Skip to content

Commit 05bf726

Browse files
committed
Add configuration options for certificate validation
This change adds two configuration options to support certificate validation: (1) enable_certificate_validation, which enables the checking of certificate validity during image signature verification, and (2) default_trusted_certificate_ids, which defines a deployment-wide default list of trusted certificates that should be used for certificate validation if not overriden by the user. Both options work with the verify_glance_signatures options defined in the glance configuration group. DocImpact Change-Id: If7b6e76519b0e37115a35b180b11959fe8a24582
1 parent 05a25d7 commit 05bf726

File tree

1 file changed

+48
-0
lines changed

1 file changed

+48
-0
lines changed

nova/conf/glance.py

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,54 @@
8383
8484
* The options in the `key_manager` group, as the key_manager is used
8585
for the signature validation.
86+
* Both enable_certificate_validation and default_trusted_certificate_ids
87+
below depend on this option being enabled.
88+
"""),
89+
cfg.BoolOpt('enable_certificate_validation',
90+
default=False,
91+
deprecated_for_removal=True,
92+
deprecated_since='16.0.0',
93+
deprecated_reason="""
94+
This option is intended to ease the transition for deployments leveraging
95+
image signature verification. The intended state long-term is for signature
96+
verification and certificate validation to always happen together.
97+
""",
98+
help="""
99+
Enable certificate validation for image signature verification.
100+
101+
During image signature verification nova will first verify the validity of the
102+
image's signing certificate using the set of trusted certificates associated
103+
with the instance. If certificate validation fails, signature verification
104+
will not be performed and the image will be placed into an error state. This
105+
provides end users with stronger assurances that the image data is unmodified
106+
and trustworthy. If left disabled, image signature verification can still
107+
occur but the end user will not have any assurance that the signing
108+
certificate used to generate the image signature is still trustworthy.
109+
110+
Related options:
111+
112+
* This option only takes effect if verify_glance_signatures is enabled.
113+
* The value of default_trusted_certificate_ids may be used when this option
114+
is enabled.
115+
"""),
116+
cfg.ListOpt('default_trusted_certificate_ids',
117+
default=[],
118+
help="""
119+
List of certificate IDs for certificates that should be trusted.
120+
121+
May be used as a default list of trusted certificate IDs for certificate
122+
validation. The value of this option will be ignored if the user provides a
123+
list of trusted certificate IDs with an instance API request. The value of
124+
this option will be persisted with the instance data if signature verification
125+
and certificate validation are enabled and if the user did not provide an
126+
alternative list. If left empty when certificate validation is enabled the
127+
user must provide a list of trusted certificate IDs otherwise certificate
128+
validation will fail.
129+
130+
Related options:
131+
132+
* The value of this option may be used if both verify_glance_signatures and
133+
enable_certificate_validation are enabled.
86134
"""),
87135
cfg.BoolOpt('debug',
88136
default=False,

0 commit comments

Comments
 (0)