Re: [openstack-dev] [Neutron][LBaaS] TLS capability - certificates data persistency

2014-07-23 Thread Stephen Balukoff
I'm willing to go with simpler code that gets us this feature faster, and re-evaluating whether storing some extra data on certificates locally makes significant performance gains later on. First we need to get it working, then we need to make it work fast. :) Stephen On Tue, Jul 22, 2014 at 4:

Re: [openstack-dev] [Neutron][LBaaS] TLS capability - certificates data persistency

2014-07-22 Thread Carlos Garza
On Jul 20, 2014, at 6:32 AM, Evgeny Fedoruk wrote: > Hi folks, > > In a current version of TLS capabilities RST certificate SubjectCommonName > and SubjectAltName information is cached in a database. > This may be not necessary and here is why: > > 1. TLS containers are immutable, mea

Re: [openstack-dev] [Neutron][LBaaS] TLS capability - certificates data persistency

2014-07-22 Thread Brandon Logan
> > > > From: Stephen Balukoff [mailto:sbaluk...@bluebox.net] > Sent: Tuesday, July 22, 2014 3:43 AM > To: OpenStack Development Mailing List (not for usage questions) > Subject: Re: [openstack-dev] [Neutron][LBaaS] TLS capability - > certificates data persistency > &

Re: [openstack-dev] [Neutron][LBaaS] TLS capability - certificates data persistency

2014-07-22 Thread Samuel Bercovici
(not for usage questions) Subject: Re: [openstack-dev] [Neutron][LBaaS] TLS capability - certificates data persistency Evgeny-- The only reason I see for storing certificate information in Neutron (and not private key information-- just the certificate) is to aid in presenting UI information to

Re: [openstack-dev] [Neutron][LBaaS] TLS capability - certificates data persistency

2014-07-21 Thread Stephen Balukoff
Evgeny-- The only reason I see for storing certificate information in Neutron (and not private key information-- just the certificate) is to aid in presenting UI information to the user. Especially GUI users don't care about a certificate's UUID, they care about which hostnames it's valid for. Yes

[openstack-dev] [Neutron][LBaaS] TLS capability - certificates data persistency

2014-07-20 Thread Evgeny Fedoruk
Hi folks, In a current version of TLS capabilities RST certificate SubjectCommonName and SubjectAltName information is cached in a database. This may be not necessary and here is why: 1. TLS containers are immutable, meaning once a container was associated to a listener and was validated