Conversation
d8ca612 to
657a0fc
Compare
refresh the cache if certificate is close to expiration
657a0fc to
a0064f0
Compare
|
Thanks for the suggestion, but I'm not yet convinced this PR changes much / fixes the issue. Currently, the code relies on the object reference comparison, and while that is certainly less robust than actually comparing certificates as we had intended, the logic should still work. If the underlying SVID changes, the |
|
I removed the object reference comparison from ZeroTrustIdentityService already. isKeyStoreCached now checks if
Since getX509Svid uses the spiffe library to get the actual client cert from the workload API, a cache miss ensures a new, valid and different cert than the one before. That said, I need to double check the new tests for ZtisClientIdentity if they properly reflect a rotation scenario |
|
Now that I typed it all out I get your point. How can the pojo be equal if the cert was rotated 🤔 |
Context
Fixes the following issues:
Feature scope:
refresh the cached ZTIS keystore if certificate is close to expiration.
otherwise requests fail if the backend is up for more than 7 days.
Definition of Done
Error handling created / updated & covered by the tests aboveDocumentation updated