Carlos,
The module skeleton, including API functions and their brief description, was 
committed at https://review.openstack.org/#/c/109849/

checkContainerExistance                 -should be used by LBaaS API, I will 
merge it into TLS implementation change.
                                        - Throwing TLSContainerNotFound 
exception
validateContainer                       -should be used LBaaS API instead of 
checkContainerExistance if we will be able to implement it for Juno.
                                        - Throwing TLSContainerNotFound or 
TLSContainerInvalid exceptions
_getContainerAndRegisterConsumer        - internal. Used by 
checkContainerExistance and validateContainer. Getting container by posting 
service as a container consumer.
unregisterContainerConsumer             - should be used by LBaaS API when 
container is not used for listeners anymore. I will implement it in TLS 
implementation change. Also used by
                                        - also used by checkContainerExistance 
and validateContainer in order not to leave containers consumed in Barbican 
before
                                        - driver does the real consumer 
registration with getCertificateX509 and/or extractCertificateHostNames
getCertificateX509                      - should be used by specific vendor 
driver. Getting container by posting service as a container consumer. Returns 
certificate's X509
extractCertificateHostNames             - should be used by specific vendor 
driver. Getting certificate's X509 by using getCertificateX509 and returns SCN 
and SAN names dict.

I will appreciate your opinion on this API. 

Thanks,
Evg


-----Original Message-----
From: Carlos Garza [mailto:carlos.ga...@rackspace.com] 
Sent: Thursday, July 24, 2014 7:08 PM
To: OpenStack Development Mailing List (not for usage questions)
Subject: Re: [openstack-dev] [Neutron][LBaaS] new common module for Barbican 
TLS containers interaction

Sorry I meant to say I'm pretty agreeable just park a stub module so I can 
populate it.
On Jul 24, 2014, at 11:06 AM, Carlos Garza <carlos.ga...@rackspace.com>
 wrote:

> I'Just park a module with a stub call that I can populate with pyasn1.
> On Jul 24, 2014, at 10:38 AM, Evgeny Fedoruk <evge...@radware.com>
> wrote:
> 
>> Hi,
>> 
>> Following our talk on TLS work items split, We need to decide how 
>> will we validate/extract certificates Barbican TLS containers.
>> As we agreed on IRC, the first priority should be certificates fetching.
>> 
>> TLS RST describes a new common module that will be used by LBaaS API and 
>> LBaaS drivers.
>> It's proposed front-end API is currently:
>> 1. Ensuring Barbican TLS container existence (used by LBaaS API) 2. 
>> Validating Barbican TLS container (used by LBaaS API)
>>   This API will also "register" LBaaS as a container's consumer in 
>> Barbican's repository.
>>   POST request:
>>   http://admin-api/v1/containers/{container-uuid}/consumers
>>   {
>>    "type": "LBaaS",
>>    "URL": "https://lbaas.myurl.net/loadbalancers/<lbaas_loadbalancer_id>/"
>>   }
>> 
>> 3. Extracting SubjectCommonName and SubjectAltName information
>>    from certificates' X509 (used by LBaaS front-end API)
>>   As for now, only dNSName (and optionally directoryName) types will be 
>> extracted from
>>    SubjectAltName sequence,
>> 
>> 4. Fetching certificate's data from Barbican TLS container
>>    (used by provider/driver code)
>> 
>> 5. Unregistering LBaaS as a consumer of the container when container is not
>>     used by any listener any more (used by LBaaS front-end API)
>> 
>> So this new module's front-end is used by LBaaS API/drivers and its back-end 
>> is facing Barbican API.
>> Please give your feedback on module API, should we merge 1 and 2?
>> 
>> I will be able to start working on the new module skeleton on Sunday 
>> morning. It will include API functions.
>> 
>> TLS implementation patch has a spot where container validation should 
>> happen:https://review.openstack.org/#/c/109035/3/neutron/db/loadbalancer/loadbalancer_dbv2.py
>>  line 518 After submitting the module skeleton I can make the TLS 
>> implementation patch to depend on that module patch and use its API.
>> 
>> As an alternative we might leave this job to drivers, if common 
>> module will be not implemented
>> 
>> What are your thoughts/suggestions/plans?
>> 
>> Thanks,
>> Evg
>> 
>> _______________________________________________
>> OpenStack-dev mailing list
>> OpenStack-dev@lists.openstack.org
>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
> 


_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to