-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement certificate management #193
Comments
@m-ildefons I'm also making experiments with certificate management since it is a hot topic for the integration with Epinio. |
I suggest to go with: https://cert-manager.io/ |
The helm chart should allow to specify the clusterIssuer or Issuer that should be used with the ingress so that the SSL certificates can be created and maintaied automatically by cert-manager. |
Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager is a prerequisite. - Usage of cert-manager is enabled by default and can be controlled by the chart field: - useCertManager - The certificate manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When installing a certificate manager, the user can choose between two predefined ClusterIssuer: - s3gw-ca - s3gw-letsencrypt - s3gw-ca can be used to generate self-signed certificates. - s3gw-letsencrypt should be used for production environments. - Please, note that when using a certificate manager, the s3gw-ca ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ a certificate manager, TLS secrets must be filled manually. A series of fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the chart fields: - useCustomTlsIssuer and customTlsIssuer Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager is a prerequisite. - Usage of cert-manager is enabled by default and can be controlled by the chart field: - useCertManager - The certificate manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When installing a certificate manager, the user can choose between two predefined ClusterIssuer: - s3gw-ca - s3gw-letsencrypt - s3gw-ca can be used to generate self-signed certificates. - s3gw-letsencrypt should be used for production environments. - Please, note that when using a certificate manager, the s3gw-ca ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ a certificate manager, TLS secrets must be filled manually. A series of fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the chart fields: - useCustomTlsIssuer and customTlsIssuer - Removed configuration options superseded by the newly added variables: - `tls.crt`, `tls.key` - `ui.tls.crt`, `ui.tls.key` Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager is a prerequisite. - Usage of cert-manager is enabled by default and can be controlled by the chart field: - useCertManager - The certificate manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When installing a certificate manager, the user can choose between two predefined ClusterIssuer: - s3gw-ca - s3gw-letsencrypt - s3gw-ca can be used to generate self-signed certificates. - s3gw-letsencrypt should be used for production environments. - Please, note that when using a certificate manager, the s3gw-ca ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ a certificate manager, TLS secrets must be filled manually. A series of fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the chart fields: - useCustomTlsIssuer and customTlsIssuer - Removed configuration options superseded by the newly added variables: - `tls.crt`, `tls.key` - `ui.tls.crt`, `ui.tls.key` Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager is a prerequisite. - Usage of cert-manager is enabled by default and can be controlled by the chart field: - useCertManager - The certificate manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When installing a certificate manager, the user can choose between two predefined ClusterIssuer: - s3gw-ca - s3gw-letsencrypt - s3gw-ca can be used to generate self-signed certificates. - s3gw-letsencrypt should be used for production environments. - Please, note that when using a certificate manager, the s3gw-ca ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ a certificate manager, TLS secrets must be filled manually. A series of fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the chart fields: - useCustomTlsIssuer and customTlsIssuer - Removed configuration options superseded by the newly added variables: - `tls.crt`, `tls.key` - `ui.tls.crt`, `ui.tls.key` Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager is a prerequisite. - Usage of cert-manager is enabled by default and can be controlled by the chart field: - useCertManager - The certificate manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When installing a certificate manager, the user can choose between two predefined ClusterIssuer: - s3gw-ca - s3gw-letsencrypt - s3gw-ca can be used to generate self-signed certificates. - s3gw-letsencrypt should be used for production environments. - Please, note that when using a certificate manager, the s3gw-ca ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ a certificate manager, TLS secrets must be filled manually. A series of fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the chart fields: - useCustomTlsIssuer and customTlsIssuer - Removed configuration options superseded by the newly added variables: - `tls.crt`, `tls.key` - `ui.tls.crt`, `ui.tls.key` Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager is a prerequisite. - Usage of cert-manager is enabled by default and can be controlled by the chart field: - useCertManager - The certificate manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When installing a certificate manager, the user can choose between two predefined ClusterIssuer: - s3gw-ca - s3gw-letsencrypt - s3gw-ca can be used to generate self-signed certificates. - s3gw-letsencrypt should be used for production environments. - Please, note that when using a certificate manager, the s3gw-ca ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ a certificate manager, TLS secrets must be filled manually. A series of fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the chart fields: - useCustomTlsIssuer and customTlsIssuer - Removed configuration options superseded by the newly added variables: - `tls.crt`, `tls.key` - `ui.tls.crt`, `ui.tls.key` Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager is a prerequisite. - Usage of cert-manager is enabled by default and can be controlled by the chart field: - useCertManager - The certificate manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When installing a certificate manager, the user can choose between two predefined ClusterIssuer: - s3gw-ca - s3gw-letsencrypt - s3gw-ca can be used to generate self-signed certificates. - s3gw-letsencrypt should be used for production environments. - Please, note that when using a certificate manager, the s3gw-ca ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ a certificate manager, TLS secrets must be filled manually. A series of fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the chart fields: - useCustomTlsIssuer and customTlsIssuer - Removed configuration options superseded by the newly added variables: - `tls.crt`, `tls.key` - `ui.tls.crt`, `ui.tls.key` Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager is a prerequisite. - Usage of cert-manager is enabled by default and can be controlled by the chart field: - useCertManager - The certificate manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When installing a certificate manager, the user can choose between two predefined ClusterIssuer: - s3gw-ca - s3gw-letsencrypt - s3gw-ca can be used to generate self-signed certificates. - s3gw-letsencrypt should be used for production environments. - Please, note that when using a certificate manager, the s3gw-ca ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ a certificate manager, TLS secrets must be filled manually. A series of fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the chart fields: - useCustomTlsIssuer and customTlsIssuer - Removed configuration options superseded by the newly added variables: - `tls.crt`, `tls.key` - `ui.tls.crt`, `ui.tls.key` Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager is a prerequisite. - Usage of cert-manager is enabled by default and can be controlled by the chart field: - useCertManager - The certificate manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When installing a certificate manager, the user can choose between two predefined ClusterIssuer: - s3gw-ca - s3gw-letsencrypt - s3gw-ca can be used to generate self-signed certificates. - s3gw-letsencrypt should be used for production environments. - Please, note that when using a certificate manager, the s3gw-ca ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ a certificate manager, TLS secrets must be filled manually. A series of fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the chart fields: - useCustomTlsIssuer and customTlsIssuer - Removed configuration options superseded by the newly added variables: - `tls.crt`, `tls.key` - `ui.tls.crt`, `ui.tls.key` Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager is a prerequisite. - Usage of cert-manager is enabled by default and can be controlled by the chart field: - useCertManager - The certificate manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When installing a certificate manager, the user can choose between two predefined ClusterIssuer: - s3gw-ca-issuer - s3gw-letsencrypt-issuer - s3gw-ca-issuer can be used to generate self-signed certificates. - s3gw-letsencrypt-issuer should be used for production environments. - Please, note that when using a certificate manager, s3gw-ca-issuer ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ a certificate manager, TLS secrets must be filled manually. A series of fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the chart fields: - useCustomTlsIssuer and customTlsIssuer - Removed configuration options superseded by the newly added variables: - `tls.crt`, `tls.key` - `ui.tls.crt`, `ui.tls.key` Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager is a prerequisite. - Usage of cert-manager is enabled by default and can be controlled by the chart field: - useCertManager - The certificate manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When installing a certificate manager, the user can choose between two predefined ClusterIssuer: - s3gw-ca-issuer - s3gw-letsencrypt-issuer - s3gw-ca-issuer can be used to generate self-signed certificates. - s3gw-letsencrypt-issuer should be used for production environments. - Please, note that when using a certificate manager, s3gw-ca-issuer ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ a certificate manager, TLS secrets must be filled manually. A series of fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the chart fields: - useCustomTlsIssuer and customTlsIssuer - Removed configuration options superseded by the newly added variables: - `tls.crt`, `tls.key` - `ui.tls.crt`, `ui.tls.key` Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager installation is a prerequisite. - Usage of cert-manager is enabled by default and can be disabled with the flag: - useCertManager - cert-manager namespace can be set with the following chart field: - certManagerNamespace - cert-manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When using cert-manager, the user can choose between two predefined ClusterIssuer: - s3gw-issuer - s3gw-letsencrypt-issuer - s3gw-issuer can be used to generate self-signed certificates. - s3gw-letsencrypt-issuer should be used for production environments. - Please, note that when using a certificate manager, the s3gw-issuer ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ cert-manager, TLS secrets must be filled manually. The following fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the following chart fields: - useCustomTlsIssuer and customTlsIssuer - Configuration options superseded by the newly added variables: - tls.crt, tls.key - ui.tls.crt, ui.tls.key Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager installation is a prerequisite. - Usage of cert-manager is enabled by default and can be disabled with the flag: - useCertManager - cert-manager namespace can be set with the following chart field: - certManagerNamespace - cert-manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When using cert-manager, the user can choose between two predefined ClusterIssuer: - s3gw-issuer - s3gw-letsencrypt-issuer - s3gw-issuer can be used to generate self-signed certificates. - s3gw-letsencrypt-issuer should be used for production environments. - Please, note that when using a certificate manager, the s3gw-issuer ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ cert-manager, TLS secrets must be filled manually. The following fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the following chart fields: - useCustomTlsIssuer and customTlsIssuer - Configuration options superseded by the newly added variables: - tls.crt, tls.key - ui.tls.crt, ui.tls.key Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager installation is a prerequisite. - Usage of cert-manager is enabled by default and can be disabled with the flag: - useCertManager - cert-manager namespace can be set with the following chart field: - certManagerNamespace - cert-manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When using cert-manager, the user can choose between two predefined ClusterIssuer: - s3gw-issuer - s3gw-letsencrypt-issuer - s3gw-issuer can be used to generate self-signed certificates. - s3gw-letsencrypt-issuer should be used for production environments. - Please, note that when using a certificate manager, the s3gw-issuer ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ cert-manager, TLS secrets must be filled manually. The following fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the following chart fields: - useCustomTlsIssuer and customTlsIssuer - Configuration options superseded by the newly added variables: - tls.crt, tls.key - ui.tls.crt, ui.tls.key Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager installation is a prerequisite. - Usage of cert-manager is enabled by default and can be disabled with the flag: - useCertManager - cert-manager namespace can be set with the following chart field: - certManagerNamespace - cert-manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When using cert-manager, the user can choose between two predefined ClusterIssuer: - s3gw-issuer - s3gw-letsencrypt-issuer - s3gw-issuer can be used to generate self-signed certificates. - s3gw-letsencrypt-issuer should be used for production environments. - Please, note that when using a certificate manager, the s3gw-issuer ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ cert-manager, TLS secrets must be filled manually. The following fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the following chart fields: - useCustomTlsIssuer and customTlsIssuer - Configuration options superseded by the newly added variables: - tls.crt, tls.key - ui.tls.crt, ui.tls.key Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager installation is a prerequisite. - Usage of cert-manager is enabled by default and can be disabled with the flag: - useCertManager - cert-manager namespace can be set with the following chart field: - certManagerNamespace - cert-manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When using cert-manager, the user can choose between two predefined ClusterIssuer: - s3gw-issuer - s3gw-letsencrypt-issuer - s3gw-issuer can be used to generate self-signed certificates. - s3gw-letsencrypt-issuer should be used for production environments. - Please, note that when using a certificate manager, the s3gw-issuer ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ cert-manager, TLS secrets must be filled manually. The following fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the following chart fields: - useCustomTlsIssuer and customTlsIssuer - Configuration options superseded by the newly added variables: - tls.crt, tls.key - ui.tls.crt, ui.tls.key Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
- Ability to use an optional certificate manager: cert-manager, to automatically provision TLS certificates. When using such feature, cert-manager installation is a prerequisite. - Usage of cert-manager is enabled by default and can be disabled with the flag: - useCertManager - cert-manager namespace can be set with the following chart field: - certManagerNamespace - cert-manager will provision certificates for: - S3 service's ingress (public domain) - UI service's ingress (public domain) - S3 service's internal endpoint (Kubernetes private domain) - When using cert-manager, the user can choose between two predefined ClusterIssuer: - s3gw-issuer - s3gw-letsencrypt-issuer - s3gw-issuer can be used to generate self-signed certificates. - s3gw-letsencrypt-issuer should be used for production environments. - Please, note that when using a certificate manager, the s3gw-issuer ClusterIssuer will be used for generating certificates for the S3 service's internal endpoint. - When the user chooses not to employ cert-manager, TLS secrets must be filled manually. The following fields have been added to the chart for this purpose: - tls.publicDomain.crt - tls.publicDomain.key - tls.privateDomain.crt - tls.privateDomain.key - tls.ui.publicDomain.crt - tls.ui.publicDomain.key - The user can choose a custom ClusterIssuer by setting the following chart fields: - useCustomTlsIssuer and customTlsIssuer - Configuration options superseded by the newly added variables: - tls.crt, tls.key - ui.tls.crt, ui.tls.key Fixes: aquarist-labs/s3gw-tools#193 Signed-off-by: Giuseppe Baccini <giuseppe.baccini@suse.com>
tools: Fix test container Dockerfile
What needs to be done
Implement certificate management.
Why it needs to be done
To allow accepting SSL connections.
Acceptance Criteria
Additional Information
The text was updated successfully, but these errors were encountered: