Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handling secrets #19

Open
jameseck opened this issue Jun 12, 2017 · 3 comments
Open

Handling secrets #19

jameseck opened this issue Jun 12, 2017 · 3 comments

Comments

@jameseck
Copy link
Contributor

I'm opening this issue to see how you feel about dealing with secrets as well as routes.
An example use case that I have is postfix and dovecot deployments. There are no routes involved.

@ibotty
Copy link
Owner

ibotty commented Jun 13, 2017

Can you please clarify. Would you like to get certificates for non-web services? That's a great use case. Albeit it's a little limited in that openshift-letsencrypt only does http validation (... yet, although I have no plans to change that myself) and so DNS entries for postfix and dovecot have to point to openshift's load balancer.

I propose the following way. Create a dummy route for these deployments (not backed by any deployment) with an annotation, say, butter.sh/letsencrypt-crt-secret. openshift-letsencrypt would then get a certificate as usual but additionally store the certificate in the named secret.

I can see the following fundamental problem. There is no general way to notify the application on certificate changes. I have no Idea on how to do that without using a sidecar container for every service.

What do you think?

BTW: patches of course welcome, but even documenting the desired flow would be very appreciated!

@jameseck
Copy link
Contributor Author

jameseck commented Jun 13, 2017 via email

@ibotty
Copy link
Owner

ibotty commented Jul 13, 2017

What's the problem with a dummy route? I can't think of any problem.

Redeploying is a pretty big hammer though. I suspect one should just use a sidecar that sends a sighup. Would you like to give a shot at implementing storing in secrets? You might have a look at the git history of this repo, it contains most of the code already.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants