Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

As a user I have path checking features for to the X.509 certguard #138

Open
pulpbot opened this issue Jan 4, 2022 · 5 comments
Open

As a user I have path checking features for to the X.509 certguard #138

pulpbot opened this issue Jan 4, 2022 · 5 comments
Labels

Comments

@pulpbot
Copy link
Member

pulpbot commented Jan 4, 2022

Author: @bmbouter (bmbouter)

Redmine Issue: 4666, https://pulp.plan.io/issues/4666


Motivation

It would be very useful for paths to be put into the x.509 extended attributes to see if this client is authorized to access this specific distribution's content. This way whoever is generating the certs (and their expiration dates) determines the access.

Solution

The existing X.509 certguard could automatically be updated to check this correctly. We also need docs with how the openssl tooling can easily make these kind of certs.

How will we ensure path checking is required?

A boolean will be added to the X.509 certguard called path_check_required which will default to False. If True, the certificate check must contain a matching path for the content requested.

@pulpbot
Copy link
Member Author

pulpbot commented Jan 4, 2022

From: @bmbouter (bmbouter)
Date: 2019-04-11T16:07:23Z


revising with details about how users can configure that path checking is required

@pulpbot
Copy link
Member Author

pulpbot commented Jan 4, 2022

From: @bmbouter (bmbouter)
Date: 2019-05-31T00:45:03Z


We should add this to the sprint.

@pulpbot
Copy link
Member Author

pulpbot commented Jan 4, 2022

From: @bmbouter (bmbouter)
Date: 2019-06-07T16:03:35Z


These weren't added to Sprint 54, but they were OK'd at sprint planning.

@pulpbot
Copy link
Member Author

pulpbot commented Jan 4, 2022

From: @RCMariko (rchan)
Date: 2019-09-13T18:59:27Z


Not moving forward to next Sprint to make room for highest priority Katello blockers.

@pulpbot
Copy link
Member Author

pulpbot commented Jan 4, 2022

From: dustball (dustball)
Date: 2020-10-12T15:36:09Z


I'm interested in this feature as well, we're serving a large amount of customers with all different kinds of systems.

We want to offer our customers staging for licensed products via a central pulpserver as well and individually allow or deny access to those repositories.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants