You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hey Folks, Firstly thanks for the google-cas-issuer this really simplifies our integration with Google CAS.
While trialing this we observed the following behavior while revoking certificates
if I revoke the certificate that was issued by CAS to cert-manager from the CAS console the issuer doesn't know about it. I am guessing there is no event stream or check to ascertain if the cert is still valid? Just wanted to check if it was on the roadmap or any high level plan for revocation to be handled. A workaround for me would be to set the TTL of the cert to super low ( which will start hitting api aggressively ) but it will minimize the risk with revocation.
After revocation when I delete the certificate object google-cas-issuer starts spitting out errors like below
thing to note is if i just delete the secret, cert-manager gets a new certificate from CAS. so maybe just delete the secret to rotate / revoke the cert?
When I delete the secret cert-manager gets a new cert issued via CAS but leaves the old certificate as is in the CAS issued-certificates list. I have to manually revoke it.
Overall would like to understand what is the best way to handle revocation gracefully via cert-manager.
Thanks
The text was updated successfully, but these errors were encountered:
This is more of a question for upstream cert-manager. Currently there's no support for revocation, although the feature request has been floated before. The current recommendation is to set certificate lifetimes to a short duration. It would be interesting to learn about your use case for revocation to add some weight to the issue, come chat with us in the #cert-manager channel on Kubernetes slack or our community meetings!
In a future release, the issuer should be able to detect the revocation of the root or intermediate CA. We're just waiting for the Google CAS API to be finalised before implementing this.
That's looks like a bug, a deleted certificate has got stuck in the reconcile loop. I'll double check that. To force a renwal of an existing certificate you can use our kubectl plugin (or delete the secret): https://cert-manager.io/docs/usage/kubectl-plugin/
Hey Folks, Firstly thanks for the
google-cas-issuer
this really simplifies our integration with Google CAS.While trialing this we observed the following behavior while revoking certificates
if I revoke the certificate that was issued by CAS to
cert-manager
from the CAS console the issuer doesn't know about it. I am guessing there is no event stream or check to ascertain if the cert is still valid? Just wanted to check if it was on the roadmap or any high level plan for revocation to be handled. A workaround for me would be to set the TTL of the cert to super low ( which will start hitting api aggressively ) but it will minimize the risk with revocation.After revocation when I delete the
certificate
objectgoogle-cas-issuer
starts spitting out errors like belowthing to note is if i just delete the secret,
cert-manager
gets a new certificate from CAS. so maybe just delete the secret to rotate / revoke the cert?cert-manager
gets a new cert issued via CAS but leaves the old certificate as is in the CAS issued-certificates list. I have to manually revoke it.Overall would like to understand what is the best way to handle revocation gracefully via cert-manager.
Thanks
The text was updated successfully, but these errors were encountered: