-
Notifications
You must be signed in to change notification settings - Fork 691
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Distroless container doesn't have the kill cmd #199
Comments
Maybe implement it in the controller itself (or a helper CLI as e.g. That way we can currently implement it ~crudely via |
Nice idea. Some practicalities: how would |
Yep, it is - just as we currently have documented it :tada+troll: Couple thoughts:
i.e. check that
I wouldn't move forward that Kube-unfriendly path IMO, we should rather |
yeah, I'd love a declarative approach. what if we just had a flag/env:
(the we can feed it via a CM, because it's easier to fiddle with kustomize than args I guess) Can you think of a better name than
do we need that? We should emit an |
BTW, about:
Once we have this we can use the same machinery to check whether to rotate based on absolute cut-off time or period (cut-off time relative to the creation time of the latest active secret) |
if we do that, should we just kill the SIGUSR1 feature (no pun intended) |
maybe using the well-known TTL acronym for something like
Missed the fact that we can peek on the priv key timestamp,
+1 |
hmm; perhaps it's just me, but isn't TTL more often used to express relative times (basically the equivalent of what we currently call "period"), i.e. for how long are new private keys valid before we replace them with a new one (which would in turn also live for TTL seconds before getting in turn replaced by a new one and so on)? |
yup, that was my take: spec'ing it in relative time (rather than fixed epoch~ish), |
But that's already handled by the |
Prepares the ground for addressing #185 and #199 without adding any feature. The only small side effect is that now private keys are attempted in random order (Go map iteration order). This could only affect users who have turned on the key rotation feature which, as mentioned in #137, is not yet ready for prime time in the first place.
Prepares the ground for addressing #185 and #199 without adding any feature. The only small side effect is that now private keys are attempted in random order (Go map iteration order). This could only affect users who have turned on the key rotation feature which, as mentioned in #137, is not yet ready for prime time in the first place.
Prepares the ground for addressing #185 and #199 without adding any feature. The only small side effect is that now private keys are attempted in random order (Go map iteration order). This could only affect users who have turned on the key rotation feature which, as mentioned in #137, is not yet ready for prime time in the first place.
Prepares the ground for addressing #185 and #199 without adding any feature. The only small side effect is that now private keys are attempted in random order (Go map iteration order). This could only affect users who have turned on the key rotation feature which, as mentioned in #137, is not yet ready for prime time in the first place.
Prepares the ground for addressing #185 and #199 without adding any feature. The only small side effect is that now private keys are attempted in random order (Go map iteration order). This could only affect users who have turned on the key rotation feature which, as mentioned in #137, is not yet ready for prime time in the first place.
Prepares the ground for addressing #185 and #199 without adding any feature. The only small side effect is that now private keys are attempted in random order (Go map iteration order). This could only affect users who have turned on the key rotation feature which, as mentioned in #137, is not yet ready for prime time in the first place.
Prepares the ground for addressing #185 and #199 without adding any feature. The only small side effect is that now private keys are attempted in random order (Go map iteration order). This could only affect users who have turned on the key rotation feature which, as mentioned in #137, is not yet ready for prime time in the first place.
Prepares the ground for addressing #185 and #199 without adding any feature. The only small side effect is that now private keys are attempted in random order (Go map iteration order). This could only affect users who have turned on the key rotation feature which, as mentioned in #137, is not yet ready for prime time in the first place.
Prepares the ground for addressing #185 and #199 without adding any feature. The only small side effect is that now private keys are attempted in random order (Go map iteration order). This could only affect users who have turned on the key rotation feature which, as mentioned in #137, is not yet ready for prime time in the first place.
214: Refactor key book-keeping r=mkmik a=mkmik Prepares the ground for addressing #185 and #199 without adding any feature. The only small side effect is that now private keys are attempted in random order (Go map iteration order). This could only affect users who have turned on the key rotation feature which, as mentioned in #137, is not yet ready for prime time in the first place. Also improves on #190. Co-authored-by: Marko Mikulicic <mkm@bitnami.com>
This Issue has been automatically marked as "stale" because it has not had recent activity (for 15 days). It will be closed if no further activity occurs. Thanks for the feedback. |
Due to the lack of activity in the last 7 days since it was marked as "stale", we proceed to close this Issue. Do not hesitate to reopen it later if necessary. |
The README instructs to send a USR1 signal to trigger a key rotation, but since #174 the docker image contains only controller static binary and the essential files (in particular there is no shell)
We could either use the "debug" distroless image flavour (which contains busybox) or figure out (and document) another way to trigger the key rotation)
The text was updated successfully, but these errors were encountered: