Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for externally managed certificates for OpenShift #808

Open
rbogendoerfer opened this issue Sep 10, 2024 · 0 comments
Open

Add support for externally managed certificates for OpenShift #808

rbogendoerfer opened this issue Sep 10, 2024 · 0 comments
Labels
enhancement New feature or request

Comments

@rbogendoerfer
Copy link
Contributor

Problem description
While the TLS certificates for most cluster variants can be specified through a secret, in OpenShift the certificate and private key for TLS have to be specified in the values.yaml file. This is a security weakness as the private key is confidential data and needs to be kept secure. Hence clients are asking for a possibility to specify TLS certificates as secret also for OpenShift.

Proposed solution
Add support for Openshift external certificates for the OpenShift route. See Creating a route with externally managed certificate for details.
In the values.yaml file add some property to specify the secret name for the external certificate. If tls is enabled and this property is set, configure the route with the certificate from the secret, otherwise use the other certificate properties (certificate, key, cacertificate).

Workaround
As a workaround the ingress creation can be suppressed by setting ingress.enabled to false and manually creating a route, which references an external certificate secret.

@rbogendoerfer rbogendoerfer added the enhancement New feature or request label Sep 10, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant