Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[kots]: add configuration for using a custom CA certificate #9566

Merged
merged 1 commit into from
Apr 26, 2022

Conversation

mrsimonemms
Copy link
Contributor

@mrsimonemms mrsimonemms commented Apr 26, 2022

Description

Add support for custom CA certs to the KOTS interface. There are three ways of configuring a cert with KOTS

  1. Use cert-manager
  2. Use a self-signed cert
  3. Upload your own certificate - may be made with public or private CA

For 1, no option is provided for a custom CA. It is assumed that this will be made against a public CA - we can keep tabs on whether there's a requirement for this in future. 🛹🛹🛹

image

For 2, this self-signed cert is generated with the same CA used to generate the internal certs (ca-issuer-ca). This PR adds a note to explain how to extract the CA cert to import into the browser. It's expected that this will be used for limited numbers of users.

image

For 3, this adds an optional parameter to add the CA when uploading your certs.

image

Related Issue(s)

Fixes #8559

How to test

Deploy with KOTS. Use version sje-kots-self-signed-certs.4 in dev-sje channel (currently the most recent version in there).

Release Notes

[kots]: add configuration for using a custom CA certificate

Documentation

@mrsimonemms mrsimonemms requested a review from a team April 26, 2022 16:35
@github-actions github-actions bot added the team: delivery Issue belongs to the self-hosted team label Apr 26, 2022
@mrsimonemms mrsimonemms force-pushed the sje/kots-self-signed-certs branch from 18ca596 to 89e4263 Compare April 26, 2022 16:39
@mrsimonemms
Copy link
Contributor Author

mrsimonemms commented Apr 26, 2022

/werft run no-preview publish-to-kots

👍 started the job as gitpod-build-sje-kots-self-signed-certs.2
(with .werft/ from main)

@mrsimonemms mrsimonemms force-pushed the sje/kots-self-signed-certs branch from 89e4263 to 12b6dc3 Compare April 26, 2022 17:15
@mrsimonemms
Copy link
Contributor Author

mrsimonemms commented Apr 26, 2022

/werft run no-preview publish-to-kots

👍 started the job as gitpod-build-sje-kots-self-signed-certs.4
(with .werft/ from main)

@mrsimonemms mrsimonemms marked this pull request as ready for review April 26, 2022 17:17
Copy link
Contributor

@corneliusludmann corneliusludmann left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changes in this PR look good.

Tested both self-signed option as well as own self-signed generated certs with CA. All pods are running, and access to dashboard works. For k3s I needed to configure private registry. However, registry-facade has a TLS error during image build. Need to investage this further but I think it is not an issue of this PR.

@roboquat roboquat merged commit 8a321b5 into main Apr 26, 2022
@roboquat roboquat deleted the sje/kots-self-signed-certs branch April 26, 2022 20:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
release-note size/M team: delivery Issue belongs to the self-hosted team
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Support own CA certificate / self-signed certificated for self-hosted installations
3 participants