-
Notifications
You must be signed in to change notification settings - Fork 133
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SNOW-1825607 Initial OCSP deprecation plan steps #973
Conversation
It seems like the node.js driver does not have the use case that the responder URL does not exist according to the code: snowflake-connector-nodejs/lib/agent/check.js Line 176 in bada542
|
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #973 +/- ##
==========================================
- Coverage 88.96% 88.94% -0.03%
==========================================
Files 70 70
Lines 6825 6830 +5
==========================================
+ Hits 6072 6075 +3
- Misses 753 755 +2 ☔ View full report in Codecov by Sentry. |
What you mentioned is not a responder URL - it is a cache server URL. Responder URL is provided in each certificate. |
OCSP Responder url != OCSP Cache URL. The (default) OCSP Cache URL is always the same, by default, However OCSP Responder URL is not from Snowflake. It is always hardcoded into the particular certificate, which is under verification. See this random cert as an example: https://crt.sh/?sha256=9c3f2fd11c57d7c649ad5a0932c0f0d29756f6a0a1c74c43e1e89a62d64cd320
It does not have OCSP endpoint. The driver today will complain if it encounters such certs which doesn't have the OCSP endpoint, because the driver expects the cert to have it. See this issue what exactly happens: #932 As a comparison, here's a cert which does have OCSP endpoint: https://crt.sh/?id=12092745633
(this section is missing from the first cert) The goal here, is for the driver if encountering a cert without the said OCSP endpoint, then it should just log the debug-level message and gracefully continue as if the verification was successful. edit: I see Piotr also pointed the same out while I was typing this message :) |
Hi @sfc-gh-ext-simba-jy. Because we are planning to release the BCR in the next version, we have an option to remove the old parameter entirely, not only to set it deprecated. Could you make changes to the PR? |
@sfc-gh-pmotacki, I removed the old option (insecureConnect). Please have a look. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Description
Please explain the changes you made here.
Updated: the driver will log the debug message and return callback with null if the OCSP status is FAIL_OPEN. If the status is FAIL_CLOSED, the driver will log the error message and return callback with the error.
disableOCSPChecks
introduced?insecureMode
?disableOCSPChecks
has precedence?Checklist
npm run lint:check -- CHANGED_FILES
and fix problems in changed code)npm run test:unit
andnpm run test:integration
)