New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implementation independent interface for CSR generation #542
Conversation
949d346
to
ff6f938
Compare
|
|
Thanks for the feedback. I will put together a new version using CFFI and the Regarding helpers, this code has all CSR generation go through the |
|
I would rather make things simple and remove the abstraction. We can support NSS databases by PKCS#12 export/import until we have first-class support:
Granted, this won't work with HSMs, but I think that's OK, given it is only a temporary solution. |
|
@LiptonB needs rebase |
|
Regarding this comment from @MartinBasti in #590:
What level of backward compatibility is required? Is it not ok to remove helpers? I thought the purpose of making |
|
I meant this: - Str(
- 'helper',
- label=_('Name of CSR generation tool'),
- doc=_('Name of tool (e.g. openssl, certutil) that will be used to'
- ' create CSR'),AFAIK this is user API |
|
@MartinBasti, it is an internal, user invisible API. @LiptonB, it is OK to change it. |
All requests now use the OpenSSL formatter. However, we keep Formatter a separate class so that it can be changed out for tests. https://pagure.io/freeipa/issue/4899
Also modify cert_request to use this new format. Note, only PEM private keys are supported for now. NSS databases are not. https://pagure.io/freeipa/issue/4899
ff6f938
to
f6f687d
Compare
|
Thanks for the clarification, @HonzaCholasta. (And for the timely intervention in #579 to make it actually invisible). A new version is pushed, which uses CFFI and the unmodified openssl config format, and removes the |
|
@LiptonB, superb, thank you! Have you made any progress with NSS support? If not, I can add it in a subsequent PR, if you agree. |
|
@HonzaCholasta, thanks! I have an attempt at NSS support in progress. It
might take me a few more days to get it ready to send out, but I think it's
close.
…On Mon, Apr 3, 2017 at 3:45 AM Jan Cholasta ***@***.***> wrote:
@LiptonB <https://github.com/LiptonB>, superb, thank you!
Have you made any progress with NSS support? If not, I can add it in a
subsequent PR, if you agree.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#542 (comment)>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AAcj_faOJ9GWrYO3aT4sxV7gx6_fBfUIks5rsKOggaJpZM4MUefo>
.
|
@HonzaCholasta and everyone, here is where I am so far on the CertificationRequestInfo-based interface for CSR generation.
As I see it, there are a few rough edges still, so I'd like to get your opinion, especially about these things:
build_requestinfowe want a config file, not a script, so I needed to add another formatter/helper that omits the bash code that's there for other helpers.openssl reqcommand rather than the library. Inbuild_requestinfoI copied the code from certmonger that creates the subject name, which takes a simpler format. So the new formatter is called "certmonger" and uses that format.build_requestinfoshould go, how to work it into the build process, and where it should be installed. Right now I just have a TODO to do so. Or did you mean for that code to be run via CFFI as well?