-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: make cert-manager optional #422
Comments
An alternative, suggested by Anurag on k8s slack, is to use the certificate generation functions from Helm. |
If I understand correctly, we could have helm generate a CA and then have helm generate a certificate signed by this CA. By doing that, we would be able to completely drop the cert-manager dependency. This sounds cool, however I have two questions:
Maybe Anurag knows it, I cannot mention him over here because I don't know his GitHub handle (I've pinged him on slack in the meantime) |
|
Ok, let's make a try with that. Keep in mind that, on top of generating the CA and the certificate, we must also update the Right now the |
Done on #7 |
Is your feature request related to a problem?
Currently Kubewarden installation required cert-manager to be installed. cert-manager is used to create the internal certifcate used to secure the communication between the Kubernetes API server and the dynamic admission controller hosted by the kubewarden-controller.
This webhook endpoint is used by the kubewarden-controller to perform validation of the CRD defined by Kubewarden.
Note well: each Policy Server service (one per PolicyServer CRD) has its own CA. In this case, the certificates are generated by the kubewarden controller itself.
Some users are not comfortable installing cert-manager on their clusters, hence they would like to make this an optional dependency.
Solution you'd like
This is a certificate used internally by Kubernetes. The service secured by it is not reachable outside of the cluster. Hence I think it doesn't make sense to have the user provide this certificate manually (like have this certificate signed by the user CA authority).
I think it would make sense to have the kubewarden-controller generate this certificate, maybe reusing the same code already in place to handle the Policy Server certificates.
Alternatives you've considered
No response
Anything else?
We have to ensure the certificate is properly rotated whenever it approaches its expiration.
The text was updated successfully, but these errors were encountered: