Open curua2008 opened 3 years ago
At the moment, the edge CA certificate is only checked for expiry when a deployment is made. See issue_cert
and check_edge_ca
in master; and refresh_cert
and prepare_edge_ca
in 1.2. certd
does not do lifecycle management, and instead defers that task to service consumers. I believe we are considering automating certificate lifecycle management since it is clearly possible to not have a deployment within the certificate renewal window.
@onalante-msft Thanks for the comment. When you mentioned "defers that task to service consumers". do we have to keep track of the edge ca certificate expiration date, manually delete the expired cert and restart iotedge to get a new valid cert?
Response here suggests the opposite - that iotedge is supposed to manage certificates on a basic level (renewal). https://github.com/Azure/iot-identity-service/issues/300#issuecomment-946018542
At the moment, the edge CA certificate is only checked for expiry when a deployment is made. See
issue_cert
andcheck_edge_ca
in master; andrefresh_cert
andprepare_edge_ca
in 1.2.certd
does not do lifecycle management, and instead defers that task to service consumers. I believe we are considering automating certificate lifecycle management since it is clearly possible to not have a deployment within the certificate renewal window.
Sorry, I should have been more clear. In this case, I would refer to identityd
as a consumer of certd
. identityd
, as the device-side source of truth for module identities (and hence certificates), is responsible for managing the lifecycle of module identities as far as certd
is concerned. Module developers should not need to manage the edge CA lifecycle, and can fully expect identityd
to update module identities when appropriate. I do not think adding this feature to identityd
is a specific tracked item at the moment, but I can probably look into it since I am working in a conceptually adjacent area.
This issue is being marked as stale because it has been open for 30 days with no activity.
I do not think adding this feature to identityd is a specific tracked item at the moment
@onalante-msft @pmzara Would it be possible to create an issue in the identity service repository to track this feature?
Hi folks, just want to let everyone know that we're actively working on this and hope to include the feature in an upcoming release soon.
Same applies to https://github.com/Azure/iotedge/issues/5787
Expected Behavior
When using EST certificate providers like GlobalSign or DigiCert, IoT Edge should renew the Edge CA certificate when it expires.
This happens when we have the device certificate setting in confim.toml as show below:
Current Behavior
iotedge was able to obtain a Edge ca certificate from EST server as shown below
Edge CA cert expired after 2 days
No certificate renewal happens
a MS SimulatedTemperatureSensor module which was deployed before the certificate expired, it was working but failed to connect after the cert expired
Steps to Reproduce
Provide a detailed set of steps to reproduce the bug. 1.Set up an EST server with Edge ca cert expires in 2 days
Context (Environment)
Host OS [e.g. Ubuntu 18.04, Windows Server IoT 2019]: Ubuntu 18.04 Architecture [e.g. amd64, arm32, arm64]: amd64 Container OS [e.g. Linux containers, Windows containers]: Linux
Output of
iotedge check
Device Information
Host OS [e.g. Ubuntu 18.04, Windows Server IoT 2019]: Ubuntu 18.04 Architecture [e.g. amd64, arm32, arm64]: amd64 Container OS [e.g. Linux containers, Windows containers]: Linux
Runtime Versions
iotedge 1.2.420211006.4
aziot-edged [run iotedge version]: https://github.com/Azure/iot-identity-service/suites/3964124249/artifacts/99607813 Edge Agent [image tag (e.g. 1.0.0)]: Edge Hub [image tag (e.g. 1.0.0)]: Docker/Moby [run docker version]:
Note: when using Windows containers on Windows, run
docker -H npipe:////./pipe/iotedge_moby_engine version
insteadLogs
aziot-edged logs
```edge-agent logs
```edge-hub logs
```Additional Information
Please provide any additional information that may be helpful in understanding the issue.