test: copy some config-next settings to config (#8116)

Methodology:

 - Copy test/config-next/* to test/config/.
 - Review the diff, reverting things that should stay `next`-only.
 - When in doubt, check against prod configs (e.g. for feature flags).

In the process I noticed that config for the TCP prober in `observer`
had been added to test/config but not test/config-next, so I ported it
forward (and my IDE stripped some trailing spaces in both versions).
This commit is contained in:
Jacob Hoffman-Andrews 2025-04-21 13:54:31 -07:00 committed by GitHub
parent c95ab5c75f
commit 726b3c91e8
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
13 changed files with 63 additions and 64 deletions

View File

@ -90,3 +90,8 @@ monitors:
url: http://letsencrypt.org/foo url: http://letsencrypt.org/foo
rcodes: [200, 404] rcodes: [200, 404]
useragent: "letsencrypt/boulder-observer-http-client" useragent: "letsencrypt/boulder-observer-http-client"
-
period: 10s
kind: TCP
settings:
hostport: acme-v02.api.letsencrypt.org:443

View File

@ -1,6 +1,5 @@
{ {
"ca": { "ca": {
"debugAddr": ":8001",
"tls": { "tls": {
"caCertFile": "test/certs/ipki/minica.pem", "caCertFile": "test/certs/ipki/minica.pem",
"certFile": "test/certs/ipki/ca.boulder/cert.pem", "certFile": "test/certs/ipki/ca.boulder/cert.pem",
@ -54,7 +53,6 @@
"hostOverride": "sa.boulder" "hostOverride": "sa.boulder"
}, },
"issuance": { "issuance": {
"defaultCertificateProfileName": "legacy",
"certProfiles": { "certProfiles": {
"legacy": { "legacy": {
"allowMustStaple": true, "allowMustStaple": true,
@ -179,11 +177,10 @@
"serialPrefixHex": "6e", "serialPrefixHex": "6e",
"maxNames": 100, "maxNames": 100,
"lifespanOCSP": "96h", "lifespanOCSP": "96h",
"goodkey": { "goodkey": {},
"fermatRounds": 100
},
"ocspLogMaxLength": 4000, "ocspLogMaxLength": 4000,
"ocspLogPeriod": "500ms", "ocspLogPeriod": "500ms",
"ctLogListFile": "test/ct-test-srv/log_list.json",
"features": {} "features": {}
}, },
"pa": { "pa": {

View File

@ -5,9 +5,6 @@
"maxOpenConns": 10 "maxOpenConns": 10
}, },
"hostnamePolicyFile": "test/hostname-policy.yaml", "hostnamePolicyFile": "test/hostname-policy.yaml",
"goodkey": {
"fermatRounds": 100
},
"workers": 16, "workers": 16,
"unexpiredOnly": true, "unexpiredOnly": true,
"badResultsOnly": true, "badResultsOnly": true,
@ -17,8 +14,10 @@
], ],
"ignoredLints": [ "ignoredLints": [
"w_subject_common_name_included", "w_subject_common_name_included",
"w_ext_subject_key_identifier_missing_sub_cert",
"w_ext_subject_key_identifier_not_recommended_subscriber" "w_ext_subject_key_identifier_not_recommended_subscriber"
] ],
"ctLogListFile": "test/ct-test-srv/log_list.json"
}, },
"pa": { "pa": {
"challenges": { "challenges": {

