Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Redis client can now connect with TLS and >=6.0 ACL AUTH settings. #35

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

mattduffy
Copy link

Added "username" field to the config.json file for redis-server version

= 6.0 using ACL default user account for AUTH command.

Added "database" field to the config.json file to provide an option to
specify database to app data to be loaded into rather than forcing it
into an existing default database.

Added "ca-file" field to the config.json to enable TLS connnections.
redis_client.js now detects if username is present and includes in the
client config opbject.

redis_client.js now detects if a TLS CA file path is provided and
initiates TLS connection.

NODE_TLS_REJECT_UNAUTHORIZED=0 env specified in package.json script
settings to accommodate TLS connections to redis server if self-signed
certificates are in use.

Added "username" field to the config.json file for redis-server version
>= 6.0 using ACL default user account for AUTH command.

Added "database" field to the config.json file to provide an option to
specify database to app data to be loaded into rather than forcing it
into an existing default database.

Added "ca-file" field to the config.json to enable TLS connnections.
redis_client.js now detects if username is present and includes in the
client config opbject.

redis_client.js now detects if a TLS CA file path is provided and
initiates TLS connection.

NODE_TLS_REJECT_UNAUTHORIZED=0 env specified in package.json script
settings to accommodate TLS connections to redis server if self-signed
certificates are in use.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant