cert-manager/trust-manager

Avoid multiple decode/encode of certificates

Closed this issue ยท 12 comments

          I have a feeling we are decoding/encoding certs in bundles multiple times already, and this adds another round of decode/encode. What about using a "Cert Pool" as an intermediate format between functions - instead of `[]string` or `[]byte`? We could fix this in a follow-up PR. Just wanted to note it here.

Originally posted by @erikgb in #303 (comment)

Hello,
Can I work on this?
If we have the final decision, I cat work on this issue to improve code usage and performance.
I would appreciate any suggestions how can we improve.
As far as I remember CertPool usage was suggested.

Please do, @arsenalzp! ๐ŸŽ‰ Anything that needs to be decided?

Please do, @arsenalzp! ๐ŸŽ‰ Anything that needs to be decided?

As usually, during the work process we finding out the best decision :)

/assign

@arsenalzp Are you working on this issue? If not, I am considering to take a stab. ๐Ÿค 

@arsenalzp Are you working on this issue? If not, I am considering to take a stab. ๐Ÿค 

Hello,
Sure, I don't forget about this issue, however I pushed all my strengths to pass one of AWS Architect exam.
Please, don't re-assign this issue to anyone else, I will manage with it soon :)

Sorry for delayed response, I started working on this issue.
I found some changes were made for source.go and sync.go.

Hello,
How do you think, should be maintain CertPool structure between all functions: in source.go, pem.go, cert_pool.go? Or just between pem.go and cert_pool.go and keep as it is in source.go?

Hello,

How do you think, should be maintain CertPool structure between all functions: in source.go, pem.go, cert_pool.go? Or just between pem.go and cert_pool.go and keep as it is in source.go?

I am a bit out of context, but if it makes sense to keep the cert pool from source to target, I will imagine that would make the code more compact and easier to read/understand?

I believe this can be closed after #375 is merged.

/close

@erikgb: Closing this issue.

In response to this:

I believe this can be closed after #375 is merged.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

It happened, finally!
Thank you colleagues, you didn't forget about my work :)