-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Agent/ca sha256 #16217
Agent/ca sha256 #16217
Conversation
Pinging @elastic/ingest (Project:fleet) |
jenkins test this please |
When you enroll an agent you can specify the `certificate_authorities`, but when you fallback on the OS trust store you may want to be able to check which CA was used to validate the remote server chain this PR allow to define a CASHA256 to validate the remote server. Based on work from elastic#16019
@ruflin fyi look at the enrolment command in the description, this is what it will look like. |
@michalpristas ready for review. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
@@ -97,12 +97,6 @@ func NewConfigFromURL(kURL string, CAs []string) (*Config, error) { | |||
c.Username = username | |||
c.Password = password | |||
|
|||
if len(CAs) > 0 { | |||
c.TLS = &tlscommon.Config{ | |||
CAs: CAs, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
do we need this option now? we use this to pass CAs as a root CAs to the client. but without having anything to pass i think we can remove it
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There are some case that we will still need to support passing a CAs, but this can done by altering the TLS field after.
* Allow to use a ca_sha256 when enroll an Agent When you enroll an agent you can specify the `certificate_authorities`, but when you fallback on the OS trust store you may want to be able to check which CA was used to validate the remote server chain this PR allow to define a CASHA256 to validate the remote server. Based on work from elastic#16019
When you enroll an agent you can specify the
certificate_authorities
,but when you fall back on the OS trust store you may want to be able to
check which CA was used to validate the remote server chain this PR
allow defining a CASHA256 to validate the remote server.
Based on work from #16019
The enrollment command will look like this.
Fixes: #15718
Fixes: #15716