Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issue 5514 read cabundle from kube objects - design doc #6228

Open
wants to merge 20 commits into
base: master
Choose a base branch
from

Conversation

AppalaKarthik
Copy link

@AppalaKarthik AppalaKarthik commented Jul 21, 2023

Pull Request Motivation

Design Doc for referencing cabundle using kubernetes native objects(secrets/configmaps)

Issue reference 5514

Kind

Design

@jetstack-bot jetstack-bot added release-note-none Denotes a PR that doesn't merit a release note. dco-signoff: no Indicates that at least one commit in this pull request is missing the DCO sign-off message. needs-kind Indicates a PR lacks a `kind/foo` label and requires one. labels Jul 21, 2023
@jetstack-bot
Copy link
Contributor

Hi @AppalaKarthik. Thanks for your PR.

I'm waiting for a cert-manager member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@jetstack-bot jetstack-bot added needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/L Denotes a PR that changes 100-499 lines, ignoring generated files. kind/design Categorizes issue or PR as related to design. and removed needs-kind Indicates a PR lacks a `kind/foo` label and requires one. labels Jul 21, 2023
@sankalp-at-gh
Copy link

This PR is to review design document for #5514

Signed-off-by: AppalaKarthik <karthik.appala@fmr.com>
Signed-off-by: AppalaKarthik <karthik.appala@fmr.com>
Signed-off-by: AppalaKarthik <karthik.appala@fmr.com>
Signed-off-by: AppalaKarthik <karthik.appala@fmr.com>
Signed-off-by: AppalaKarthik <karthik.appala@fmr.com>
Signed-off-by: AppalaKarthik <karthik.appala@fmr.com>
Signed-off-by: AppalaKarthik <karthik.appala@fmr.com>
Signed-off-by: AppalaKarthik <karthik.appala@fmr.com>
@inteon
Copy link
Member

inteon commented Jul 24, 2023

@AppalaKarthik Thank you for the design document, I think it is ready to be merged (will ask other maintainers to also have a look).
Could you sign-off on all commits? Our DCO check is failing.


### Graduation Criteria

Placing the `caBundleSecetRef` and `caBundleConfigMapRef` specification functionality behind a feature gate should be required.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure that we have to introduce a new feature flag for this.
We also did not introduce a feature flag when we added secret refs for Vault: #5387

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are we watching configmaps in cert-manager already? If not, I think it could make sense to initially add it behind a feature gate.

### Goals

To be able to refer caBundle using secret.
To be able to refer caBundle using configmap.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we should also specify that we want to stay up-to-date with the latest version of the resource (if the resource contents change, we want to start trusting the new CA).
TODO: check if #5387 does this properly & how it does this.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agreed. I think #5387 does this correctly for secrets, ref.

if iss.Spec.Vault.CABundleSecretRef != nil {
if iss.Spec.Vault.CABundleSecretRef.Name == secret.Name {
affected = append(affected, iss)
continue
}
}
(and the same is implemented for cluster issuers).

@inteon
Copy link
Member

inteon commented Sep 21, 2023

@brianwarner could you fix the DCO error?

@inteon inteon added this to the 1.14 milestone Sep 22, 2023
@brianwarner
Copy link

Hi @inteon, it was a merge commit which should generally be excluded from DCO checks. But if it's required and you don't have access to the dco bot config, it's probably best if I just prune the merge commit?

@erikgb
Copy link
Contributor

erikgb commented Sep 25, 2023

merge commit which should generally be excluded from DCO checks

IMO this PR should be rebased and commits squashed. Any reason for not doing this?

@brianwarner
Copy link

That does make a lot more sense, yeah... @AppalaKarthik does that work for you?

@AppalaKarthik
Copy link
Author

AppalaKarthik commented Sep 25, 2023 via email

@inteon inteon removed their assignment Nov 2, 2023
@jetstack-bot
Copy link
Contributor

Thanks for your pull request. Before we can look at it, you'll need to add a 'DCO signoff' to your commits.

📝 Please follow instructions in the contributing guide to update your commits with the DCO

Full details of the Developer Certificate of Origin can be found at developercertificate.org.

The list of commits missing DCO signoff:

  • e080fc4 Design proposal of how cabunc=dle can be read from kube objects
  • 6775330 Renaming file to current date
  • 9d23bb5 Adding author github links
  • 4eeccf2 Adding author github links hyperlinks
  • 39cb4c0 Removing author hyperlinks
  • b626145 Removing author hyperlinks
  • 332ffdb Correcting typos
  • 6624671 Removing unwanted file
  • a83cf94 Merge branch 'issue-5514-read-cabundle-from-kube-objects' of https://github.com/fidelity/cert-manager into issue-5514-read-cabundle-from-kube-objects
  • 076071a Removing clustertrustbundle from design
  • c19d292 Merge branch 'cert-manager:master' into issue-5514-read-cabundle-from-kube-objects
  • a66692a Merge branch 'cert-manager:master' into issue-5514-read-cabundle-from-kube-objects

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@jetstack-bot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign irbekrm for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@inteon inteon modified the milestones: 1.14, 1.15 Jan 3, 2024
@jetstack-bot
Copy link
Contributor

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close.
/lifecycle stale

@jetstack-bot jetstack-bot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Apr 2, 2024
@cert-manager-bot
Copy link
Contributor

Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
If this issue is safe to close now please do so with /close.
/lifecycle rotten
/remove-lifecycle stale

@cert-manager-prow cert-manager-prow bot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels May 2, 2024
@hawksight
Copy link
Member

/remove-lifecycle rotten

@cert-manager-prow cert-manager-prow bot removed the lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. label May 3, 2024
@hawksight
Copy link
Member

/remove-lifecycle stale

@erikgb
Copy link
Contributor

erikgb commented May 5, 2024

@AppalaKarthik Are you able to rebase/squash this PR to make it mergeable? If not, please let us know if you are ok with someone else picking this up.

@inteon inteon modified the milestones: 1.15, 1.16 May 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dco-signoff: no Indicates that at least one commit in this pull request is missing the DCO sign-off message. kind/design Categorizes issue or PR as related to design. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. release-note-none Denotes a PR that doesn't merit a release note. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
Status: Todo
Development

Successfully merging this pull request may close these issues.

None yet

9 participants