-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support cert-manager for Generated Certificates #1238
Comments
See #1547 for the third and fourth bullets ( |
I took a look at the first two secrets mentioned here:
I wanted to see how they are used, especially which controllers use them, with a view to see what changes we would need to make for these to be externally provided as secrets of type
|
I wonder if we could take it a step further and have the There would need to be some additional thought given to backwards compatibility: the "reading" controllers such as One additional consideration if Pinniped writes secrets of type |
It would be good to make a comprehensive list of certs that should be considered, including in the Pinniped Supervisor. |
Would it be possible to make only very minor changes to the controllers, and then simply document how to pre-write and/or overwrite the secrets that the controllers will read, and how to effectively disable the |
Should we make assumptions about key names inside Secrets based on how cert-manager works, or should we make the user configure them? Same question for Secret types. |
I think generally controllers should detect the secret type, and assume the magic key names If the secret type is other than |
Is your feature request related to a problem? Please describe.
Not a problem, per se, but hard-coded backend values do not fit my use case. For my use case, which is a Government compliance use case, I may not use self-signed certificates anywhere in my cluster, so I must replace them with trusted certificates.
Describe the solution you'd like
Allow for use of a cert-manager
Certificate
object to be used in order to generate the following certificates:The following are currently hard-coded (there may be others as well) which will not allow us to use cert-manager certificates for our use case in order to use trusted certificates:
https://github.com/vmware-tanzu/pinniped/blob/main/internal/controller/apicerts/certs_manager.go#L23-L26
Configuration can default to the current values if no additional configuration is provided.
Describe alternatives you've considered
I've considered using External Secrets as a translation layer, but this is currently not possible with their implementation. See comment external-secrets/external-secrets#850 (comment).
Are you considering submitting a PR for this feature?
Right now, I will not have time to support a PR for this feature, but I would like to if I can ever catch up.
Additional context
Relates to issue #1237
See conversation on Slack at https://kubernetes.slack.com/archives/C01BW364RJA/p1658264659180309
The text was updated successfully, but these errors were encountered: