Remove all usage of cacerts
from configuration schemas (backport #14655)
#14670
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
As mentioned in discussion #14426, the way that
cacerts
is handled by cuttlefish schemas simply will not work if set.If
cacerts
were set to a string value containing one X509 certificate, it would eventually result in a crash because thecacerts
ssl option must be of this type:Neither of those are strings, of course. The certs would have to be decoded via
public_key:pem_decode/1
then the resulting term matched to get the actual DER-encoded data.This PR removes all use of
cacerts
in cuttlefish schemas. In addition, it filters outcacerts
andcerts_keys
from being JSON-encoded by an HTTP API call to/api/overview
. It is technically possible to setcacerts
viaadvanced.config
, so, if set, it would crash this API call, as wouldcerts_keys
.This is an automatic backport of pull request #14655 done by Mergify.