Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Re-implement DNSSEC chain-of-trust test in EKS brokerpak #3751

Open
1 task
mogul opened this issue Mar 22, 2022 · 0 comments
Open
1 task

Re-implement DNSSEC chain-of-trust test in EKS brokerpak #3751

mogul opened this issue Mar 22, 2022 · 0 comments

Comments

@mogul
Copy link
Contributor

mogul commented Mar 22, 2022

User Story

In order to reliably verify that DNSSEC is configured properly for provisioned instances, the data.gov team wants to reimplement the delv-based test in the EKS brokerpak.

Acceptance Criteria

[ACs should be clearly demoable/verifiable whenever possible. Try specifying them using BDD.]

  • WHEN I run the datagov-brokerpak-eks tests
    THEN I see a test for DNSSEC configuration is invoked
    AND the test passes

Background

Our existing delv-based test cannot validate our DNSSEC configuration, even though it's clearly correct when we use external tools to check it. We have commented out that test in order to get the branch merged. This issue captures the need to resolve this technical debt.

Security Considerations (required)

[Any security concerns that might be implicated in the change. "None" is OK, just be explicit here!]

Sketch

[Notes or a checklist reflecting our understanding of the selected approach]

mogul added a commit to GSA-TTS/datagov-brokerpak-eks that referenced this issue Mar 22, 2022
mogul added a commit to GSA-TTS/datagov-brokerpak-eks that referenced this issue Mar 22, 2022
@btylerburton btylerburton moved this from 📥 Queue to 🧊 Icebox in data.gov team board Oct 10, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: 🧊 Icebox
Development

No branches or pull requests

1 participant