-
Notifications
You must be signed in to change notification settings - Fork 346
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ACMServiceManager.list_certificates_with_backoff() lists only RSA_2048 certificates #1567
Closed
1 task done
Comments
softwarefactory-project-zuul bot
pushed a commit
that referenced
this issue
Jun 6, 2023
…ilter added (#1570) ACMServiceManager.list_certificates_with_backoff: explicit key type filter added SUMMARY Fixes #1567 ACM.Client.list_certificates requires explicit certificate type filter in order to return the non-RSA_2048 certificates too, and this is needed to ensure the idempotency of importing such certificates. ISSUE TYPE Bugfix Pull Request COMPONENT NAME acm Reviewed-by: Mark Chappell Reviewed-by: Alina Buzachis
patchback bot
pushed a commit
that referenced
this issue
Jun 6, 2023
…ilter added (#1570) ACMServiceManager.list_certificates_with_backoff: explicit key type filter added SUMMARY Fixes #1567 ACM.Client.list_certificates requires explicit certificate type filter in order to return the non-RSA_2048 certificates too, and this is needed to ensure the idempotency of importing such certificates. ISSUE TYPE Bugfix Pull Request COMPONENT NAME acm Reviewed-by: Mark Chappell Reviewed-by: Alina Buzachis (cherry picked from commit 3926a7d)
softwarefactory-project-zuul bot
pushed a commit
that referenced
this issue
Jun 6, 2023
…ilter added (#1570) (#1597) [PR #1570/3926a7dc backport][stable-6] ACMServiceManager.list_certificates_with_backoff: explicit key type filter added This is a backport of PR #1570 as merged into main (3926a7d). SUMMARY Fixes #1567 ACM.Client.list_certificates requires explicit certificate type filter in order to return the non-RSA_2048 certificates too, and this is needed to ensure the idempotency of importing such certificates. ISSUE TYPE Bugfix Pull Request COMPONENT NAME acm Reviewed-by: Alina Buzachis
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Summary
In boto3 ACM.client.list_certificates has a default filtering for
RSA_2048
certificates:Therefore to retrieve all certificates, we need an explicit
Includes.keyTypes = [ 'RSA_1024'|'RSA_2048'|'RSA_3072'|'RSA_4096'|'EC_prime256v1'|'EC_secp384r1'|'EC_secp521r1' ]
filter.The bug is significant, because this call is used by
community.aws.acm_certificate
module to ensure idempotency, and the parameter block for the boto3 call is a local variable here, there is no other way to fix this.And if the type of the certificate to be imported is different than RSA_2048, then the idempotency will fail and multiple copies of the same certificate will be imported.
Issue Type
Bug Report
Component Name
acm
Ansible Version
Collection Versions
AWS SDK versions
Configuration
OS / Environment
Steps to Reproduce
Expected Results
I expected that the certificate is imported only on the 1st run, and then recognised as already existing on the subsequent calls.
Actual Results
On every run a new copy of the same cert is being imported.
Code of Conduct
The text was updated successfully, but these errors were encountered: