-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[algs][1] Support configurable algorithm suites for CA keys #43305
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
nklaassen
force-pushed
the
nklaassen/algs1
branch
from
June 20, 2024 21:05
2d0b09c
to
b56b405
Compare
nklaassen
added
the
no-changelog
Indicates that a PR does not require a changelog entry
label
Jun 20, 2024
nklaassen
force-pushed
the
nklaassen/algs1
branch
from
June 20, 2024 21:31
b56b405
to
4754767
Compare
nklaassen
commented
Jun 20, 2024
@@ -275,7 +275,7 @@ func newAuthConfig(t *testing.T, log utils.Logger) *servicecfg.Config { | |||
} | |||
var err error | |||
config.Auth.ClusterName, err = services.NewClusterNameWithRandomID(types.ClusterNameSpecV2{ | |||
ClusterName: "testcluster", | |||
ClusterName: "test-cluster", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this just matches the cluster name used in lib/auth/keystore tests so that it's easier to find all the test keys in e.g. the AWS console
nklaassen
force-pushed
the
nklaassen/algs1
branch
from
June 21, 2024 20:48
4754767
to
c20955d
Compare
nklaassen
changed the base branch from
nklaassen/algs-ca-merge-base
to
nklaassen/algs0
June 21, 2024 20:48
nklaassen
force-pushed
the
nklaassen/algs0
branch
from
June 24, 2024 21:54
e50fbe0
to
16e5b21
Compare
nklaassen
force-pushed
the
nklaassen/algs1
branch
from
June 24, 2024 22:06
c20955d
to
c58e850
Compare
greedy52
approved these changes
Jun 25, 2024
nklaassen
force-pushed
the
nklaassen/algs1
branch
from
June 25, 2024 23:42
4cc0d87
to
dbe5bd7
Compare
friendly ping @tigrato |
tigrato
approved these changes
Jun 26, 2024
nklaassen
force-pushed
the
nklaassen/algs0
branch
from
June 26, 2024 15:40
205ff64
to
f6d09da
Compare
nklaassen
force-pushed
the
nklaassen/algs1
branch
from
June 26, 2024 18:17
dbe5bd7
to
12aa3d2
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR continues the implementation of RFD 136 - Modern Signature Algorithms.
The current base branch
nklaassen/algs-ca-merge-base
merges both #43260 and #43152 which this PR depends on, I will update it tomaster
once both of those merge.This adds support for CAs to use the correct algorithm for the current configured algorithm suite when they generate new keys, during startup or a CA rotation. This works whether the CA is backed by software, HSM, GCP KMS, or AWS KMS keys, and I have tested it on each platform.
We currently don't support signing JWTs with anything other than RSA, so I reverted the algorithm for those keys to RSA in the
-dev
suites for now, I will update them to ECDSA after I add support.I have not tested that every protocol and integration works with the new key algorithms. My plan is to incrementally add support for each protocol while updating the subject/client/server key generation and test each protocol as I go. I am not changing any defaults here, you will only start to see the new algorithms used for new CA keys if you manually configure your
cluster_auth_preference.signature_algorithm_suite
tobalanced-dev
,hsm-dev
, orfips-dev
. The default is stilllegacy
.