-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expired certs not being renewed #16201
Comments
/kind support |
Thanks for the information @Kimi450, we occasionally got issues related to certs after we thought it was fixed, but this confirms why it's failing. |
No worries! I am not sure which ones from the list above need to be renewed, but at least after renewing all of them I think this issue should be fixed. Im hoping that it will be straight forward (the same logic from the other certs being renewed can be used here too) to do this. |
The certs that are not being renewed are actually created by |
I was surprised to not find an initial config to set an expiration for these in the first place, but it seems like its designed to be this way to encourage upgrades. When would the looping be done? Would have to be some sort of a cron job that runs daily to see if theyre close to expiration and renew with some buffer I guess? Theres a caveat for static pods though. Im not sure which pods are static in the control plane but this will have to be catered too Im guessing. So it might not be as straight forward as we might have been hoping. |
minikube currently checks for outdated certs on |
Great, thanks for putting in the work! |
this bug has been bugging me for years ! good job @Kimi450 and @spowelljr on helping to investigate it |
Same lol, after it bricked my server once I decided to finally look into it before it happens again. EDIT: Does this mean Ive a job at Google secured? /jk |
I've finalized the PR with reproduction steps in the description if you want to rest it for yourself @Kimi450 |
Nice, thanks. I'll try to take it out for a test run over the weekend but I'm sure it's fine anyway. Appreciate the fix, thanks again! |
Ngl, Im not sure how to test it out myself just from the src code changes. However, the changes youve made look good to me (I added a small comment that I think is worthwhile changing). And your description shows that it works too. Id be happy to see this released so I can upgrade my server :) |
@spowelljr thanks for the fix, do you know what release this change will be included in? |
The next release will include the fix (v1.31.0), we don't yet have an ETA for the release though, I can provide you a link to the binary if you'd like though |
If you wouldnt mind, Id appreciate it! Just in case :) Thanks! |
https://storage.googleapis.com/minikube-builds/16249/minikube-linux-amd64 If you run into any cert related issues let me know |
Thanks! I might try a test build if I get some free time |
What Happened?
This was supposed fixed in issue 10122 but I dont think this is fixed. Or at least not as I would expect it to be fixed. Ive linked the issue from my repo here. You can check my Kimi450/ubuntu_server#4 (comment) that issue which describes why I think its broken (and how to replicate it). Unless im doing something wrong, I think this issue still persists.
Basically, if you use --cert-expiration tag, that only affects
and the problematic (not renewed) ones are
Without these being renewed, the minikube instance cannot be accessed (unless you change the system time to a date in the past)
minikube version
Reproduce by doing the following
install minikube (no special setting required)
change system time
restart minikube (optional)
Attach the log file
I do not have this at the moment, but I can provide later if absolutely necessary
Operating System
Ubuntu
Driver
Docker
The text was updated successfully, but these errors were encountered: