Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add taint upstream authority #64

Merged
merged 8 commits into from
Aug 7, 2024

Conversation

MarcosDY
Copy link
Collaborator

No description provided.

Signed-off-by: Marcos Yacob <[email protected]>
Signed-off-by: Marcos Yacob <[email protected]>
Signed-off-by: Marcos Yacob <[email protected]>
// will perform proactive rotations of any key material related to
// the tainted authority. The result of this action will be observed
// cluster-wide.
// It is important to change active upstream authority before taiting it,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// It is important to change active upstream authority before taiting it,
// It is important to change active upstream authority before tainting it,

// the tainted authority. The result of this action will be observed
// cluster-wide.
// It is important to change active upstream authority before taiting it,
// since taint will force the rotation of any bundle that is using
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// since taint will force the rotation of any bundle that is using
// since tainting will force the rotation of any bundle that is using

// It is important to change active upstream authority before taiting it,
// since taint will force the rotation of any bundle that is using
// the old upstream authority.
// It receive the X.509 Subject Key Identifier (or SKID) of an old X.509 authority.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// It receive the X.509 Subject Key Identifier (or SKID) of an old X.509 authority.
// It receives the X.509 Subject Key Identifier (or SKID) of an old X.509 authority.

// the old upstream authority.
// It receive the X.509 Subject Key Identifier (or SKID) of an old X.509 authority.
//
// If a X.509 upstream authority does not exist or it is active, a FailedPrecondition
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// If a X.509 upstream authority does not exist or it is active, a FailedPrecondition
// If an X.509 upstream authority does not exist or it is active, a FailedPrecondition

// RevokeX509UpstreamAuthority revokes the previously active X.509 upstream authority by
// removing it from the bundle and propagating this update throughout
// the cluster.
// It receive the subject key ID an old X.509 upstream authority.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// It receive the subject key ID an old X.509 upstream authority.
// It receives the subject key ID of the authority's CA certificate of the upstream X.509 authority to revoke.

@@ -192,6 +236,7 @@ message RevokeX509AuthorityResponse {
AuthorityState revoked_authority = 1;
}


Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Unnecessary blank line?

@MarcosDY MarcosDY marked this pull request as ready for review August 6, 2024 19:17
Comment on lines 67 to 68
// If upstream authority is configured, local authorities can not be tainted,
// a FailedPrecondition error will be returned.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// If upstream authority is configured, local authorities can not be tainted,
// a FailedPrecondition error will be returned.
// If an upstream authority is configured then local authorities cannot be tainted,
// and a FailedPrecondition error will be returned.

//
// If a previously active X.509 authority does not exist (e.g. if one
// has been prepared but not activated yet), a FailedPrecondition
// error will be returned.
rpc TaintX509Authority(TaintX509AuthorityRequest) returns (TaintX509AuthorityResponse);

// TaintX509UpstreamAuthority marks the provided upstream authority as
// being tainted. SPIRE Agents observing an authority to be tainted
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// being tainted. SPIRE Agents observing an authority to be tainted
// being tainted. SPIRE Agents observing a tainted authority

// will perform proactive rotations of any key material related to
// the tainted authority. The result of this action will be observed
// cluster-wide.
// It is important to change active upstream authority before taiting it,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// It is important to change active upstream authority before taiting it,
// It is important to change to a new active upstream authority before tainting the old one,

// It is important to change active upstream authority before taiting it,
// since tainting will force the rotation of any bundle that is using
// the old upstream authority.
// It receives the X.509 Subject Key Identifier (or SKID) of an old X.509 authority.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// It receives the X.509 Subject Key Identifier (or SKID) of an old X.509 authority.
// The X.509 authority to taint is identified using the provided X.509 Subject Key Identifier (or SKID) of the old X.509 authority.

// the old upstream authority.
// It receives the X.509 Subject Key Identifier (or SKID) of an old X.509 authority.
//
// If an X.509 upstream authority does not exist or it is active, a FailedPrecondition
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// If an X.509 upstream authority does not exist or it is active, a FailedPrecondition
// If an X.509 upstream authority is not configured, or the identified upstream X.509 authority is active, a FailedPrecondition

// RevokeX509UpstreamAuthority revokes the previously active X.509 upstream authority by
// removing it from the bundle and propagating this update throughout
// the cluster.
// It receives the subject key ID of the authority's CA certificate of the
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// It receives the subject key ID of the authority's CA certificate of the
// The X.509 authority to revoke is identified using the provided subject key ID of the authority's CA certificate.

Signed-off-by: Marcos Yacob <[email protected]>
@@ -62,13 +62,31 @@ service LocalAuthority {
// will perform proactive rotations of any key material related to
// the tainted authority. The result of this action will be observed
// cluster-wide.
// It can receive the public key of an old X.509 authority.
// It can receive the authority ID of an old X.509 authority.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// It can receive the authority ID of an old X.509 authority.
// The X.509 authority to taint is identified using the provided X.509 Subject Key
// Identifier (or SKID) of the old X.509 authority.

//
// If a previously active X.509 authority does not exist (e.g. if one
// has been prepared but not activated yet), a FailedPrecondition
// error will be returned.
rpc TaintX509Authority(TaintX509AuthorityRequest) returns (TaintX509AuthorityResponse);

// TaintX509UpstreamAuthority marks the provided upstream authority as
// being tainted. SPIRE Agents observing a tainted authority to be tainted
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// being tainted. SPIRE Agents observing a tainted authority to be tainted
// being tainted. SPIRE Agents observing a tainted authority

Signed-off-by: Marcos Yacob <[email protected]>
@MarcosDY MarcosDY merged commit b74d2fa into spiffe:next Aug 7, 2024
2 checks passed
@MarcosDY MarcosDY deleted the add-taint-upstream-authority branch August 7, 2024 18:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants