ROX-34637: Hot reload TLS certificates in client connections#20661
ROX-34637: Hot reload TLS certificates in client connections#20661vladbologa wants to merge 3 commits into
Conversation
|
@coderabbitai review |
✅ Actions performedReview triggered.
|
📝 WalkthroughWalkthroughThe PR moves client certificate loading from initialization time to TLS handshake time. Instead of eagerly loading and assigning certificates to ChangesClient Certificate Lazy Loading
🎯 3 (Moderate) | ⏱️ ~10 minutes 🚥 Pre-merge checks | ✅ 4 | ❌ 1❌ Failed checks (1 inconclusive)
✅ Passed checks (4 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches📝 Generate docstrings
🧪 Generate unit tests (beta)
Comment |
🚀 Build Images ReadyImages are ready for commit 08badce. To use with deploy scripts: export MAIN_IMAGE_TAG=4.11.x-1032-g08badce154 |
2f016b5 to
5bddc37
Compare
|
@vladbologa: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Description
Reload leaf certificates every time a client connection is established.
The compliance node indexer additionally switches from a
tls.ConfigwithInsecureSkipVerifytoclientconn.TLSConfig, gaining both hot reload and server certificate verification against the StackRox CA.User-facing documentation
Testing and quality
Automated testing
How I validated my change
Tested with a client admission-control connection to sensor:
sensorServicetls-cert-admission-controlsecret with a new cert, then killed the fake sensor to force reconnections