-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use existing keyrings during setup #3877
Comments
I like proposal 1 for it's stability over changes Zowe, administrators, and ZOS environment. The default should probably be false. |
I would prefer the option 2 and specifically because based on what I see the typical use case is that the certificates are prepared by security team upfront and therefore the option to use existing certificates seems to me as default. If we remove by default the certificate from setup section, it will remove the duplicity. |
We can technically support both options, but we need to define something as default behavior anyway. That could be a first step, but it does not solve the issue that Jakub mentioned above. We have a configuration duplicity and customers are confused about why there are two sections dedicated to certificates, sometimes mixing them up. Also, the scenarios are adding about 160 lines to the configuration, while having limited usability as many customers will not use Zowe to generate certificates at all. To avoid duplicity we need to remove one of sections. Jakub is proposing to remove all the scenarios completely, it can work, we’ll just need to adjust the But we can go the other way around: If we are planning to have “Scenario 6” with details of existing certificates configuration sufficient to generate This plan includes some logic updates behind the command, but If we are planning to rewrite |
Many users do not want Zowe to create a keyring. They just want to use their own keyring.
This is possible and the requirements are documented at https://docs.zowe.org/stable/user-guide/configure-certificates#zowe-certificate-requirements but zowe does not provide clear documentation or intuition on how to make use of such keyrings.
Proposal 1:
Change example-zowe.yaml to add a 6th "certificate setup scenario"
It should look like this:
This yaml is similar to the 3rd scenario (create keyring & certificate), but
create: false
will be used to tell it not to create.The result of this config should be that no JCL is executed, no system change occurs.
At maximum, validation could be performed to see if the keyring chosen is actually valid for zowe use.
But the point of this yaml would be that upon running
zwe init certificate
, the only thing it would do is convert from thesetup.certificate
structure to thecertificate
structure.Proposal 2:
Just completely comment out the whole
zowe.setup.certificate
section and make clear that users should go right down to thezowe.certificate
area in which they'll findIn other words, users need only alter the alias & end of file portions to get running.
defaults.yaml could have complicated defaulting to hide away the truststore section entirely I suppose.
The text was updated successfully, but these errors were encountered: