Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[server] fsnotify based cert reloading #6118

Closed
wants to merge 1 commit into from
Closed

[server] fsnotify based cert reloading #6118

wants to merge 1 commit into from

Conversation

charlieegan3
Copy link
Contributor

@charlieegan3 charlieegan3 commented Jul 25, 2023

This is a POC impl of reloading the server cert and key based on fs notify.

The test is very verbose, but should work for other implementations should anyone else pick this up.

Fixes #5788

TODO:

  • make the server command use this functionality, currently this just exposes another option.
  • Add some tests for other cases, such as the certs being deleted.
  • Handle the reloading of the CA certs too, set via tls-ca-cert-file.

Maybe for another PR:

  • Implement something similar for service and distribution tracing config file values: services[_].tls.ca_cert, services[_].credentials.client_tls.cert, distributed_tracing.tls_ca_cert_file

This is a POC impl of reloading the server cert and key based on fs
notify.

The test is very verbose, but should work for other implementations
should anyone else pick this up.

Signed-off-by: Charlie Egan <charlie@styra.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Support fsnotify based reloading of certificate, key and CA certs
1 participant