-
Notifications
You must be signed in to change notification settings - Fork 193
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added support for PKCS12 password protected TLS config #4165
Conversation
👋 🤖 🤔 Hello! Did you make your changes in all the right places? These files were changed only in docs/. You might want to duplicate these changes in versioned_docs/version-8.5/.
You may have done this intentionally, but we wanted to point it out in case you didn't. You can read more about the versioning within our docs in our documentation guidelines. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@EuroLew Is this only applicable to the next
version of docs, or also the previous versions and current version of docs?
This should apply only to the |
## Description This PR adds support for a PKCS12 format file to configure the TLS private key and certificate chain. The PKCS12 file can be password protected. - The original certificateChainPath and privateKeyPath and the new `pkcs12` configuration are mutually exclusive and checks are carried out to ensure such behaviour. - The approach taken to parse the pkcs12 is that the private key and certificate chain are extracted from the pkcs12 file in order to build the netty `SslContext` - The PKCS12 file must have the same password as the singular key certificate pair in the file. (That is a password is required to access the file, and then another password is required to extract the private key, this is per the [RFC](https://datatracker.ietf.org/doc/html/rfc7292)) - In addition pkcs12 supports multiple key certificate chain pairs however the current approach will extract the first pair from the file an use that for TLS configuration. (This will be documented in the camunda docs that the file must NOT contain more than 1 key certificate chain pairs). This is also per the RFC as only one key value pair is intended (However this is not verified or tested so a file with multiple entries could be provided and the first one would be used) Camunda docs PR is here camunda/camunda-docs#4165 ## Related issues closes camunda/issues#833
## Description This PR adds support for a PKCS12 format file to configure the TLS private key and certificate chain. The PKCS12 file can be password protected. - The original certificateChainPath and privateKeyPath and the new `pkcs12` configuration are mutually exclusive and checks are carried out to ensure such behaviour. - The approach taken to parse the pkcs12 is that the private key and certificate chain are extracted from the pkcs12 file in order to build the netty `SslContext` - The PKCS12 file must have the same password as the singular key certificate pair in the file. (That is a password is required to access the file, and then another password is required to extract the private key, this is per the [RFC](https://datatracker.ietf.org/doc/html/rfc7292)) - In addition pkcs12 supports multiple key certificate chain pairs however the current approach will extract the first pair from the file an use that for TLS configuration. (This will be documented in the camunda docs that the file must NOT contain more than 1 key certificate chain pairs). This is also per the RFC as only one key value pair is intended (However this is not verified or tested so a file with multiple entries could be provided and the first one would be used) Camunda docs PR is here camunda/camunda-docs#4165 ## Related issues closes camunda/issues#833
CC @npepinpe for review 👍 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
@EuroLew Can I go ahead and merge this, or does it need to wait until release next month? |
It can be merged now 👍 |
Description
Add documentation about how to use the new TLS configuration with a PKCS12 file. This adds details about the configuration file fields and the expected contents of the PKCS12 file.
When should this change go live?
hold
label or convert to draft PR)PR Checklist
/versioned_docs
directory./docs
directory (aka/next/
).