-
Notifications
You must be signed in to change notification settings - Fork 950
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Server] Fix: Return full CertificateChain after Certificate Update #2855
[Server] Fix: Return full CertificateChain after Certificate Update #2855
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #2855 +/- ##
==========================================
- Coverage 55.70% 55.30% -0.41%
==========================================
Files 352 352
Lines 67332 67342 +10
Branches 13806 13805 -1
==========================================
- Hits 37506 37241 -265
- Misses 25792 26019 +227
- Partials 4034 4082 +48 ☔ View full report in Codecov by Sentry. |
@@ -134,7 +134,13 @@ public byte[] LoadCertificateChainRaw(X509Certificate2 certificate) | |||
return result.Item2; | |||
} | |||
|
|||
return certificate.RawData; | |||
// load certificate chain. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This change contradicts the idea of the cache, which was that certs and certchains are being updated outside the normal create session flows, once.
Then no async load operation has to be done and no async has to be wired up.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mregen but shouldn't we handle a "Cache miss". I can change the logic back to a separate update function, If we don't need this
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Question is why we have a cache miss, it should be loaded once on startup, or when application certificates are updated. handling the cache miss is a band aid.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
okay, I will rewrite to loop all security policies to update each of the application certificates on certificate update. I did not think the async overhead was such a concern.
Proposed changes
Fix the CertificateTypesProvider to also return the correct chain after a CertificateUpdate occured.
Related Issues
Types of changes
Checklist