-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Supported encrypted pem files in the TLS registry #44262
Comments
maybe @cescoffier or @sberyozkin |
That's something I have on my todo list. We never had the request (even before the TLS registry) so I always postponed it. The workaround right now is to use p12. |
Forgot to mention. The main issue is that I do not want to include bouncycastle as a mandatory runtime dependency. Thus, it makes things slightly more complicated. Alternatively, this could be implemented as a separate (quarkiverse) extension (the TLS registry allows extension to register certificates) |
/cc @pedroigor (bearer-token), @sberyozkin (bearer-token,jwt,security) |
BTW - this enhancement would NOT be backported to the 3.15 (LTS). |
Hi @cescoffier Makes sense to avoid the BC dependency... One thing that I'd like to ask is to have, if possible, some shared utility code in quarkus vertx http, as I'd like to support this option for the non-TLS case, OIDC Private Key JWT authentication... (this is when a JWT token is generated and then signed with the private key, as a form of the client authentication, instead of the name and password, we briefly discussed it when Michal was migrating OIDC to use TLS registry) |
Or may be even in the |
@sberyozkin sure, having shared code would makes sense, but it should not be in vert.x http, probably in the TLS registry itself. |
FTR, I've made progress on this in the certificate generator, which now provides some utilities to decrypt encrypted PEM. Still need a bit of polishing, but the hard technical point is behind. |
Add support for encrypted PEM file (encrypted PKCS#8) to the TLS registry. This is invisible for the extensions, the key being decrypted and passed unencrypted to the extensions (the unencrypted key is never written on disk). Fix quarkusio#44262
Description
When specifying pem files for https the current expectation is that keys are unencrypted. It would be good if encrypted pem were supported as well.
See keycloak/keycloak#27437
Implementation ideas
No response
The text was updated successfully, but these errors were encountered: