-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deployment fails for TLS certificates via cert-manager and ACME #134
Comments
@miclip : Thanks for filing this, this is useful feedback.
But this is confusing. How are we supposed to discover the CA cert in such cases? Is this supposed to a mechanism of distribution outside of k8s and the customer manually specifies the ca.crt in such cases? |
|
k explain certificate.spec.commonName
KIND: Certificate
VERSION: cert-manager.io/v1
FIELD: commonName <string>
DESCRIPTION:
CommonName is a common name to be used on the Certificate. The CommonName
should have a length of 64 characters or fewer to avoid generating invalid
CSRs. This value is ignored by TLS clients when any subject alt name is
set. This is x509 behaviour:
https://tools.ietf.org/html/rfc6125#section-6.4.4 So you should be able to just not set the CN provided you always set the SANs, which should work for self signed and ACME etc. I see in certs that are requested as a result of Ingress annotations, cert-manager never sets the CN. |
@miclip : ok, got it. We are planning to iterate on the cert-manager functionality soon and will take this feedback into account. |
Edit: Oups i forgot to read the full issue before, below patch helps but not for the CA. I have the same issue, so i used a kustomization to patch the helm chart:
(where homelab.expansible.io is my own domain) However after the patch owrks, it still fails because there is no |
Using a cluster issue for Let's Encrypt over ACME fails. Let's encrypt requires that if the common name is set, the same value must also be listed as a SAN. The
yugabyte
helm chart is hard-coding the common name. In addition, the TLS secret that is created does not contain the CA, thestatefulset
is expecting to mount the CA from the TLS secret as a volume.I believe these are not unique to let's encrypt and corporate PKI solutions will have the same CSR requirements, and not return the CA within the TLS secret cert-manager generates.
The text was updated successfully, but these errors were encountered: