Skip to content

[Platform] Detect and fix certificates with potentially inaccessible keys on Mac OS (3.1) #17581

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Jan 16, 2020

Conversation

javiercn
Copy link
Member

@javiercn javiercn commented Dec 4, 2019

Description

We are signing the SDK installer and packages for Mac OS Catalina compliance with the requirement to have packages notarized. That change affects the way HTTPS works in ASP.NET Core and prevents users from running their ASP.NET Core applications.

To mitigate the issue we are including logic in Kestrel that detects this situation and informs customers of what steps to take to mitigate the issue and we are updating the "dotnet dev-certs" tool to detect when this situation can happen and to fix it automatically when the "dotnet dev-certs https" command is run.

Customer Impact

High

Once a customer installs an updated SDK version they won't be able to run their applications normally unless they fix the existing certificate.

Regression?

No, this is a new requirement introduced by Mac OS Catalina.

Risk

Low, this only includes changes in the tooling, the runtime changes were made for 3.1

Implementation details

  • This is just a port of the tooling changes in 3.1

@javiercn javiercn added the feature-platform Deprecated: Cross-cutting issues related to ASP.NET Core as a platform label Dec 4, 2019
@javiercn javiercn requested a review from Pilchie December 4, 2019 13:08
@javiercn javiercn force-pushed the javiercn/https-mac-os-31 branch from 55797bf to 36bdd51 Compare December 4, 2019 16:30
@javiercn
Copy link
Member Author

javiercn commented Dec 4, 2019

@aspnet/build There seems to be an issue here with the builds on the CI not even starting

@javiercn javiercn added the Servicing-consider Shiproom approval is required for the issue label Dec 4, 2019
@javiercn javiercn marked this pull request as ready for review December 4, 2019 17:50
@mkArtakMSFT mkArtakMSFT added this to the 3.1.x milestone Dec 5, 2019
@jamshedd jamshedd added Servicing-approved Shiproom has approved the issue and removed Servicing-consider Shiproom approval is required for the issue labels Dec 10, 2019
@jamshedd jamshedd modified the milestones: 3.1.x, 3.1.2 Dec 10, 2019
@vivmishra
Copy link

Moved to Mar as per Tactics. Will need to be explicitly approved for Feb, if required.

@vivmishra vivmishra modified the milestones: 3.1.2, 3.1.3 Jan 9, 2020
@javiercn
Copy link
Member Author

/AzurePipelines run AspNetCore-ci

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@Pilchie
Copy link
Member

Pilchie commented Jan 15, 2020

Updating back to 3.1.2.

@Pilchie Pilchie modified the milestones: 3.1.3, 3.1.2 Jan 15, 2020
@javiercn
Copy link
Member Author

/AzurePipelines run AspNetCore-ci

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@dougbu
Copy link
Contributor

dougbu commented Jan 16, 2020

/azp run aspnetcore-ci

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@mkArtakMSFT mkArtakMSFT merged commit 8e5767b into release/3.1 Jan 16, 2020
@mkArtakMSFT mkArtakMSFT deleted the javiercn/https-mac-os-31 branch January 16, 2020 18:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature-platform Deprecated: Cross-cutting issues related to ASP.NET Core as a platform Servicing-approved Shiproom has approved the issue
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants