Skip to content

Conversation

@NikToloknov
Copy link

Expose configuration options for TLS MinVersion, MaxVersion, and CipherSuites backed by crypto/tls. This allows LiveKit to interoperate with providers that require non-default or legacy TLS configurations.

Expose configuration options for TLS MinVersion, MaxVersion, and CipherSuites
backed by crypto/tls. This allows LiveKit to interoperate with providers that
require non-default or legacy TLS configurations.
@NikToloknov NikToloknov requested a review from a team as a code owner January 26, 2026 22:37
@CLAassistant
Copy link

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

@NikToloknov NikToloknov marked this pull request as draft January 26, 2026 22:38
Copy link
Contributor

@dennwc dennwc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, just a few minor adjustments.

Certs []TLSCert `yaml:"certs"`
KeyLog string `yaml:"key_log"`

MinVersion string `yaml:"min_version"` // min TLS version, accepts: "1.0", "1.1", "1.2", "1.3"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Values like 1.0 are dangerous in YAML, since they will be interpreted as a number by default. The user must then know to set it to "1.0" (a string).

So I'd propose we settle on accepting just tls1.0 and/or TLS1.0.


// ParseCipherSuites parses cipher suite names to uint16 IDs.
// Logs a warning for each insecure cipher suite configured.
func ParseCipherSuites(suites []string, log logger.Logger) ([]uint16, error) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
func ParseCipherSuites(suites []string, log logger.Logger) ([]uint16, error) {
func ParseCipherSuites(log logger.Logger, suites []string) ([]uint16, error) {


// ParseCipherSuites parses cipher suite names to uint16 IDs.
// Logs a warning for each insecure cipher suite configured.
func ParseCipherSuites(suites []string, log logger.Logger) ([]uint16, error) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
func ParseCipherSuites(suites []string, log logger.Logger) ([]uint16, error) {
func parseCipherSuites(suites []string, log logger.Logger) ([]uint16, error) {

Can be unexported, since these are only used it this package.


// ParseTLSVersion parses a TLS version string to its uint16 constant.
// Accepts formats: "1.0", "1.1", "1.2", "1.3" or "TLS 1.0", "TLS 1.1", "TLS 1.2", "TLS 1.3".
func ParseTLSVersion(version string) (uint16, error) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
func ParseTLSVersion(version string) (uint16, error) {
func parseTLSVersion(version string) (uint16, error) {

Same here - can be unexported.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants