-
Notifications
You must be signed in to change notification settings - Fork 578
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ApiListener: Add external_ca flag to control renewal behavior #9026
base: master
Are you sure you want to change the base?
Conversation
This will disable checking and renewing certificates with the Icinga master or other parents within the cluster, so it is up for the user to control it. I named the flag non-specific to being able to control other occasions where a non Icinga CA should be treated differently.
Can we consider this for 2.14? Should be a simple feature toggle to avoid certificate issues when Icinga is not the CA. |
I haven't looked at this in too much detail so far. But my first impression is that I don't see how this is supposed to fix #7719: that issue states there's a problem with certificate validation but this PR only changes something about certificate issuance. |
The problematic validation happens in the renewal logic, certificate validation with root and chain happens in OpenSSL anyways.
|
*) But this PR would be useful not to collect useless CSRs on the file system if you know that your CA is external. Instead the user would have the option just to let Icinga discard them. Julian, if you agree with me, feel free to assign me. |
This will disable checking and renewing certificates with the Icinga master or other parents within the cluster, so it is up for the user to control it.
I named the flag non-specific to being able to control other occasions where a non Icinga CA should be treated differently.
cc @mkayontour
fixes #7719
closes #8859
Notes
In addition it might help improving
VerifyCertificate
, but this is not relevant for the simple connection handling, only when we want to actually verify certificates with a chain for CLI commands or in the renewal logic.Also this can be used as a one-sided features, so it should be enough to disable on the master side, so log messages are avoided, while it can be changed on satellites and clients once they are updated.
Of course needs more testing...
Open for questions.
ref/NC/729576