Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow controller to issue certificates into cert manager instead of secrets #96

Open
Embraser01 opened this issue Jul 20, 2022 · 3 comments
Labels
enhancement New feature or request

Comments

@Embraser01
Copy link
Member

Embraser01 commented Jul 20, 2022

The idea would be to use another storage adapter that would create cert-manager certificates.
Coupled with a new configuration that would create self-signed certificates, it could manage internal certificates of a k8s cluster

More infos here: https://twitter.com/ahmetb/status/1549596091380682757

@Embraser01 Embraser01 added the enhancement New feature or request label Jul 20, 2022
@mholt
Copy link
Member

mholt commented Jul 20, 2022

Could cert-manager be eliminated altogether?

@ahmetb
Copy link

ahmetb commented Jul 20, 2022

I think my motive is to have self-signed certificates placed into a Kubernetes Secret object for my Kubernetes admission webhook to read from (or have an ingress like caddy in front do this) as well as the component update the MutatingWebhookConfiguration / ValidatingWebhookConfiguration objects' caBundle fields with the self-signed cert's CA cert as it is provisioned/renewed.

I'm not entirely sure if this is any interesting to Caddy's ingress as I think this use case can be achieved without an ingress as well.

@Embraser01
Copy link
Member Author

Could cert-manager be eliminated altogether?

Don't think so. We could add an option to let caddy act as an issuer for certmanager, but we would still need the certmanager controller to handle most of the logic (which is complex: https://cert-manager.io/docs/concepts/certificate/)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants