Skip to content

Commit 2e0cae4

Browse files
Merge pull request #15 from erikgb/renew-cert
Ensure certificates are renewed
2 parents 4d2ed90 + 353ce1e commit 2e0cae4

File tree

6 files changed

+307
-61
lines changed

6 files changed

+307
-61
lines changed

go.mod

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ module github.com/cert-manager/webhook-cert-lib
33
go 1.24.0
44

55
require (
6-
github.com/go-logr/logr v1.4.3
6+
github.com/stretchr/testify v1.10.0
77
k8s.io/api v0.33.2
88
k8s.io/apimachinery v0.33.2
99
k8s.io/client-go v0.33.2
@@ -19,6 +19,7 @@ require (
1919
github.com/evanphx/json-patch/v5 v5.9.11 // indirect
2020
github.com/fsnotify/fsnotify v1.9.0 // indirect
2121
github.com/fxamacker/cbor/v2 v2.8.0 // indirect
22+
github.com/go-logr/logr v1.4.3 // indirect
2223
github.com/go-openapi/jsonpointer v0.21.1 // indirect
2324
github.com/go-openapi/jsonreference v0.21.0 // indirect
2425
github.com/go-openapi/swag v0.23.1 // indirect
@@ -34,6 +35,7 @@ require (
3435
github.com/modern-go/reflect2 v1.0.2 // indirect
3536
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
3637
github.com/pkg/errors v0.9.1 // indirect
38+
github.com/pmezard/go-difflib v1.0.0 // indirect
3739
github.com/prometheus/client_golang v1.22.0 // indirect
3840
github.com/prometheus/client_model v0.6.2 // indirect
3941
github.com/prometheus/common v0.65.0 // indirect

internal/pki/tls.go

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
/*
2+
Copyright 2020 The cert-manager Authors.
3+
4+
Licensed under the Apache License, Version 2.0 (the "License");
5+
you may not use this file except in compliance with the License.
6+
You may obtain a copy of the License at
7+
8+
http://www.apache.org/licenses/LICENSE-2.0
9+
10+
Unless required by applicable law or agreed to in writing, software
11+
distributed under the License is distributed on an "AS IS" BASIS,
12+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
See the License for the specific language governing permissions and
14+
limitations under the License.
15+
*/
16+
17+
package pki
18+
19+
import (
20+
"crypto"
21+
"crypto/tls"
22+
"crypto/x509"
23+
)
24+
25+
func ToTLSCertificate(cert *x509.Certificate, pk crypto.Signer) (tls.Certificate, error) {
26+
pkData, err := EncodePrivateKey(pk)
27+
if err != nil {
28+
return tls.Certificate{}, err
29+
}
30+
31+
certData, err := EncodeX509(cert)
32+
if err != nil {
33+
return tls.Certificate{}, err
34+
}
35+
36+
tlsCert, err := tls.X509KeyPair(certData, pkData)
37+
if err != nil {
38+
return tls.Certificate{}, err
39+
}
40+
return tlsCert, nil
41+
}

pkg/authority/ca_secret_controller.go

Lines changed: 54 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ package authority
1919
import (
2020
"context"
2121
"crypto"
22+
"crypto/tls"
2223
"crypto/x509"
2324

24-
"github.com/go-logr/logr"
2525
corev1 "k8s.io/api/core/v1"
2626
"k8s.io/apimachinery/pkg/api/errors"
2727
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
@@ -63,40 +63,51 @@ func (r *CASecretReconciler) SetupWithManager(mgr ctrl.Manager) error {
6363
}
6464

6565
func (r *CASecretReconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
66-
return ctrl.Result{}, r.reconcileSecret(ctx, req)
67-
}
68-
69-
func (r *CASecretReconciler) reconcileSecret(ctx context.Context, req ctrl.Request) error {
7066
secret := &corev1.Secret{}
7167
if err := r.Cache.Get(ctx, req.NamespacedName, secret); err != nil {
7268
if !errors.IsNotFound(err) {
73-
return err
69+
return ctrl.Result{}, err
7470
}
75-
// Secret does not exist - let's create it
71+
// Secret does not exist - let's create it by setting namespace/name
7672
secret.Namespace = req.Namespace
7773
secret.Name = req.Name
7874
}
7975

80-
generate, caCert, caPk := r.needsGenerate(secret)
76+
caCert, err := r.reconcileSecret(ctx, secret)
77+
return ctrl.Result{RequeueAfter: certificate.RenewAfter(caCert)}, err
78+
}
79+
80+
func (r *CASecretReconciler) reconcileSecret(ctx context.Context, secret *corev1.Secret) (caCert *x509.Certificate, err error) {
81+
var caPk crypto.Signer
82+
83+
if required, reason := caRequiresRegeneration(secret); required {
84+
log.FromContext(ctx).Info("Will regenerate CA", "reason", reason)
8185

82-
if generate || secret.Annotations[api.RenewCertificateSecretAnnotation] != secret.Annotations[api.RenewHandledCertificateSecretAnnotation] {
83-
var err error
8486
caCert, caPk, err = certificate.GenerateCA(r.CAOptions.Duration)
8587
if err != nil {
86-
return err
88+
return caCert, err
89+
}
90+
} else {
91+
caCert, err = pki.DecodeX509CertificateBytes(secret.Data[corev1.TLSCertKey])
92+
if err != nil {
93+
return caCert, err
94+
}
95+
caPk, err = pki.DecodePrivateKeyBytes(secret.Data[corev1.TLSPrivateKeyKey])
96+
if err != nil {
97+
return caCert, err
8798
}
8899
}
89100

90101
certBytes, err := pki.EncodeX509(caCert)
91102
if err != nil {
92-
return err
103+
return caCert, err
93104
}
94105
pkBytes, err := pki.EncodePrivateKey(caPk)
95106
if err != nil {
96-
return err
107+
return caCert, err
97108
}
98109

99-
caBundleBytes := addCertToCABundle(log.FromContext(ctx), secret.Data[api.TLSCABundleKey], caCert)
110+
caBundleBytes := addCertToCABundle(ctx, secret.Data[api.TLSCABundleKey], caCert)
100111

101112
ac := corev1ac.Secret(secret.Name, secret.Namespace).
102113
WithLabels(map[string]string{
@@ -115,36 +126,51 @@ func (r *CASecretReconciler) reconcileSecret(ctx context.Context, req ctrl.Reque
115126
})
116127
}
117128

118-
return r.Patcher.Patch(ctx, secret, ssa.NewApplyPatch(ac), client.ForceOwnership, ssa.FieldOwner)
129+
return caCert, r.Patcher.Patch(ctx, secret, ssa.NewApplyPatch(ac), client.ForceOwnership, ssa.FieldOwner)
119130
}
120131

121-
func addCertToCABundle(logger logr.Logger, caBundleBytes []byte, caCert *x509.Certificate) []byte {
132+
func addCertToCABundle(ctx context.Context, caBundleBytes []byte, caCert *x509.Certificate) []byte {
122133
certPool := pki.NewCertPool(pki.WithFilteredExpiredCerts(true))
123134

124135
if err := certPool.AddCertsFromPEM(caBundleBytes); err != nil {
125-
logger.Error(err, "failed to re-use existing CAs in new set of CAs")
136+
log.FromContext(ctx).Error(err, "failed to re-use existing CAs in new set of CAs")
126137
}
127138
// TODO: handle AddCert returning false? I expect this will never happen.
128139
certPool.AddCert(caCert)
129140

130141
return []byte(certPool.PEM())
131142
}
132143

133-
func (r *CASecretReconciler) needsGenerate(secret *corev1.Secret) (bool, *x509.Certificate, crypto.Signer) {
134-
caCert, err := pki.DecodeX509CertificateBytes(secret.Data[corev1.TLSCertKey])
135-
if err != nil {
136-
return true, nil, nil
144+
// caRequiresRegeneration will check data in a Secret resource and return true
145+
// if the CA needs to be regenerated for any reason.
146+
func caRequiresRegeneration(s *corev1.Secret) (bool, string) {
147+
if s.Annotations[api.RenewCertificateSecretAnnotation] != s.Annotations[api.RenewHandledCertificateSecretAnnotation] {
148+
return true, "Forced renewal."
149+
}
150+
151+
if s.Data == nil {
152+
return true, "Missing data in CA secret."
137153
}
138-
caPk, err := pki.DecodePrivateKeyBytes(secret.Data[corev1.TLSPrivateKeyKey])
154+
pkData := s.Data[corev1.TLSPrivateKeyKey]
155+
certData := s.Data[corev1.TLSCertKey]
156+
if len(pkData) == 0 || len(certData) == 0 {
157+
return true, "Missing data in CA secret."
158+
}
159+
cert, err := tls.X509KeyPair(certData, pkData)
139160
if err != nil {
140-
return true, nil, nil
161+
return true, "Failed to parse data in CA secret."
141162
}
142163

143-
equal, err := pki.PublicKeysEqual(caCert.PublicKey, caPk.Public())
144-
if !equal || err != nil {
145-
return true, nil, nil
164+
x509Cert, err := x509.ParseCertificate(cert.Certificate[0])
165+
if err != nil {
166+
return true, "Internal error parsing x509 certificate."
167+
}
168+
if !x509Cert.IsCA {
169+
return true, "Stored certificate is not marked as a CA."
170+
}
171+
if certificate.RenewAfter(x509Cert) < 0 {
172+
return true, "CA certificate is nearing expiry."
146173
}
147174

148-
// TODO: Trigger renew check due
149-
return false, caCert, caPk
175+
return false, ""
150176
}
Lines changed: 179 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,179 @@
1+
/*
2+
Copyright 2020 The cert-manager Authors.
3+
4+
Licensed under the Apache License, Version 2.0 (the "License");
5+
you may not use this file except in compliance with the License.
6+
You may obtain a copy of the License at
7+
8+
http://www.apache.org/licenses/LICENSE-2.0
9+
10+
Unless required by applicable law or agreed to in writing, software
11+
distributed under the License is distributed on an "AS IS" BASIS,
12+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
See the License for the specific language governing permissions and
14+
limitations under the License.
15+
*/
16+
17+
package authority
18+
19+
import (
20+
"crypto/rand"
21+
"crypto/x509"
22+
"crypto/x509/pkix"
23+
"math/big"
24+
"testing"
25+
"time"
26+
27+
"github.com/stretchr/testify/assert"
28+
corev1 "k8s.io/api/core/v1"
29+
30+
"github.com/cert-manager/webhook-cert-lib/internal/pki"
31+
)
32+
33+
var serialNumberLimit = new(big.Int).Lsh(big.NewInt(1), 128)
34+
35+
func Test__caRequiresRegeneration(t *testing.T) {
36+
generateSecretData := func(mod func(*x509.Certificate)) map[string][]byte {
37+
// Generate a certificate and private key pair
38+
pk, err := pki.GenerateECPrivateKey(384)
39+
assert.NoError(t, err)
40+
pkBytes, err := pki.EncodePrivateKey(pk)
41+
assert.NoError(t, err)
42+
serialNumber, err := rand.Int(rand.Reader, serialNumberLimit)
43+
assert.NoError(t, err)
44+
cert := &x509.Certificate{
45+
Version: 3,
46+
BasicConstraintsValid: true,
47+
SerialNumber: serialNumber,
48+
PublicKeyAlgorithm: x509.ECDSA,
49+
Subject: pkix.Name{
50+
CommonName: "cert-manager-webhook-ca",
51+
},
52+
IsCA: true,
53+
NotBefore: time.Now(),
54+
NotAfter: time.Now().Add(5 * time.Minute),
55+
KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageKeyEncipherment | x509.KeyUsageCertSign,
56+
}
57+
if mod != nil {
58+
mod(cert)
59+
}
60+
_, cert, err = pki.SignCertificate(cert, cert, pk.Public(), pk)
61+
assert.NoError(t, err)
62+
certBytes, err := pki.EncodeX509(cert)
63+
assert.NoError(t, err)
64+
65+
return map[string][]byte{
66+
"tls.crt": certBytes,
67+
"ca.crt": certBytes,
68+
"tls.key": pkBytes,
69+
}
70+
}
71+
72+
tests := []struct {
73+
name string
74+
secret *corev1.Secret
75+
expect bool
76+
expectReason string
77+
}{
78+
{
79+
name: "Missing data in CA secret (nil data)",
80+
secret: &corev1.Secret{
81+
Data: nil,
82+
},
83+
expect: true,
84+
expectReason: "Missing data in CA secret.",
85+
},
86+
{
87+
name: "Missing data in CA secret (missing ca.crt)",
88+
secret: &corev1.Secret{
89+
Data: map[string][]byte{
90+
"tls.key": []byte("private key"),
91+
},
92+
},
93+
expect: true,
94+
expectReason: "Missing data in CA secret.",
95+
},
96+
{
97+
name: "Failed to parse data in CA secret",
98+
secret: &corev1.Secret{
99+
Data: map[string][]byte{
100+
"tls.crt": []byte("cert"),
101+
"ca.crt": []byte("cert"),
102+
"tls.key": []byte("secret"),
103+
},
104+
},
105+
expect: true,
106+
expectReason: "Failed to parse data in CA secret.",
107+
},
108+
{
109+
name: "Stored certificate is not marked as a CA",
110+
secret: &corev1.Secret{
111+
Data: generateSecretData(
112+
func(cert *x509.Certificate) {
113+
cert.IsCA = false
114+
},
115+
),
116+
},
117+
expect: true,
118+
expectReason: "Stored certificate is not marked as a CA.",
119+
},
120+
{
121+
name: "Root CA certificate is JUST nearing expiry",
122+
secret: &corev1.Secret{
123+
Data: generateSecretData(
124+
func(cert *x509.Certificate) {
125+
cert.NotBefore = time.Now().Add(-2*time.Hour - 1*time.Minute)
126+
cert.NotAfter = cert.NotBefore.Add(3 * time.Hour)
127+
},
128+
),
129+
},
130+
expect: true,
131+
expectReason: "CA certificate is nearing expiry.",
132+
},
133+
{
134+
name: "Root CA certificate is ALMOST nearing expiry",
135+
secret: &corev1.Secret{
136+
Data: generateSecretData(
137+
func(cert *x509.Certificate) {
138+
cert.NotBefore = time.Now().Add(-2*time.Hour + 1*time.Minute)
139+
cert.NotAfter = cert.NotBefore.Add(3 * time.Hour)
140+
},
141+
),
142+
},
143+
expect: false,
144+
},
145+
{
146+
name: "Root CA certificate is expired",
147+
secret: &corev1.Secret{
148+
Data: generateSecretData(
149+
func(cert *x509.Certificate) {
150+
cert.NotBefore = time.Now().Add(-1 * time.Hour)
151+
cert.NotAfter = time.Now().Add(-1 * time.Minute)
152+
},
153+
),
154+
},
155+
expect: true,
156+
expectReason: "CA certificate is nearing expiry.",
157+
},
158+
{
159+
name: "Ok",
160+
secret: &corev1.Secret{
161+
Data: generateSecretData(nil),
162+
},
163+
expect: false,
164+
expectReason: "",
165+
},
166+
}
167+
168+
for _, test := range tests {
169+
t.Run(test.name, func(t *testing.T) {
170+
required, reason := caRequiresRegeneration(test.secret)
171+
if required != test.expect {
172+
t.Errorf("Expected %v, but got %v", test.expect, required)
173+
}
174+
if reason != test.expectReason {
175+
t.Errorf("Expected %q, but got %q", test.expectReason, reason)
176+
}
177+
})
178+
}
179+
}

pkg/authority/certificate/tls.go

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -117,3 +117,10 @@ func (h *Holder) GetCertificate(_ *tls.ClientHelloInfo) (*tls.Certificate, error
117117
func (h *Holder) SetCertificate(cert *tls.Certificate) {
118118
h.certP.Store(cert)
119119
}
120+
121+
// RenewAfter returns the duration until the certificate should be renewed.
122+
func RenewAfter(cert *x509.Certificate) time.Duration {
123+
lifetime := cert.NotAfter.Sub(cert.NotBefore)
124+
renewTime := cert.NotBefore.Add(lifetime * 2 / 3)
125+
return time.Until(renewTime)
126+
}

0 commit comments

Comments
 (0)