Network maintenance. Planio will be observing two scheduled maintenance windows this Tuesday, March 2 and Wednesday, March 3 from 02:00 UTC until 06:00 UTC each in order to perform maintenance on access routers in our primary datacenter. Your account might observe short downtimes during these periods up to several minutes at a time.
As a user I have path checking features for to the X.509 certguard
It would be very useful for paths to be put into the x.509 extended attributes to see if this client is authorized to access this specific distribution's content. This way whoever is generating the certs (and their expiration dates) determines the access.
The existing X.509 certguard could automatically be updated to check this correctly. We also need docs with how the openssl tooling can easily make these kind of certs.
How will we ensure path checking is required?¶
A boolean will be added to the X.509 certguard called
path_check_required which will default to False. If True, the certificate check must contain a matching path for the content requested.
I'm interested in this feature as well, we're serving a large amount of customers with all different kinds of systems.
We want to offer our customers staging for licensed products via a central pulpserver as well and individually allow or deny access to those repositories.
Please register to edit this issue