-
Notifications
You must be signed in to change notification settings - Fork 166
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DRAFT] RFC: Add certificate compression to EVE API #4552
Comments
Questions:
|
we are getting a lot of resources in API but we need to send a signed request in AuthhContainer to do so. GET request doesn't have body. we could use arguments like
No, it is for body encoding. In our case it is a |
That is kind of what I am asking. Our API is complex for good reasons, includes authcontainer etc. For something like this, does it have to be? From a different angle. If I didn't know about the EVE API, and someone came to me and said, "I need to expose an API endpoint to send certificates, and there are options to give it compression, how would I do it?" My answer immediately would be:
Could be you are saying that this has to be under the EVE API structure for good reasons. OK, then my points aren't relevant. But worth asking. |
cwe cannot use Accept header, we use it to indecate response format which is already application/x-proto-binary and we need to maintain backward compatibility. I agree that we do not need |
although it happens only once or twice during bootup, the /certs API data. |
@naiming-zededa it is not yet TLS compression, it is a similar approach for /cert endpoint which may be called much often if controller rotate certificates. to track TLS compression issue I created another issue #4545 @deitch I updated the proposal |
This is the request that I see from EVE. |
@deitch it seems it can be done using other header field |
@rucoder to be clear, I wasn't pushing for, "we really have to make this whole thing RESTful no matter what." It was more of a, "we have a lot of complexity in many places, and if this endpoint can be cleaner and more standardized, let's do it; if not, fine, at least we spent 5 mins thinking about it." But if we can encode the format in the request in a standard way, all the better. |
Problem description
Currently /cert endpoint send all available certificates at once and doesn't use any compression. Certificate chain may be very big and consume a lot of network traffic.
Proposed change
Introduce aPOST /api/v2/edgeDevice/certs
with following contentcompression
field in ZCertAttr structureClient behavior
POST is the preferable method to request certificates. The client SHOULD use this method firstIf POST return "unsupported request" the client falls back toGET
request.Controller behavior
GET URL parametersZCertRequest
structureController MUST NOT send compressed certificate ifGET
method is usedTODO
/cert
clarification2.
How do we sign AuthContainer ? With onboarding cert first and then with device cert like any other messages?The text was updated successfully, but these errors were encountered: