Skip to content

Commit 1d636ba

Browse files
committed
docs: clarify intentional insecure gRPC credentials for inter-service calls
Inter-service gRPC connections use insecure.NewCredentials() by design across the Meridian platform. Network-layer security (mTLS via service mesh) handles encryption for cluster-internal traffic. This matches the pattern used in position-keeping, reconciliation, tenant, and other services.
1 parent c81fc4a commit 1d636ba

1 file changed

Lines changed: 4 additions & 0 deletions

File tree

  • services/financial-gateway/cmd

services/financial-gateway/cmd/main.go

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -293,6 +293,10 @@ func createTenantConfigProvider(cfg config.Config, logger *slog.Logger) (stripea
293293
return provider, nil, nil
294294
}
295295

296+
// insecure.NewCredentials() is intentional: all inter-service gRPC traffic
297+
// runs inside the cluster and is secured at the network layer (mTLS via
298+
// the service mesh / Kubernetes CNI). Application-layer TLS is not used
299+
// for internal service-to-service calls across the Meridian platform.
296300
conn, err := grpc.NewClient(
297301
cfg.ControlPlaneAddr,
298302
grpc.WithTransportCredentials(insecure.NewCredentials()),

0 commit comments

Comments
 (0)