Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

system/trust: Read certificates from filesystem #8279

Open
2 tasks done
Monviech opened this issue Feb 3, 2025 · 0 comments
Open
2 tasks done

system/trust: Read certificates from filesystem #8279

Monviech opened this issue Feb 3, 2025 · 0 comments
Assignees
Labels
feature Adding new functionality

Comments

@Monviech
Copy link
Member

Monviech commented Feb 3, 2025

Important notices

Before you add a new report, we ask you kindly to acknowledge the following:

Is your feature request related to a problem? Please describe.

Some plugins store ACME certificates on disk, e.g. OPNWAF (Apache) or Caddy.

It would be nice if these certificates could be displayed inside "Trust: Certificates" and emitted via API so they can be consumed via the Certificates Dashboard widget.

Describe the solution you like

  • Including the information that the plugin has ACME Certificates in the filesystem, e.g. by using plugins.inc to emit:

    • The paths (multiple paths possible) the certificates are stored in (so they can be recursively read by a script)
    • Name of the Application (e.g. OPNWAF/ Caddy / ACME etc...)
    • Maybe which files or folder names to skip (e.g. files ending with *.key or a folder named *custom) during recursion.
  • A script reads the certificates from disk and together with the information from plugins.inc, displays them in "Trust: Certificates"

    • Command buttons that can edit/delete/clone the certificates should not be available
    • Certificates should be marked as automatic, and the plugin they came from
    • These certificates should not be selectable in certificate field types
    • The certificates should not be imported into the trust store, just displayed in the existing bootgrid
    • (Maybe) They could be downloadable, and information displayed when the commands are executed, though this would also include the need of private key parsing etc... might make the scope too big.
  • The Certificate API should emit these certificates in the same manner as the existing ones, so they can be consumed by the Certificates Widget and the Certificate GUI pages.

@Monviech Monviech added the feature Adding new functionality label Feb 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature Adding new functionality
Development

No branches or pull requests

2 participants