-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Custom CA with type: kubernetes.io/tls secret #2
Comments
Sorry, I'm not sure I follow it. This repository is an example of how you can use custom CAs with Strimzi. the custom CAs are generated with the CFSSL utility. It has nothing to do with CertManager. |
Desired state: Strimzi uses secrets of type: kubernetes.io/tls Trying to use kubernetes.io/tls secrets results in NullPointerException. |
So, I do not think this is the right place to raise this issue. This is just an example repo used for testing and to show how to use the custom CAs. Opening an issue here will not change anything in Strimzi - for that you would need to open an issue there. That said, the Custom CA functionality in Strimzi right now does not integrate with Cert Manager. If you want to use a custom CA created by Cert Manager, you need to copy it to the Strimzi secrets and set proper generation annotations that are used to drive renewals etc. So this goes way beyond some Secret type. Also, I'm not sure what value would you get out of it because Strimzi would not use Cert Manager for anything. It would take the CA and use it to issue its own server certificates on its own. I do not expect that this will change in anyway outside of the strimzi/proposals#135 proposal that focuses on integration with external certificate managers. So probably the best/only thing you can do right now is to review that proposal. |
I agree. I.e. I have this Strimzi cert: But as of now i need to copy paste it like this In order to use it as source for ClusterIssuer But as you said, this should be discussed in strimzi/proposals#135. Thanks, lets close this issue. |
Yeah, but as I said, it is not so simple. You need to maintain the generations, older versions of the CA etc. So it is a bit more complicated. |
When I want to use my own CA with external TLS authentication, i required to create my own secrets:
i.e.
This is completly fine until I want this key to be used by cert-manager that requires tls-type of secrets. So I tried to change the secret type from Opaque to kubernetes.io/tls and duplicated the ca.key and tls.key to conain the same value.
But when I do that, the strimzi cluster does not start anymore with NullPointerException:
$ oc describe kafka b01
It seems Strimzi accepts only Opaque secrets, but I would prefer to use tls types instead. Workaround is to create multiple secrets (one opaque and one type: kubernetes.io/tls), but this just doesnt feel right. I would prefer to have just one. Is this desired behavior? Can I create pull-secret to fix this? Or what is the decision behind this behavior?
The text was updated successfully, but these errors were encountered: