Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding test coverage to support encrypted PEM Keys #2320

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

jcarranzan
Copy link
Contributor

@jcarranzan jcarranzan commented Feb 27, 2025

Summary

These tests will be added to cover quarkusio/quarkus#44549

Jira issue: QUARKUS-5666

TP: TP-QUARKUS-5666

Also we did some TF support --> 1507

  • Https communication using encrypted Pem, ensure you can communicate with Quarkus REST endpoint using HTTPS (no client-side authentication).
  • Certificate reloading, validate with newly generated certificate, it works for encrypted PEMs as well .
  • Injecting TLS registry configuration and can see the private key decrypted (so you can see keystore and check some x509 attributes).

Please select the relevant options.

  • Bug fix (non-breaking change which fixes an issue)
  • Dependency update
  • Refactoring
  • Backport
  • New scenario (non-breaking change which adds functionality)
  • This change requires a documentation update
  • This change requires execution against OCP (use run tests phrase in comment)

Checklist:

  • Methods and classes used in PR scenarios are meaningful
  • Commits are well encapsulated and follow the best practices

@jcarranzan jcarranzan changed the title Support encypted pkcs#8 Adding test coverage to support encrypted PEM Keys Feb 27, 2025
@jcarranzan jcarranzan marked this pull request as ready for review February 27, 2025 11:59
@jcarranzan jcarranzan requested review from michalvavrik and fedinskiy and removed request for michalvavrik February 27, 2025 12:00
Copy link
Contributor

@fedinskiy fedinskiy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

And please, link TP and Jira issue, if there are any

@jcarranzan
Copy link
Contributor Author

And please, link TP and Jira issue, if there are any

Added in the summary, thanks.

@jcarranzan jcarranzan force-pushed the support-encypted-pkcs#8 branch 2 times, most recently from 68dbb91 to 48377ee Compare February 27, 2025 15:11
@jcarranzan jcarranzan requested a review from fedinskiy February 27, 2025 15:18
@jcarranzan jcarranzan force-pushed the support-encypted-pkcs#8 branch from ab26ea5 to e777b12 Compare February 27, 2025 15:18
Copy link
Contributor

@fedinskiy fedinskiy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  1. Plans say "gRPC communication with encrypted Pem, verify you can use gRPC client to communicate with Quarkus gRPC server (running on the same server, not the separate one) that uses encrypted PEM file.", but I do not see nay GRPC tests here
  2. Did you check this on FIPS?

@jcarranzan jcarranzan force-pushed the support-encypted-pkcs#8 branch from 08b3446 to ca97a83 Compare February 27, 2025 16:57
These tests will be added:
- Https communication using encrypted Pem,  ensure you can communicate with Quarkus REST endpoint using HTTPS (no client-side authentication).
- Certificate reloading, validate with newly generated certificate, it works for encrypted PEMs as well .
- Injecting TLS registry configuration and can see the private key decrypted (so you can see keystore and check some x509 attributes).
- FIPS compatibility, it works under FIPS enable environment.
@jcarranzan jcarranzan force-pushed the support-encypted-pkcs#8 branch from cc48b66 to 884c896 Compare February 28, 2025 08:32
@jcarranzan
Copy link
Contributor Author

  1. Plans say "gRPC communication with encrypted Pem, verify you can use gRPC client to communicate with Quarkus gRPC server (running on the same server, not the separate one) that uses encrypted PEM file.", but I do not see nay GRPC tests here

    1. Did you check this on FIPS?
  1. I've already pushed my GRPC test about it.
  2. I don't expect any problem with FIPŜ enable environment, currently I am creating the OpenStack instance to test it.
    Thanks!

@jcarranzan jcarranzan requested a review from fedinskiy February 28, 2025 13:41
@jcarranzan
Copy link
Contributor Author

@fedinskiy, unfortunately, I am currently investigating some issues on FIPS with these tests. Maybe the TF might need some changes, but I need to verify that before reaching a conclusion.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants