Conversation
d8ca612 to
657a0fc
Compare
refresh the cache if certificate is close to expiration
657a0fc to
a0064f0
Compare
|
Thanks for the suggestion, but I'm not yet convinced this PR changes much / fixes the issue. Currently, the code relies on the object reference comparison, and while that is certainly less robust than actually comparing certificates as we had intended, the logic should still work. If the underlying SVID changes, the |
|
I removed the object reference comparison from ZeroTrustIdentityService already. isKeyStoreCached now checks if
Since getX509Svid uses the spiffe library to get the actual client cert from the workload API, a cache miss ensures a new, valid and different cert than the one before. That said, I need to double check the new tests for ZtisClientIdentity if they properly reflect a rotation scenario |
|
Now that I typed it all out I get your point. How can the pojo be equal if the cert was rotated 🤔 |
|
@mpern we've now added a change that should allow the SDK to automatically detect rotations for the OAuth2 token flows: #1142 While not 100% confirmed this will resolve all rotation issues, it should be an improvement. Thus, closing this PR for now. Still, the current logic relies on comparing the |
Context
Fixes the following issues:
Feature scope:
refresh the cached ZTIS keystore if certificate is close to expiration.
otherwise requests fail if the backend is up for more than 7 days.
Definition of Done
Error handling created / updated & covered by the tests aboveDocumentation updated