-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Supporting CRL #77
Comments
It appears we do not. I believe this is the line that is failing: https://github.com/joe-elliott/cert-exporter/blob/master/src/exporters/certHelpers.go#L61 If go has a method for parsing the CRL format perhaps we could add it here. Are you able to submit a PR? |
Thanks for your quick answer! I can't submit a PR at the moment, I was looking for an already implemented way to do it. It could be an enhancement then ... but I doubt I'll have the opportunity to provide a solution, sorry :/ |
It appears that there is support in Go for parsing CRL: https://golang.org/pkg/crypto/x509/#ParseCRL but looking at the return value I'm not sure what'd you want reported out of this? |
No it won't do ... I hoped to get the expiry time out of such a parser, but I can't find one in this list. The thing is that if the CRL expires, all certs will be blocked temporarily unless CRL is regenerated. Not revoked, but still blocked. Which is really annoying when in production as you can imagine :/ |
Hey, ParseRecovationList and its type RevocationList (there the attribute NextUpdate) should solve this. If NextUpdate is smaller than current time the CRL is expired. I am currently looking for a solution to this problem as well and came across this issue - not using cert-exporter myself for the moment. |
If either of you is able to put together a PR to add this ability to cert-exporter, I would be happy to merge. I personally don't have the environment to test these changes or understand what a valuable solution would look like. If neither of you feel comfortable with Go maybe you could coach me through the change? |
Hey, I am happy to provide a few files to make tests possible for you. I have attached a TGZ file that contains nginx-test.yaml and ca-secret.yaml. They can be directly applied to a cluster and apply into namespace default. A running ingress-nginx is needed to actually show the working Client Authentication (this is configured using annotations for the Ingress). Unfortunately I can't add the TGZ file and I had to rename the yaml files to .txt In case you need any more information I am happy to provide them. |
Hi,
Does cert-exporter supports CRL (Certificate Revocation List) ?
I tried it using 2 ways :
I created my Secret with
As a result in cert-exporter Pod, I got the following logs :
💡 The ca.crt of my CA Secret is successfully recognized by cert-exporter.
I created my Secret with
As a result in cert-exporter Pod, I got the following logs :
My cert-exporter deployment is
A CRL format looks like
Thanks for your help!
The text was updated successfully, but these errors were encountered: