Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deleted Certificate from os-conf still shows up in /etc/ssl/certs/ca-certificates.crt #29

Closed
tnwang opened this issue Apr 2, 2018 · 4 comments
Labels

Comments

@tnwang
Copy link

tnwang commented Apr 2, 2018

We removed the certificate from our manifest and did a bosh deploy, and saw that the certificate was still in /etc/ssl/certs/ca-certificates.crt on our VM. We had to delete and recreate the VM to see the certificate removed from /etc/ssl/certs/ca-certificates.crt on our VM

Is this a known issue?

@dpb587-pivotal
Copy link
Contributor

Currently the only way to remove a certificate is, as you found, recreating the VM. While this is unexpected behavior, it was the tradeoff between trying to track certificates and either remove them during drain (when other services may still need to rely on custom CAs for connections) or do hacky things to try and remove them next time something tries to run after an update (since the ca_certs job would have been uninstalled by then).

Is this something you're noticing during development, or is this impacting you in other areas as well?

@DennisDenuto
Copy link

Hey @dpb587-pivotal fyi, the uaa team has made some changes to how/when uaa loads certificates into its java truststore. See cloudfoundry/uaa-release#71

Prior to this change uaa was running into a race condition where if os-conf was co-located with uaa and if os-conf updated its certificates before uaa could load those certificates into its truststore then uaa would essentially miss out on loading those certs forever (even if you monit restart uaa)

os-conf not removing certificates does not affect uaa but it was unexpected when the PM was accepting this story.

@dpb587-pivotal
Copy link
Contributor

Thanks for the link - glad the race condition is improved.

I think this has come up before in Slack, so I'll leave this open for discoverability since it's currently a technical limitation of BOSH releases.

@bosh-admin-bot
Copy link

This issue was closed because it has been labeled Stale for 7 days without subsequent activity. Feel free to re-open this issue at any time by commenting below.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants