-
Notifications
You must be signed in to change notification settings - Fork 210
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Parameterize PKI certs location #667
base: develop
Are you sure you want to change the base?
Conversation
@@ -36,7 +36,13 @@ def aggregator(context): | |||
default='plan/cols.yaml', type=ClickPath(exists=True)) | |||
@option('-s', '--secure', required=False, | |||
help='Enable Intel SGX Enclave', is_flag=True, default=False) | |||
def start_(plan, authorized_cols, secure): | |||
@option('-c', '--cert_path', |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What if we allow user to provide paths to certificates and keys? This way we do not implicitly rely on the user certificate folder to replicate our internal structure. For example, we will not expect aggregator private key be in format {CERT_DIR}/server/agg_{common_name}.key
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I tried to keep the certs structure consistent but we can do that too. It would also involve users to provide a path where certs will be stored {CERT_DIR}/agg_{common_name}.key
. @psfoley @itrushkin @aleksandr-mokrov what do you think?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We should not force users to keep our internal PKI folder structure. I think it is better to split this argument and use paths for each file.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added separate paths to certs and keys to not rely on internal PKI folder structure.
871aa83
to
e6ff4fe
Compare
47c8632
to
5171c68
Compare
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
fadc304
to
e21a666
Compare
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
Signed-off-by: Mansi Sharma <[email protected]>
@mansishr can you please resolve the conflicts and request for review again? |
For manual PKI exchange, certificates are stored under 'cert' directory inside workspace by default. This PR decouples the location of certificates from workspace in that the user can now specify certificate path to store certs which can reside outside the workspace.
cert_dir
can be passed, where all CA certs and keys can reside. To storesigning-ca.crt
, certificate chain (cert_chain.crt
) andsigning-ca.key
, usecert_path
andkey_path
to specify locations.cert_path
andkey_path
to store aggregator (or collaborator) certificate and key, respectively.fx workspace participants
that let's the CA/aggregator select a subset of certified collaborators for a federation by modifyingplan/cols.yaml
.