#1598 Redundant cert data in CS.cfg
Closed: migrated 3 years ago by dmoluguw. Opened 8 years ago by edewata.

Similar to ticket #1552, the current CS.cfg contains base-64 encoded data of the subsystem certificates. The certificates are actually also stored in the NSS database, so the copies in the CS.cfg are redundant. Some applications such as IPA only keep track and renew the certificates in NSS database, so the copies in the CS.cfg may become outdated. Any code that is relying on the copy in the CS.cfg may not work correctly.

To remove redundancy, all codes should be converted incrementally to obtain the certs directly from the NSS database. Once everything is converted, the redundant certs can be removed from CS.cfg with an upgrade script.


Per CS/DS Meeting of 09/14/2015 - 10.3

Metadata Update from @edewata:
- Issue set to the milestone: UNTRIAGED

7 years ago

Dogtag PKI is moving from Pagure issues to GitHub issues. This means that existing or new
issues will be reported and tracked through Dogtag PKI's GitHub Issue tracker.

This issue has been cloned to GitHub and is available here:
https://github.com/dogtagpki/pki/issues/2157

If you want to receive further updates on the issue, please navigate to the
GitHub issue and click on Subscribe button.

Thank you for understanding, and we apologize for any inconvenience.

Metadata Update from @dmoluguw:
- Issue close_status updated to: migrated
- Issue status updated to: Closed (was: Open)

3 years ago

Login to comment on this ticket.

Metadata