Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

provide endpoint to expose cert validity and fingerprints #745

Open
g-k opened this issue Sep 2, 2021 · 2 comments
Open

provide endpoint to expose cert validity and fingerprints #745

g-k opened this issue Sep 2, 2021 · 2 comments

Comments

@g-k
Copy link
Contributor

g-k commented Sep 2, 2021

Like #737 provide an endpoint that returns certificate validity and SHA2 fingerprints (NotBefore and NotAfter and gpg expiration dates) for signers (this is public info for anything with a released signed artifact).

This would let:

  • autograph clients check the cert they'd use before signing (if the endpoint is authenticated and scoped to the current creds)
  • autograph operators monitor pending expirations without going to the HSM or config files

cc @hwine re: second item and CertCert work

@hwine
Copy link
Contributor

hwine commented Sep 2, 2021

sgtm - what creds will operators use to auth? Hopefully, not some that would also enable signing! 😀

@g-k g-k added the enhancement label Sep 3, 2021
@g-k
Copy link
Contributor Author

g-k commented Sep 9, 2021

sgtm - what creds will operators use to auth? Hopefully, not some that would also enable signing! 😀

You raise a good point about making permissions explicit. Currently:

  • all users/auths have /sign/* for the key/signer ids they have access to. This could be broken down into distinct sign/{data,hash,file} permissions.
  • the monitor key has access to sign the fixed monitoring string with all signers

For the first use case, I'd grant all users access to check the certs for signers they have access to. This saves us from having to distribute additional creds for checking cert validity.

For the second use case, we can reuse the monitor creds assuming the user monitoring autograph signing also monitors certs.

Arguably, we should make the permissions more explicit and split out a separate "fetch cert info" instead of overloading the above.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants