Skip to content

Fixing flaky keystore tests due to RSA 4096 keygen latency#58138

Merged
eriktate merged 1 commit intomasterfrom
eriktate/fix-flaky-rsa4096-tests
Aug 20, 2025
Merged

Fixing flaky keystore tests due to RSA 4096 keygen latency#58138
eriktate merged 1 commit intomasterfrom
eriktate/fix-flaky-rsa4096-tests

Conversation

@eriktate
Copy link
Copy Markdown
Contributor

Because recording encryption generates RSA 4096 keypairs, the software keystore backend can be flaky due to the massive overhead driving up latency. This PR parses a pre-generated RSA 4096 keypair to improve test timings.

@github-actions github-actions Bot requested review from aadc-dev and nklaassen August 20, 2025 16:23
@eriktate eriktate added the no-changelog Indicates that a PR does not require a changelog entry label Aug 20, 2025
@eriktate eriktate added this pull request to the merge queue Aug 20, 2025
Merged via the queue into master with commit f8dbf42 Aug 20, 2025
42 of 43 checks passed
@eriktate eriktate deleted the eriktate/fix-flaky-rsa4096-tests branch August 20, 2025 17:28
eriktate added a commit that referenced this pull request Aug 26, 2025
eriktate added a commit that referenced this pull request Aug 27, 2025
eriktate added a commit that referenced this pull request Sep 2, 2025
eriktate added a commit that referenced this pull request Sep 2, 2025
eriktate added a commit that referenced this pull request Sep 2, 2025
eriktate added a commit that referenced this pull request Sep 3, 2025
github-merge-queue Bot pushed a commit that referenced this pull request Sep 3, 2025
* adding support for encryption/decryption keys to keystore manager (#54428, #55652)

* adds new protos for resources related to encrypted session recordings and updates the existing SessionRecordingConfig protos to include a Status (#54780)

* adding local service implementation for recording encryption resources (#54816)

* adding Manager for RecordingEncryption resources that handles shared ops more complex than CRUD (#55078)

* Adding session recording plugin for `age` (#55120)

* adding Manager for RecordingEncryption resources that handles shared ops more complex than CRUD

* adding age plugin wrapping default X25519 Identity/Recipient implementation with hooks to more efficiently lookup private keys given their respective public key

* Adding recording encryption and playback for `sync` modes (#54901)

* adding cache for RecordingEncryption (#55857)

* adding recording_encryption service protos (#55121)

* adding async recording encryption with gRPC multipart uploader (#55859)

* adding file configuration for encrypted session recording (#56200)

* Switching recording encryption to unwrap keys using direct keystore RSA decryption (#56776)

* adding manual key management config (#56920)

* updating protos for recording encryption (#57055)

* Add missing handling for recording encryption configs and keys (#57279)

* updating protos for recording encryption

* changing labels for encryption keys to prevent automatic cleanup, adjusting pkcs11 host UUID check to allow for key sharing of encryption keys, preventing cloud tenants from enabling manual key management, preventing use of recording encryption in FIPS mode

* adding new protos for rotated keys and the local service for interacting (#57576)

with them

* Switching encryption keys from PEM to ASN.1 DER encoding (#58137)

* using pregenerated RSA4096 key for keystore tests because generation is too slow (#58138)

* extending precomputed RSA keys to support 4096-bit keys (#58251)

* adding rotation process to Manager and exposing with new RPCs and (#57577)

* adding rotation sub commands for recording encryption keys and fixing (#57780)

broken session_recording_config when using fileconf

* using more reliable method of validating key bit length
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

no-changelog Indicates that a PR does not require a changelog entry size/sm

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants