Skip to content

chore: remove certificate validator#1730

Merged
gsanchezgavier merged 4 commits intomainfrom
gsanchez/chore/remove-cert-sign-impl
Oct 2, 2025
Merged

chore: remove certificate validator#1730
gsanchezgavier merged 4 commits intomainfrom
gsanchez/chore/remove-cert-sign-impl

Conversation

@gsanchezgavier
Copy link
Contributor

  • Removes the remote config validation based on the public key extracted from the certificate, which is deprecated by the JWKS one.

NOTE: To be merged after FC deploys the new signature.

@gsanchezgavier gsanchezgavier requested a review from a team as a code owner September 29, 2025 12:37
@gsanchezgavier gsanchezgavier marked this pull request as draft September 29, 2025 12:37
@gsanchezgavier gsanchezgavier force-pushed the gsanchez/chore/remove-cert-sign-impl branch from ddb9042 to 4ceb3a6 Compare September 29, 2025 13:39
@gsanchezgavier gsanchezgavier force-pushed the gsanchez/chore/remove-cert-sign-impl branch 2 times, most recently from c6975fd to 19ae8fa Compare October 1, 2025 08:21
@gsanchezgavier gsanchezgavier marked this pull request as ready for review October 1, 2025 08:32
sigilioso
sigilioso previously approved these changes Oct 2, 2025
Copy link
Contributor

@sigilioso sigilioso left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🧹 🧹 🧹

Thanks for taking care of this! If left some relatively unrelated questions and you'll need a rebase, but LGTM 🚀

Comment on lines +66 to +70
let Some(public_key_server_url) = config.public_key_server_url else {
return Err(SignatureValidatorError::BuildingValidator(
"missing public_key_server_url configuration".to_string(),
));
};
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We fail if enabled and url is not set, nice!

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes , it shouldn't happen on any existing flow becase recipe and helm chart sets the corresponding url but just in case

Comment on lines +161 to +164
SignatureValidator::new(fleet_config.signature_validation, config.proxy)
})
.transpose()?
.unwrap_or(SignatureValidator::Noop);
.unwrap_or(SignatureValidator::new_noop());
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We also need the the Noop thing here because we need to build a signature validator even if OpAMP is disabled, right? 🙃

Someday we will take care of the whole let Some(opamp) else thing...

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes and in this case the warn message doesn't make sense, it only appears whenver opamp is enabled and sig verificatino is disabled

@gsanchezgavier gsanchezgavier force-pushed the gsanchez/chore/remove-cert-sign-impl branch from 19ae8fa to f893c04 Compare October 2, 2025 08:50
@gsanchezgavier gsanchezgavier added the k8s-extended-e2e Trigger extended k8s e2e on a PR label Oct 2, 2025
@gsanchezgavier gsanchezgavier merged commit dd6c6ad into main Oct 2, 2025
37 of 45 checks passed
@gsanchezgavier gsanchezgavier deleted the gsanchez/chore/remove-cert-sign-impl branch October 2, 2025 09:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

k8s-extended-e2e Trigger extended k8s e2e on a PR

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants

Comments