Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use TLS lib v4 to manage certs #385

Draft
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

DanielArndt
Copy link
Member

Issue

Reduce the code that must be managed by the o11y team.

Solution

Use the latest version of the TLS Interface Library (V4)

Context

The new version of the library attempts to encapsulate the boilerplate code needed to manage TLS certificates. This should largely (or entirely) replace cert_handler in most projects.

I'm making this PR to show how easy it should be to upgrade. I hope that using this as a template, you will be able to retire cert_handler entirely from every project. If not, please provide feedback on what could be improved!

Testing Instructions

Since I am largely unfamiliar with the project, I have relied on the e2e tests.

Upgrade Notes

with suppress(SecretNotFoundError):
logger.debug(
"Removing secret with label %s",
secret_label,

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.
continue
try:
secret = self.model.get_secret(label=secret_label)
logger.debug("Setting secret with label %s", secret_label)

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.
provider_certificate.certificate
):
logger.debug(
"Secret %s with correct certificate already exists", secret_label

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.
expire=provider_certificate.certificate.expiry_time,
)
except SecretNotFoundError:
logger.debug("Creating new secret with label %s", secret_label)

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant