-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Delete Certificate when owning ingress no longer requires it #912
Comments
Proposal: For an updated Ingress resource the Ingress Shim controller gets corresponding Certificates (by owner reference or namespace / name) and checks if In case of a mismatch |
Cleaning up stale Certificates and Secrets must be delegated to Cert-Manager cert-manager/cert-manager#912 cert-manager/cert-manager#897 As long as this is not implemented, Certificates and Secrets got stale remain in the control cluster.
Cleaning up stale Certificates and Secrets must be delegated to Cert-Manager cert-manager/cert-manager#912 cert-manager/cert-manager#897 As long as this is not implemented, Certificates and Secrets got stale remain in the control cluster.
Issues go stale after 90d of inactivity. |
Scheduled in for v0.7 - it'd be great to get ingress-shim updated to handle this properly 😄 /remove-lifecycle stale |
@munnerz What is the latest status of this proposal? Seems like a great feature to me. |
@MikeBlomm I'm going to try to implement this /assign |
Is your feature request related to a problem? Please describe.
The Ingress Shim creates a Certificate resource for each element in the TLS list of an Ingress resource. When a element is subsequently deleted from this TLS list, the corresponding Certificate resource is not cleaned up.
Consequences: Although the certificate is not required any more, Cert-Manager still manages its complete lifecycle. If this happens frequently the work queue will finally contain a lot of irrelevant elements that cause evitable processing time and memory usage. Moreover, in combination with Let's Encrypt it affects the rate limit.
Describe the solution you'd like
As soon as the TLS list of an Ingress is modified, Cert-Manager should check if it once has created Certificate resources which got unreferenced through this change, i.e. the control loop should delete this Certificate resource.
/kind feature
The text was updated successfully, but these errors were encountered: