-
Notifications
You must be signed in to change notification settings - Fork 497
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RFE] allow bring your own certs for the oidc-disicovery-provider components #3825
Comments
Hello @raffaelespazzoli, thanks for opening this and sorry for the delay. The project has previously avoided allowing these kinds of configurations because it felt antithetical to the goals of SPIFFE/SPIRE, which includes treating rotation as a first class citizen for all keys in the system. With this in mind, an expiring cert/key in a SPIRE deployment is likely to catch folks by surprise, and is not the experience that we want our users to have. That said, we also recognize the pain that this stance has caused. We've revisited the topic in light of this issue, and came to the conclusion that this should be supported, however there should be adequate warnings in place. I had a look at the current configurables, and am proposing the following:
The configuration shape of this component has grown organically over the years and is not very ergonomic at all. Unfortunately, my proposed changes above only serve to make it worse. I can't think of any way to improve it that doesn't involve configurable deprecation, which I feel is out-of-scope for this issue. |
I don't like the name of the parameter: |
I see - if we want to add logic to detect updates to these files and apply them to the TLS stack without restarting, that sounds like a good idea and in that case the static prefix makes less sense. How about |
I like it! |
👍 Ok great .. I labeled this issue as help wanted, in case you or someone else in the community is in a good position to make the contribution 😊 |
Hi @evan2645, I'm willing to contribute to this issue by opening a PR with the changes. Could you assign it to me, please? |
Just assigned it to you @guilhermocc. Thank you for taking it! |
currently the oidc discovery provider component assumes it can use let's encrypt to create it;s own certs. In general this is a strong assumption that will impede adoption as not all scenarios allow for that. This RFE is about enbaling the use case of bring your own pre-existing certs.
The text was updated successfully, but these errors were encountered: