Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use Redis Authentication mechanism #658

Open
ausias-armesto opened this issue Jul 12, 2023 · 0 comments · May be fixed by #2222
Open

Use Redis Authentication mechanism #658

ausias-armesto opened this issue Jul 12, 2023 · 0 comments · May be fixed by #2222
Labels
enhancement New feature or request

Comments

@ausias-armesto
Copy link

Is your feature request related to a problem? Please describe.
The client gateway uses REDIS without authentication mechanism. It would be nice to be able to configure the client gateway to point to REDIS instances which requires a password to connect to.

Provide references to the feature you are implementing that requires this change
I would like to set these environments with a password

REDIS_URI=redis://${REDIS_PASSWORD}@${REDIS_HOST}:${REDIS_PORT}
REDIS_URI_MAINNET=redis://${REDIS_PASSWORD_MAINNET}@${REDIS_HOST_MAINNET}:${REDIS_PORT_MAINNET}

https://github.com/safe-global/safe-client-gateway/blob/main/.env.sample#L70
Describe the solution you'd like
Modify the rust implementation of the RedisConnectionManager to accept connections with password

Describe alternatives you've considered
None, it is not an option in many platforms to deploy apps which requires unauthenticated redis access

@fmrsabino fmrsabino transferred this issue from 5afe/safe-client-gateway Aug 28, 2023
@PooyaRaki PooyaRaki added the enhancement New feature or request label Dec 19, 2024
@PooyaRaki PooyaRaki linked a pull request Dec 24, 2024 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants