octavia/specs/version0.5/tls-data-security-1.diag
Adam Harwell 5a89a60c09 TLS Data Security Overview
Here we define the overall strategy for dealing with secure TLS data
in Octavia. There are several areas that need attention, and they are
detailed in this spec. Barbican will be our default secure storage and
certificate signing service, but the interfaces should remain generic.

Sequence diagrams now included.

Change-Id: Icbbea8e37af0ce13fd959543403f2b01b8c7d17b
Implements: blueprint tls-data-security
2014-11-04 07:21:17 -06:00

17 lines
912 B
Plaintext

seqdiag {
span_height = 10;
=== If Certificate is pre-stored in Barbican ===
User => Octavia [label="Create LB with TLS (passing tls_certificate_id)", note="HTTPS", return="202/400/401"] {
Octavia => Barbican [label="Fetch Certificate Container", note="HTTPS", return="Certificate Data"];
}
=== If Certificate is passed directly to Octavia ===
User => Octavia [label="Create LB with TLS (passing tls_certificate, tls_private_key, etc)", note="HTTPS", return="
202/400/401"] {
Octavia => Barbican [label="Store Secrets / Certificate Container", note="HTTPS", return="tls_certificate_id"];
}
Octavia -> Octavia [label="Store tls_certificate_id"];
=== After certificate handling, in both cases ===
Octavia -> Octavia [label="Fetch Amphora from Spare Pool"];
Octavia => "Amphora API" [label="Configure Amphora", note="HTTPS", return="Update LB Status"];
}