-
Notifications
You must be signed in to change notification settings - Fork 593
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CORE-4182: dt/tls: Create chain of CRLs #19865
Conversation
The TLSChainCACertManager class in ducktape is updated to chain CRLs for each individual CA. Signed-off-by: Michael Boquard <michael@redpanda.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
# Now do the same for the CRLs | ||
crl_files = [ca.crl for ca in self._cas] | ||
crl_out = self._with_dir('ca', 'signing-crl-chain.crl') | ||
pathlib.Path(out).touch() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
actually, did you mean
pathlib.Path(out).touch() | |
pathlib.Path(crl_out).touch() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
doesn't look like it matters, so I'm not sure what it was doing there previously 🤷
out = self._with_dir('ca', 'signing-ca-chain.pem') | ||
pathlib.Path(out).touch() | ||
with open(out, 'w') as outfile: | ||
for fname in reversed(files): | ||
for fname in reversed(ca_files): |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
question: I'm curious why reversed
is needed here
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
good question! The ordering does matter, we effectively want a chain of certs that ends with the root cert:
Issuer CA 1 --- signed by ---> Issuer CA 2 --- signed by ---> Root CA
I think RFC5280 deals with this but I can't find the right section to reference
The TLSChainCACertManager class in ducktape is updated to chain CRLs for each individual CA.
This PR is required to fix DT tests before enabling OpenSSL in Seastar which will be done in a subsequent vtools PR
Backports Required
Release Notes