-
Notifications
You must be signed in to change notification settings - Fork 144
Crypto issues #444
Comments
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
By the way - I'd be more than happy to completely eliminate pyOpenSSL from all Maybe worth a shot for 2.9? |
I guess we should keep PyOpenSSL support for modules which supported it before (if it doesn't become extremely hard to maintain both), but yeah, that's one of the goals I have. For 2.8, I hope we'll have openssl_certificate as well (next to openssl_privatekey and openssl_csr, and the ones which never used PyOpenSSL in the first place). Having all others for 2.9 is hopefully more doable. At least if some more people want to help with this :) |
pyOpenSSL is deprecated for years by now, see also the README in https://github.com/pyca/pyopenssl.
|
Yep,
|
I've updated the above issues lists and hid all comments which are no longer relevant. Please note that the freeze dates for Ansible 2.8 have been moved again (#346 (comment)). (You can subscribe to #346 to be updated about important changes for contributors.) Also, there are a couple of issues for |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
There are some non-
Also, more input for the general discussion in ansible/ansible#54635 about potential futures of the |
I've created some issues for tracking adding cryptography backends to modules which still rely on PyOpenSSL: ansible/ansible#59904, ansible/ansible#59905, ansible/ansible#59906 I've also created a PR (ansible/ansible#59907) which will deprecate the PyOpenSSL backend for openssl_certificate, openssl_certificate_info, openssl_csr, openssl_csr_info, openssl_privatekey, openssl_privatekey_info and announce its removal in Ansible 2.13. |
Reminder: the Feature Freeze for Ansible 2.9 is coming up on August 29th, i.e. in less than two weeks! (And I guess/somewhat hope that this time it won't be delayed as much as last time.) So if you want to add something like a new feature, please hurry up :) |
@MarkusTeufelberger thanks a lot for collecting this info! The deprecation cycle of 4 Ansible versions should cover two years, at least I hope so - if not, we can also extend the deprecation deadline a bit. |
There are two PRs which need reviews:
Also, there's a "discussion" PR about renaming the openssl_* modules. If you have any ideas/preferences/..., please write something there!
Finally, there's a discussion triggered by a core team decision on openssh_keypair and openssl_privatekey regenerating keys when passphrase does not match, keys are invalid, or more generally when potentially unexpected changes happen. Please write your opinions/ideas/wishes!
|
Here's another PR: BTW, most modules will probably be moved out to other repositories soon, so it would be really cool if someone could review this and ansible/ansible#63435 so they have a chance of being merged before the move. :) |
FYI: there's a schedule for the collection migration, see https://github.com/ansible-collections/overview/pull/3/files#diff-88b99bb28683bd5b7e3a204826ead112R112-R116 and https://github.com/ansible-collections/overview/pull/3/files#diff-88b99bb28683bd5b7e3a204826ead112R136-R139 This means that all new modules should be merged by March 2nd (even better earlier than that :) ). (Modules existing by then can be used in Ansible 2.10 without using FQCN, so there is some advantage in having them included by then.) I'd be really happy if someone can give ansible/ansible#63435 (x509_crl) a review soon, so I can merge it (and add a basic x509_crl_info, whose tests will rely on x509_crl). |
Personally I'm slightly in favor of having a separate |
@MarkusTeufelberger thanks for bringing this up! (I completely forgot about it...) I'm also in favor of this, for two reasons:
Also, according to @gundalow we can have CI provided by Ansible (assuming we're staying in https://github.com/ansible-collections/). Any other opinions on this? Are you interested in helping out with a |
I think I have a slight preference for ‘community.crypto’. I’m not sure I’m entirely convinced an LTE version is a great idea (though I’m not against it either), what would be the level of LTS you were thinking of? |
Only at the module level w.r.t arguments, default values, features, deprecations. I think having something similar to what Ansible currently does (minor releases of the current three major versions for a certain amount of time which only contain backports of bugfixes, i.e. no new features, deprecations, feature removals, etc.) is a good model and makes it easier to rely on the modules in production. It shouldn't be more work than the current backporting system, and the main drawback is that there will be more branches :-) |
It's too early to tell yet about Long-Term-Support for: Ansible-base (ansible/ansible), community.general, or any other collections yet. If the repo lives in github.com/ansible-collections/ we can provide CI Whomever from this group wants direct GitHub powers on the community.crypto repo can have it, so you can use nice things like assignment, GitHub Project Boards, Milestones, etc. If you want This ideal should be decided in the next few days as we are finalising the scenario files for the migration. |
I assume "this issue" == @gundalow's comment? Anyway, I'm +1. |
Okay, that makes more sense than what I was at first guessing (and what my reply was about). |
@ctrufan are you also interested in this? The entrust modules are part of |
@felixfontein Thanks for pinging me! I don't necessarily have an opinion on the move to collections in general, I haven't been staying sufficiently in the loop, but since it looks like a migration is happening regardless? I would agree that it makes sense to have a crypto grouping. |
BTW, there are two PRs which need a review:
It would be nice if these could get merged before the repository lockdown next week :) |
As of today, I see 5 👍 and zero 👎 so we will create I've created a "scenario file" so that on the day of migration Can you all please carefully review ansible-community/collection_migration#462 and ensure I've not missed any
Once happy, please leave your review on ansible-community/collection_migration#462 Thanks for your continued great work :) |
You can see the created collection here https://github.com/ansible-collection-migration/community.crypto This will be rebuilt (at least) daily until the migration is run for real. |
FYI, the devel branch is now frozen: https://groups.google.com/d/msg/ansible-devel/6UAfogEDtG8/wMTgxBGWCgAJ |
FYI: there are currently discussions in ansible-collections/overview#37 (also see ansible/ansible#68594) on collection versioning. The guidelines from ansible/ansible#68594 are mainly for "official" collections (which end up on Automation Hub), but I guess something like that also makes sense for community.crypto. I've sketched out a proposal here which I think would be well-suited for community.crypto: ansible-collections/overview#37 (comment) Any opinions on this? This would be very close to what we currently have in ansible/ansible, and every active release branch would be similar to a LTS version. |
All,
Welcome peoples thoughts on this or anything else we can take advantage of now we have a dedicated repo, with more contributors that have direct GitHub powers. |
I think this is an excellent idea, and created a pinboard issue at ansible-collections/community.crypto#24. Please subscribe to it! |
If nobody complains, I will close this in a week. |
I've tried to go through all crypto module issues and see which ones are more urgent (and should really be fixed for Ansible 2.8 - remember, community freeze is on March 21st!), either because they report bugs (most of them), or features which seem to be important. Is anyone interested in working on some of these? If you have specific comments on the issues, or want to work on them, please state so in the issue itself (so this issue won't get too confusing :) ). If you have general remarks, other other things which you think would be good to get done, please post them here.
openssl_certificate bugs:
openssl_certificate traceback with empty file ansible#36738: module crashes when encounters invalid PEM file(PR in progress)openssl_certificate only asserts present extensions, ignoring absent ones ansible#38733:assertonly
provider is not working properly when extensions are not present (openssl_certificate: make sure extensions are present when they are queried by assertonly ansible#53207 merged)openssl_certificate fail with acme provider ansible#41396:acme
provider seems to be brokenopenssl_certificate - selfsigned_not_after => no attribute 'ASN1_TIME_set_string' ansible#46196:(bug in library/setup)selfsigned_not_after
seems to be brokenopenssl_certificate: has_expired=no does nothing ansible#51267:(openssl_certificate, fixed has_expired to check the cert expiration date ansible#53168 merged)has_expired
seems to be brokenopenssl_certificate features:
assertonly
providermodule: openssl_certificate unusable on RHEL 7 ansible#34054: make module work with RHEL7 or other distributions with stone-age PyOpenSSL (idea: add(New cryptography backend for openssl_certificate ansible#53924 merged)cryptography
backend?)openssl_privatekey:
openssl_privatekey can't create files which only have read permissions ansible#48656: cannot create read-only keys(will be fixed by openssl_privatekey: fix broken backup option ansible#54290)openssl_pkcs12:
openssl_pkcs12 error: name must be a byte string or None ansible#46047:friendly_name
is required (see Issue 1 here)openssl_pkcs12: cannot create archive without a private key ansible#51703: cannot create archive without a private keyopenssl_pkcs12: idempotency check is not working ansible#53221: idempotency checking does not work (fixed in openssl_pkcs12: Add idempotency checks ansible#54633)openssh_* modules:
cc @MarkusTeufelberger @puiterwijk @resmo @Spredzy @Shaps @Xyon @dagwieers
The text was updated successfully, but these errors were encountered: