Looked over all these and it looks good. Post checkin ACK :)
Just a couple of questions:
1. Code like this:
if (!synchronous) {
+ // Has to be in this state or it won't go anywhere.
+ request.setRequestStatus(RequestStatus.BEGIN);
+ queue.processRequest(request);
+ } else {
+ kra.processSynchronousRequest(request);
+ }
I know we are handling the synchronous request with a processor and such, but the standard
async request is being
handled with the same queue method. Would it look nicer to have a layer for the standard
case, like processAsynchRequest?
No big deal.
2. Did we do a sanity sweep of the various scenarios to make sure that they refactor is
good with respect to legacy code paths?
I"m sure we have but was just asking.
3. Also I realize that the "realm" param is not yet supported but is a hook for
future code, if we have to touch anything again, might help to give a comment
in the key methods as to why it is not yet being used.
thanks,
jack
----- Original Message -----
From: "Ade Lee" <alee(a)redhat.com>
To: pki-devel(a)redhat.com
Sent: Friday, November 4, 2016 1:11:03 PM
Subject: [Pki-devel] [PATCH] 331-333 add support for synchronous key archival and
recovery requests.
Hi all,
This is in support of
Ticket https://fedorahosted.org/pki/ticket/2532
This is preliminary set of patches - just so you can see what I'm doing
in case I need to change anything.
Note: With the changes, you can archive a secret like this:
pki -d . -n "PKI Administrator for laptop" -P https -c redhat123 -h
`hostname` -p 8443 key-archive --passphrase "ooga booga" --clientKeyID
"test_1"
pki -d . -n "PKI Administrator for laptop" -P https -c redhat123 -h
`hostname` -p 8443 key-archive --passphrase "ooga booga" --clientKeyID
"test_2" --express
The first invocation will archive a secret and create an archival
request in LDAP. The second will create one only in memory - and will
not store it in LDAP.
You can of course, see the requests created using -
pki -d . -n "PKI Administrator for laptop" -P https -c redhat123 -h
`hostname` -p 8443 key-request-find
For retrieving the secret, you can do either:
pki -d . -n "PKI Administrator for laptop" -P https -c redhat123 -h
aleeredhat.laptop -p 8443 key-retrieve --keyID 0x5
pki -d . -n "PKI Administrator for laptop" -P https -c redhat123 -h
aleeredhat.laptop -p 8443 key-retrieve --keyID 0x5 --express
The first will retrieve the secret while creating a retrieval request.
The second will create a retrieval request only in memory, and will not
write it to LDAP.
In both cases, there should be audit logs both for retrieval and
archival.
Thanks,
Ade
_______________________________________________
Pki-devel mailing list
Pki-devel(a)redhat.com
https://www.redhat.com/mailman/listinfo/pki-devel