Merge pull request #5199 from irbekrm/fix_keyrotation_warning
Fix keyrotation warning
This commit is contained in:
commit
d15d2d51ec
@ -52,9 +52,10 @@ import (
|
||||
)
|
||||
|
||||
const (
|
||||
ControllerName = "certificates-key-manager"
|
||||
reasonDecodeFailed = "DecodeFailed"
|
||||
reasonDeleted = "Deleted"
|
||||
ControllerName = "certificates-key-manager"
|
||||
reasonDecodeFailed = "DecodeFailed"
|
||||
reasonCannotRegenerateKey = "CannotRegenerateKey"
|
||||
reasonDeleted = "Deleted"
|
||||
)
|
||||
|
||||
var (
|
||||
@ -259,7 +260,7 @@ func (c *controller) createNextPrivateKeyRotationPolicyNever(ctx context.Context
|
||||
return c.createAndSetNextPrivateKey(ctx, crt)
|
||||
}
|
||||
if len(violations) > 0 {
|
||||
c.recorder.Eventf(crt, corev1.EventTypeWarning, reasonDecodeFailed, "Existing private key in Secret %q does not match requirements on Certificate resource, mismatching fields: %v", crt.Spec.SecretName, violations)
|
||||
c.recorder.Eventf(crt, corev1.EventTypeWarning, reasonCannotRegenerateKey, "User intervention required: existing private key in Secret %q does not match requirements on Certificate resource, mismatching fields: %v, but cert-manager cannot create new private key as the Certificate's .spec.privateKey.rotationPolicy is unset or set to Never. To allow cert-manager to create a new private key you can set .spec.privateKey.rotationPolicy to 'Always' (this will result in the private key being regenerated every time a cert is renewed) ", crt.Spec.SecretName, violations)
|
||||
return nil
|
||||
}
|
||||
|
||||
|
||||
@ -435,7 +435,7 @@ func TestProcessItem(t *testing.T) {
|
||||
secrets: []runtime.Object{
|
||||
ownedSecretWithName("testns", "fixed-name", "test", map[string][]byte{"tls.key": mustGenerateECDSA(t, pki.ECCurve256)}),
|
||||
},
|
||||
expectedEvents: []string{"Normal Deleted Regenerating private key due to change in fields: [spec.keyAlgorithm]"},
|
||||
expectedEvents: []string{"Normal Deleted Regenerating private key due to change in fields: [spec.privateKey.algorithm]"},
|
||||
expectedActions: []testpkg.Action{
|
||||
testpkg.NewAction(coretesting.NewDeleteAction(
|
||||
corev1.SchemeGroupVersion.WithResource("secrets"),
|
||||
|
||||
@ -60,7 +60,7 @@ func PrivateKeyMatchesSpec(pk crypto.PrivateKey, spec cmapi.CertificateSpec) ([]
|
||||
func rsaPrivateKeyMatchesSpec(pk crypto.PrivateKey, spec cmapi.CertificateSpec) ([]string, error) {
|
||||
rsaPk, ok := pk.(*rsa.PrivateKey)
|
||||
if !ok {
|
||||
return []string{"spec.keyAlgorithm"}, nil
|
||||
return []string{"spec.privateKey.algorithm"}, nil
|
||||
}
|
||||
var violations []string
|
||||
// TODO: we should not use implicit defaulting here, and instead rely on
|
||||
@ -73,7 +73,7 @@ func rsaPrivateKeyMatchesSpec(pk crypto.PrivateKey, spec cmapi.CertificateSpec)
|
||||
keySize = spec.PrivateKey.Size
|
||||
}
|
||||
if rsaPk.N.BitLen() != keySize {
|
||||
violations = append(violations, "spec.keySize")
|
||||
violations = append(violations, "spec.privateKey.size")
|
||||
}
|
||||
return violations, nil
|
||||
}
|
||||
@ -81,7 +81,7 @@ func rsaPrivateKeyMatchesSpec(pk crypto.PrivateKey, spec cmapi.CertificateSpec)
|
||||
func ecdsaPrivateKeyMatchesSpec(pk crypto.PrivateKey, spec cmapi.CertificateSpec) ([]string, error) {
|
||||
ecdsaPk, ok := pk.(*ecdsa.PrivateKey)
|
||||
if !ok {
|
||||
return []string{"spec.keyAlgorithm"}, nil
|
||||
return []string{"spec.privateKey.algorithm"}, nil
|
||||
}
|
||||
var violations []string
|
||||
// TODO: we should not use implicit defaulting here, and instead rely on
|
||||
@ -94,7 +94,7 @@ func ecdsaPrivateKeyMatchesSpec(pk crypto.PrivateKey, spec cmapi.CertificateSpec
|
||||
expectedKeySize = spec.PrivateKey.Size
|
||||
}
|
||||
if expectedKeySize != ecdsaPk.Curve.Params().BitSize {
|
||||
violations = append(violations, "spec.keySize")
|
||||
violations = append(violations, "spec.privateKey.size")
|
||||
}
|
||||
return violations, nil
|
||||
}
|
||||
@ -102,7 +102,7 @@ func ecdsaPrivateKeyMatchesSpec(pk crypto.PrivateKey, spec cmapi.CertificateSpec
|
||||
func ed25519PrivateKeyMatchesSpec(pk crypto.PrivateKey, spec cmapi.CertificateSpec) ([]string, error) {
|
||||
_, ok := pk.(ed25519.PrivateKey)
|
||||
if !ok {
|
||||
return []string{"spec.keyAlgorithm"}, nil
|
||||
return []string{"spec.privateKey.algorithm"}, nil
|
||||
}
|
||||
|
||||
return nil, nil
|
||||
|
||||
@ -72,7 +72,7 @@ func TestPrivateKeyMatchesSpec(t *testing.T) {
|
||||
key: mustGenerateRSA(t, 2048),
|
||||
expectedAlgo: cmapi.RSAKeyAlgorithm,
|
||||
expectedSize: 4096,
|
||||
violations: []string{"spec.keySize"},
|
||||
violations: []string{"spec.privateKey.size"},
|
||||
},
|
||||
"should match if keySize and algorithm are correct (ECDSA)": {
|
||||
key: mustGenerateECDSA(t, pki.ECCurve256),
|
||||
@ -83,13 +83,13 @@ func TestPrivateKeyMatchesSpec(t *testing.T) {
|
||||
key: mustGenerateECDSA(t, pki.ECCurve256),
|
||||
expectedAlgo: cmapi.ECDSAKeyAlgorithm,
|
||||
expectedSize: pki.ECCurve521,
|
||||
violations: []string{"spec.keySize"},
|
||||
violations: []string{"spec.privateKey.size"},
|
||||
},
|
||||
"should not match if keyAlgorithm is incorrect": {
|
||||
key: mustGenerateECDSA(t, pki.ECCurve256),
|
||||
expectedAlgo: cmapi.RSAKeyAlgorithm,
|
||||
expectedSize: 2048,
|
||||
violations: []string{"spec.keyAlgorithm"},
|
||||
violations: []string{"spec.privateKey.algorithm"},
|
||||
},
|
||||
"should match if keySize and algorithm are correct (Ed25519)": {
|
||||
key: mustGenerateEd25519(t),
|
||||
|
||||
Loading…
Reference in New Issue
Block a user