Skip to content

vpnaas: add support for more ciphers (auth, encryption, pfs modes)#1851

Merged
kayrus merged 4 commits intoterraform-provider-openstack:mainfrom
bpetermannS11:vpnaas-more-ciphers
May 2, 2025
Merged

vpnaas: add support for more ciphers (auth, encryption, pfs modes)#1851
kayrus merged 4 commits intoterraform-provider-openstack:mainfrom
bpetermannS11:vpnaas-more-ciphers

Conversation

@bpetermannS11
Copy link
Copy Markdown
Contributor

For VPNaaS IKE policies and IPSEC policies several choices for encryption algorithms, auth algorithms and PFS modes have been added.

Encryption algorithms: add AES CCM mode and AES GCM mode variants for 128/192/256 bit keys and 8/12/16 octet ICVs. Add AES CTR modes for 128/192/256 bit keys.
Auth algorithms: add aes-xcbc and aes-cmac.
PFS: add Diffie Hellman groups 15 to 31.

Requires updating gophercloud to v2.7.0.

Closes: #1850

@kayrus
Copy link
Copy Markdown
Collaborator

kayrus commented Apr 28, 2025

@bpetermannS11 thanks for the PR. can you update the docs to reflect the added ciphers?

@kayrus
Copy link
Copy Markdown
Collaborator

kayrus commented Apr 29, 2025

@bpetermannS11 can you rebase on main?

Copy link
Copy Markdown
Collaborator

@kayrus kayrus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I just realized that resourceIPSecPolicyV2EncryptionAlgorithm, resourceIPSecPolicyV2AuthAlgorithm and resourceIPSecPolicyV2PFS and other functions are not used in the arguments schema to check the validity.

Can you convert these functions into a format, which matches the ValidateFunc and use it there? This will allow to catch human error on early stage.

For VPNaaS IKE policies and IPSEC policies several choices for
encryption algorithms, auth algorithms and PFS modes have been
added.

Encryption algorithms: add AES CCM mode and AES GCM mode variants
for 128/192/256 bit keys and 8/12/16 octet ICVs. Add AES CTR modes
for 128/192/256 bit keys.
Auth algorithms: add aes-xcbc and aes-cmac.
PFS: add Diffie Hellman groups 15 to 31.

Closes: terraform-provider-openstack#1850
Encryption algorithms: add AES CCM mode and AES GCM mode variants
for 128/192/256 bit keys and 8/12/16 octet ICVs. Add AES CTR modes
for 128/192/256 bit keys.
Auth algorithms: add aes-xcbc and aes-cmac.
PFS: add Diffie Hellman groups 15 to 31.
Validate auth_algorithm, encryption_algorithm, pfs arguments
of ipsec policies and ike policies. Use the same maps for validation
and for mapping the input string.
@kayrus kayrus force-pushed the vpnaas-more-ciphers branch from 9ad8d96 to 32374da Compare May 2, 2025 08:33
Copy link
Copy Markdown
Collaborator

@kayrus kayrus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks! I adjusted validation funcs in a simpler way.

@kayrus kayrus merged commit 3469d0e into terraform-provider-openstack:main May 2, 2025
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Feature: vpnaas: add support for more ciphers (auth, encryption, pfs modes)

2 participants