Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for using AutoCert and External certificates #336

Merged
merged 1 commit into from
Oct 15, 2020

Conversation

Alevsk
Copy link
Contributor

@Alevsk Alevsk commented Oct 13, 2020

  • AutoCert is enabled by default, certificates will be generated for MinIO and Console and/or KES (if configuration is present)
  • User can choose to use automatic generated certificates and still provide his own certificates too, ie: if the tenant name is minio then minio-operator will generate certificates for "minio.namespace.svc.cluster.local", "minio-hl.namespace.svc.cluster.local" and "*.minio.namespace.svc.cluster.local", these certificates will be used for internal communication, in top of that user can provide extra certificates, eg: "play.min.io" and expose the minio cluster directly to the Internet under that subdomain.
  • Customer provided certificates will replace autogenerated certificates for Console, KES and Minio Client Certificates (the ones used for mTLS between MinIO and KES), in the case of MinIO the certificates will be added to a pool of certificates served via SNI.

Test

To test this PR simply use the yaml file under kubectl apply -f examples/tenant-with-autocert-and-custom-certs-encryption-enabled.yaml. This Yaml file will deploy a minio tenant with autocert enabled, certificates will be generated for minio for internal communications, for KES server and for the authentication between MinIO and KES (externalClientCertSecret), additionally external certificates are passed for MinIO (localhost domain) and Console (localhost domain)

@Alevsk Alevsk force-pushed the autocert-externalcerts branch from 0cf6bfc to 967ac4b Compare October 13, 2020 17:16
@Alevsk Alevsk self-assigned this Oct 13, 2020
@Alevsk Alevsk added the wip label Oct 13, 2020
@Alevsk Alevsk force-pushed the autocert-externalcerts branch from 967ac4b to 7d5f3ef Compare October 13, 2020 21:46
@Alevsk Alevsk removed the wip label Oct 13, 2020
harshavardhana
harshavardhana previously approved these changes Oct 14, 2020
aead
aead previously approved these changes Oct 14, 2020
Copy link
Contributor

@nitisht nitisht left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM & Tested (without KES). Small nit in the doc

- AutoCert is enabled by default, certificates will be generated for
  MinIO and Console and/or KES (if configuration is present)
- User can choose to use automatic generated certificates and still provide
  his own certificates too, ie: if the tenant name is `minio` then
minio-operator will generate certificates for
`"minio.namespace.svc.cluster.local"`,
`"minio-hl.namespace.svc.cluster.local"` and
`"*.minio.namespace.svc.cluster.local"`, these certificates will be used
for internal communication, in top of that user can provide extra
certificates, eg: `"play.min.io"` and expose the minio cluster directly
to the Internet under that subdomain.
- Customer provided certificates will replace autogenerated certificates
  for `Console`, `KES` and `Minio Client Certificates` (the ones used
for mTLS between MinIO and KES), in the case of MinIO the certificates
will be added to a pool of certificates to serve via SNI.
@Alevsk Alevsk dismissed stale reviews from aead and harshavardhana via 7d716be October 14, 2020 19:48
@Alevsk Alevsk force-pushed the autocert-externalcerts branch from 7d5f3ef to 7d716be Compare October 14, 2020 19:48
@harshavardhana harshavardhana merged commit 36b7477 into minio:master Oct 15, 2020
@Alevsk Alevsk deleted the autocert-externalcerts branch October 15, 2020 00:12
jmontleon added a commit to jmontleon/operator that referenced this pull request Jul 23, 2024
Signed-off-by: Jason Montleon <jmontleo@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants