md
Outdated
@@ -1,5 +1,9 @@ | |||
## Changelog | |||
|
|||
### `1.3.0` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Patch seems reasonable. 👍
See ticket for more information.
Previous changes to enforce TLS version 1.2 only changed it for TLS to the origin, not to the client. This PR attempts to fix that.
PR for consuming it: https://github.com/Ibotta/ipn-portal-infrastructure/pull/136