mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-01-11 00:31:56 -06:00
Update comments to explain caSubsystemCert switch
Related: https://bugzilla.redhat.com/1670239 Signed-off-by: Christian Heimes <cheimes@redhat.com> Reviewed-By: Fraser Tweedale <ftweedal@redhat.com> Reviewed-By: Christian Heimes <cheimes@redhat.com>
This commit is contained in:
parent
802a54bfc8
commit
3c82585e52
@ -306,6 +306,9 @@ IPA_CA_RECORD = "ipa-ca"
|
||||
IPA_CA_NICKNAME = 'caSigningCert cert-pki-ca'
|
||||
RENEWAL_CA_NAME = 'dogtag-ipa-ca-renew-agent'
|
||||
RENEWAL_REUSE_CA_NAME = 'dogtag-ipa-ca-renew-agent-reuse'
|
||||
# The RA agent cert is used for client cert authentication. In the past IPA
|
||||
# used caServerCert profile, which adds clientAuth and serverAuth EKU. The
|
||||
# serverAuth EKU caused trouble with NamedConstraints, see RHBZ#1670239.
|
||||
RA_AGENT_PROFILE = 'caSubsystemCert'
|
||||
# How long dbus clients should wait for CA certificate RPCs [seconds]
|
||||
CA_DBUS_TIMEOUT = 120
|
||||
|
@ -857,7 +857,7 @@ class CAInstance(DogtagInstance):
|
||||
ipalib.constants.RENEWAL_CA_NAME, helper)
|
||||
|
||||
try:
|
||||
# The certificate must be requested using caServerCert profile
|
||||
# The certificate must be requested using caSubsystemCert profile
|
||||
# because this profile does not require agent authentication
|
||||
reqId = certmonger.request_and_wait_for_cert(
|
||||
certpath=(paths.RA_AGENT_PEM, paths.RA_AGENT_KEY),
|
||||
|
Loading…
Reference in New Issue
Block a user