View File

@ -2,21 +2,15 @@
"syslog": { "syslog": {
"stdoutLevel": 7 "stdoutLevel": 7
}, },
"debugAddr": ":8016", "openTelemetry": {
"endpoint": "bjaeger:4317",
"sampleratio": 1
},
"files": [ "files": [
"/var/log/akamai-purger.log", "/var/log/akamai-purger.log",
"/var/log/bad-key-revoker.log", "/var/log/bad-key-revoker.log",
"/var/log/boulder-ca.log", "/var/log/boulder-*.log",
"/var/log/boulder-observer.log", "/var/log/crl-*.log",
"/var/log/boulder-publisher.log",
"/var/log/boulder-ra.log",
"/var/log/boulder-remoteva.log",
"/var/log/boulder-sa.log",
"/var/log/boulder-va.log",
"/var/log/boulder-wfe2.log",
"/var/log/sfe.log",
"/var/log/crl-storer.log",
"/var/log/crl-updater.log",
"/var/log/nonce-service.log", "/var/log/nonce-service.log",
"/var/log/ocsp-responder.log" "/var/log/ocsp-responder.log"
] ]

View File

@ -1,5 +1,4 @@
--- ---
debugaddr: :8040
buckets: [.001, .002, .005, .01, .02, .05, .1, .2, .5, 1, 2, 5, 10] buckets: [.001, .002, .005, .01, .02, .05, .1, .2, .5, 1, 2, 5, 10]
syslog: syslog:
stdoutlevel: 6 stdoutlevel: 6
@ -38,6 +37,7 @@ monitors:
settings: settings:
url: https://letsencrypt.org url: https://letsencrypt.org
rcodes: [200] rcodes: [200]
useragent: "letsencrypt/boulder-observer-http-client"
- -
period: 5s period: 5s
kind: DNS kind: DNS
@ -89,6 +89,7 @@ monitors:
settings: settings:
url: http://letsencrypt.org/foo url: http://letsencrypt.org/foo
rcodes: [200, 404] rcodes: [200, 404]
useragent: "letsencrypt/boulder-observer-http-client"
- -
period: 10s period: 10s
kind: TCP kind: TCP

View File

@ -20,10 +20,8 @@
"test/certs/webpki/root-ecdsa.cert.pem" "test/certs/webpki/root-ecdsa.cert.pem"
] ]
], ],
"debugAddr": ":8009",
"grpc": { "grpc": {
"maxConnectionAge": "30s", "maxConnectionAge": "30s",
"address": ":9091",
"services": { "services": {
"Publisher": { "Publisher": {
"clientNames": [ "clientNames": [

View File

@ -1,6 +1,5 @@
{ {
"ra": { "ra": {
"rateLimitPoliciesFilename": "test/rate-limit-policies.yml",
"limiter": { "limiter": {
"redis": { "redis": {
"username": "boulder-wfe", "username": "boulder-wfe",
@ -28,10 +27,7 @@
"maxContactsPerRegistration": 3, "maxContactsPerRegistration": 3,
"debugAddr": ":8002", "debugAddr": ":8002",
"hostnamePolicyFile": "test/hostname-policy.yaml", "hostnamePolicyFile": "test/hostname-policy.yaml",
"maxNames": 100, "goodkey": {},
"goodkey": {
"fermatRounds": 100
},
"issuerCerts": [ "issuerCerts": [
"test/certs/webpki/int-rsa-a.cert.pem", "test/certs/webpki/int-rsa-a.cert.pem",
"test/certs/webpki/int-rsa-b.cert.pem", "test/certs/webpki/int-rsa-b.cert.pem",
@ -44,17 +40,20 @@
"legacy": { "legacy": {
"pendingAuthzLifetime": "168h", "pendingAuthzLifetime": "168h",
"validAuthzLifetime": "720h", "validAuthzLifetime": "720h",
"orderLifetime": "168h" "orderLifetime": "168h",
"maxNames": 100
}, },
"modern": { "modern": {
"pendingAuthzLifetime": "7h", "pendingAuthzLifetime": "7h",
"validAuthzLifetime": "7h", "validAuthzLifetime": "7h",
"orderLifetime": "7h" "orderLifetime": "7h",
"maxNames": 10
}, },
"shortlived": { "shortlived": {
"pendingAuthzLifetime": "7h", "pendingAuthzLifetime": "7h",
"validAuthzLifetime": "7h", "validAuthzLifetime": "7h",
"orderLifetime": "7h" "orderLifetime": "7h",
"maxNames": 10
} }
}, },
"defaultProfileName": "legacy", "defaultProfileName": "legacy",
@ -125,15 +124,14 @@
}, },
"grpc": { "grpc": {
"maxConnectionAge": "30s", "maxConnectionAge": "30s",
"address": ":9094",
"services": { "services": {
"ra.RegistrationAuthority": { "ra.RegistrationAuthority": {
"clientNames": [ "clientNames": [
"admin.boulder", "admin.boulder",
"bad-key-revoker.boulder", "bad-key-revoker.boulder",
"ocsp-responder.boulder", "ocsp-responder.boulder",
"sfe.boulder", "wfe.boulder",
"wfe.boulder" "sfe.boulder"
] ]
}, },
"ra.SCTProvider": { "ra.SCTProvider": {
@ -149,8 +147,10 @@
} }
}, },
"features": { "features": {
"UseKvLimitsForNewOrder": true, "AutomaticallyPauseZombieClients": true,
"IncrementRateLimits": true "NoPendingAuthzReuse": true,
"EnforceMPIC": true,
"UnsplitIssuance": true
}, },
"ctLogs": { "ctLogs": {
"stagger": "500ms", "stagger": "500ms",

View File

@ -6,7 +6,7 @@
"dnsProvider": { "dnsProvider": {
"dnsAuthority": "consul.service.consul", "dnsAuthority": "consul.service.consul",
"srvLookup": { "srvLookup": {
"service": "dns", "service": "doh",
"domain": "service.consul" "domain": "service.consul"
} }
}, },
@ -39,7 +39,9 @@
} }
} }
}, },
"features": {}, "features": {
"DOH": true
},
"accountURIPrefixes": [ "accountURIPrefixes": [
"http://boulder.service.consul:4000/acme/reg/", "http://boulder.service.consul:4000/acme/reg/",
"http://boulder.service.consul:4001/acme/acct/" "http://boulder.service.consul:4001/acme/acct/"

View File

@ -6,7 +6,7 @@
"dnsProvider": { "dnsProvider": {
"dnsAuthority": "consul.service.consul", "dnsAuthority": "consul.service.consul",
"srvLookup": { "srvLookup": {
"service": "dns", "service": "doh",
"domain": "service.consul" "domain": "service.consul"
} }
}, },
@ -39,7 +39,9 @@
} }
} }
}, },
"features": {}, "features": {
"DOH": true
},
"accountURIPrefixes": [ "accountURIPrefixes": [
"http://boulder.service.consul:4000/acme/reg/", "http://boulder.service.consul:4000/acme/reg/",
"http://boulder.service.consul:4001/acme/acct/" "http://boulder.service.consul:4001/acme/acct/"

View File

@ -6,7 +6,7 @@
"dnsProvider": { "dnsProvider": {
"dnsAuthority": "consul.service.consul", "dnsAuthority": "consul.service.consul",
"srvLookup": { "srvLookup": {
"service": "dns", "service": "doh",
"domain": "service.consul" "domain": "service.consul"
} }
}, },
@ -39,7 +39,9 @@
} }
} }
}, },
"features": {}, "features": {
"DOH": true
},
"accountURIPrefixes": [ "accountURIPrefixes": [
"http://boulder.service.consul:4000/acme/reg/", "http://boulder.service.consul:4000/acme/reg/",
"http://boulder.service.consul:4001/acme/acct/" "http://boulder.service.consul:4001/acme/acct/"

