Skip to content
Snippets Groups Projects
Unverified Commit b7eb1cf9 authored by Antoine Gatineau's avatar Antoine Gatineau Committed by GitHub
Browse files

cert-manager: add trusted internal ca when configured (#8135)

* cert-manager: add trusted internal ca when configured

* wrong check for inventory variable

* Update documentation
parent 6e5b9e0e
No related branches found
No related tags found
No related merge requests found
...@@ -88,6 +88,20 @@ Certificates issued by public ACME servers are typically trusted by client’s c ...@@ -88,6 +88,20 @@ Certificates issued by public ACME servers are typically trusted by client’s c
- [DNS01 Challenges](https://cert-manager.io/v1.5-docs/configuration/acme/dns01/) - [DNS01 Challenges](https://cert-manager.io/v1.5-docs/configuration/acme/dns01/)
- [ACME FAQ](https://cert-manager.io/v1.5-docs/faq/acme/) - [ACME FAQ](https://cert-manager.io/v1.5-docs/faq/acme/)
#### ACME With An Internal Certificate Authority
The ACME Issuer with an internal certificate authority requires cert-manager to trust the certificate authority. This trust must be done at the cert-manager deployment level.
To add a trusted certificate authority to cert-manager, add it's certificate to `group_vars/k8s-cluster/addons.yml`:
```yaml
cert_manager_trusted_internal_ca: |
-----BEGIN CERTIFICATE-----
[REPLACE with your CA certificate]
-----END CERTIFICATE-----
```
Once the CA is trusted, you can define your issuer normally.
### Create New TLS Root CA Certificate and Key ### Create New TLS Root CA Certificate and Key
#### Install Cloudflare PKI/TLS `cfssl` Toolkit #### Install Cloudflare PKI/TLS `cfssl` Toolkit
......
...@@ -129,6 +129,10 @@ ingress_alb_enabled: false ...@@ -129,6 +129,10 @@ ingress_alb_enabled: false
# Cert manager deployment # Cert manager deployment
cert_manager_enabled: false cert_manager_enabled: false
# cert_manager_namespace: "cert-manager" # cert_manager_namespace: "cert-manager"
# cert_manager_trusted_internal_ca: |
# -----BEGIN CERTIFICATE-----
# [REPLACE with your CA certificate]
# -----END CERTIFICATE-----
# MetalLB deployment # MetalLB deployment
metallb_enabled: false metallb_enabled: false
......
...@@ -875,6 +875,17 @@ spec: ...@@ -875,6 +875,17 @@ spec:
resources: resources:
{} {}
--- ---
{% if cert_manager_trusted_internal_ca is defined %}
apiVersion: v1
data:
internal-ca.pem: |
{{ cert_manager_trusted_internal_ca | indent(width=4, indentfirst=False) }}
kind: ConfigMap
metadata:
name: ca-internal-truststore
namespace: {{ cert_manager_namespace }}
---
{% endif %}
# Source: cert-manager/templates/deployment.yaml # Source: cert-manager/templates/deployment.yaml
apiVersion: apps/v1 apiVersion: apps/v1
kind: Deployment kind: Deployment
...@@ -928,6 +939,17 @@ spec: ...@@ -928,6 +939,17 @@ spec:
fieldPath: metadata.namespace fieldPath: metadata.namespace
resources: resources:
{} {}
{% if cert_manager_trusted_internal_ca is defined %}
volumeMounts:
- mountPath: /etc/ssl/certs/internal-ca.pem
name: ca-internal-truststore
subPath: internal-ca.pem
volumes:
- configMap:
defaultMode: 420
name: ca-internal-truststore
name: ca-internal-truststore
{% endif %}
--- ---
# Source: cert-manager/templates/webhook-deployment.yaml # Source: cert-manager/templates/webhook-deployment.yaml
apiVersion: apps/v1 apiVersion: apps/v1
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment