[ 
https://issues.apache.org/jira/browse/NIFI-2528?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16142398#comment-16142398
 ] 

ASF GitHub Bot commented on NIFI-2528:
--------------------------------------

Github user alopresto commented on a diff in the pull request:

    https://github.com/apache/nifi/pull/1986#discussion_r135370201
  
    --- Diff: 
nifi-nar-bundles/nifi-standard-services/nifi-ssl-context-bundle/nifi-ssl-context-service/src/main/java/org/apache/nifi/ssl/SSLContextServiceUtils.java
 ---
    @@ -0,0 +1,77 @@
    +/*
    + * Licensed to the Apache Software Foundation (ASF) under one or more
    + * contributor license agreements.  See the NOTICE file distributed with
    + * this work for additional information regarding copyright ownership.
    + * The ASF licenses this file to You under the Apache License, Version 2.0
    + * (the "License"); you may not use this file except in compliance with
    + * the License.  You may obtain a copy of the License at
    + *
    + *     http://www.apache.org/licenses/LICENSE-2.0
    + *
    + * Unless required by applicable law or agreed to in writing, software
    + * distributed under the License is distributed on an "AS IS" BASIS,
    + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    + * See the License for the specific language governing permissions and
    + * limitations under the License.
    + */
    +package org.apache.nifi.ssl;
    +
    +import java.security.NoSuchAlgorithmException;
    +import java.util.ArrayList;
    +import java.util.Arrays;
    +import java.util.Collections;
    +import java.util.HashSet;
    +import java.util.List;
    +import java.util.Set;
    +
    +import javax.net.ssl.SSLContext;
    +
    +import org.apache.nifi.components.AllowableValue;
    +
    +public class SSLContextServiceUtils {
    +
    +    /**
    +     * Build a set of allowable SSL protocol algorithms based on JVM 
configuration and whether
    +     * or not the list should be restricted to include only certain 
protocols.
    +     *
    +     * @param restricted whether the set of allowable protocol values 
should be restricted.
    +     *
    +     * @return the computed set of allowable values
    +     */
    +    public static AllowableValue[] buildSSLAlgorithmAllowableValues(final 
boolean restricted) {
    +        final Set<String> supportedProtocols = new HashSet<>();
    +
    +        // if restricted, only allow the below set of protocols.
    +        if(restricted) {
    +            supportedProtocols.add("TLSv1.2");
    --- End diff --
    
    I know having `{TLS, TLSv1.2}` may look ambiguous or confusing in the 
restricted set, but I think including `TLS` is good here because when 
[TLSv1.3](https://blog.cloudflare.com/introducing-tls-1-3/) (see also 
[2](https://www.openssl.org/blog/blog/2017/05/04/tlsv1.3/) 
[3](https://kinsta.com/blog/tls-1-3/)) and so on are supported, users won't 
have to revisit this and explicitly enable/upgrade to that protocol version. We 
should improve the `TLS` tooltip to explain that it chooses the highest 
supported TLS protocol version automatically, and perhaps identify the minimum 
supported version. 


> Update ListenHTTP to honor SSLContextService Protocols
> ------------------------------------------------------
>
>                 Key: NIFI-2528
>                 URL: https://issues.apache.org/jira/browse/NIFI-2528
>             Project: Apache NiFi
>          Issue Type: Bug
>          Components: Core Framework
>    Affects Versions: 1.0.0, 0.8.0, 0.7.1
>            Reporter: Joe Skora
>            Assignee: Michael Hogue
>
> Update ListenHTTP to honor SSLContextService Protocols as [NIFI-1688] did for 
> PostHTTP.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to