View File

@ -8,8 +8,13 @@
"dbConnectFile": "test/secrets/sa_ro_dburl", "dbConnectFile": "test/secrets/sa_ro_dburl",
"maxOpenConns": 100 "maxOpenConns": 100
}, },
"incidentsDB": {
"dbConnectFile": "test/secrets/incidents_dburl",
"maxOpenConns": 100
},
"ParallelismPerRPC": 20, "ParallelismPerRPC": 20,
"debugAddr": ":8003", "debugAddr": ":8003",
"lagFactor": "200ms",
"tls": { "tls": {
"caCertFile": "test/certs/ipki/minica.pem", "caCertFile": "test/certs/ipki/minica.pem",
"certFile": "test/certs/ipki/sa.boulder/cert.pem", "certFile": "test/certs/ipki/sa.boulder/cert.pem",
@ -25,18 +30,15 @@
"ca.boulder", "ca.boulder",
"crl-updater.boulder", "crl-updater.boulder",
"expiration-mailer.boulder", "expiration-mailer.boulder",
"ocsp-responder.boulder", "ra.boulder"
"ra.boulder",
"wfe.boulder"
] ]
}, },
"sa.StorageAuthorityReadOnly": { "sa.StorageAuthorityReadOnly": {
"clientNames": [ "clientNames": [
"admin.boulder", "admin.boulder",
"crl-updater.boulder",
"ocsp-responder.boulder", "ocsp-responder.boulder",
"sfe.boulder", "wfe.boulder",
"wfe.boulder" "sfe.boulder"
] ]
}, },
"grpc.health.v1.Health": { "grpc.health.v1.Health": {
@ -48,7 +50,6 @@
} }
}, },
"features": { "features": {
"UseKvLimitsForNewOrder": true,
"MultipleCertificateProfiles": true, "MultipleCertificateProfiles": true,
"InsertAuthzsIndividually": true "InsertAuthzsIndividually": true
} }

View File

@ -6,7 +6,7 @@
"dnsProvider": { "dnsProvider": {
"dnsAuthority": "consul.service.consul", "dnsAuthority": "consul.service.consul",
"srvLookup": { "srvLookup": {
"service": "dns", "service": "doh",
"domain": "service.consul" "domain": "service.consul"
} }
}, },
@ -38,7 +38,9 @@
} }
} }
}, },
"features": {}, "features": {
"DOH": true
},
"remoteVAs": [ "remoteVAs": [
{ {
"serverAddress": "rva1.service.consul:9397", "serverAddress": "rva1.service.consul:9397",
@ -62,7 +64,6 @@
"rir": "ARIN" "rir": "ARIN"
} }
], ],
"maxRemoteValidationFailures": 1,
"accountURIPrefixes": [ "accountURIPrefixes": [
"http://boulder.service.consul:4000/acme/reg/", "http://boulder.service.consul:4000/acme/reg/",
"http://boulder.service.consul:4001/acme/acct/" "http://boulder.service.consul:4001/acme/acct/"

View File

@ -1,5 +1,6 @@
{ {
"wfe": { "wfe": {
"timeout": "30s",
"listenAddress": "0.0.0.0:4001", "listenAddress": "0.0.0.0:4001",
"TLSListenAddress": "0.0.0.0:4431", "TLSListenAddress": "0.0.0.0:4431",
"serverCertificatePath": "test/certs/ipki/boulder/cert.pem", "serverCertificatePath": "test/certs/ipki/boulder/cert.pem",
@ -100,8 +101,6 @@
] ]
], ],
"staleTimeout": "5m", "staleTimeout": "5m",
"authorizationLifetimeDays": 30,
"pendingAuthorizationLifetimeDays": 7,
"limiter": { "limiter": {
"redis": { "redis": {
"username": "boulder-wfe", "username": "boulder-wfe",
@ -127,9 +126,7 @@
"Overrides": "test/config/wfe2-ratelimit-overrides.yml" "Overrides": "test/config/wfe2-ratelimit-overrides.yml"
}, },
"features": { "features": {
"UseKvLimitsForNewOrder": true,
"ServeRenewalInfo": true, "ServeRenewalInfo": true,
"IncrementRateLimits": true,
"CheckIdentifiersPaused": true "CheckIdentifiersPaused": true
}, },
"certProfiles": { "certProfiles": {