You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Aug 12, 2024. It is now read-only.
We use cert-manager to generate a rukpak-wide CA, and then use that CA to sign all of the certs for rukpak services. Clients of rukpak then need to read that CA to be able to verify connections to those rukpak services.
Currently, the situation is that clients read the rukpak-ca secret's data["ca.crt"] value to get the CA cert. However, that secret also contains the CA's key, which clients could use to sign more keys that would be trusted by anyone using the CA.
We need to ensure that the object read by clients contains only the CA cert. It seems like cert-manager does not support this out of the box (see cert-manager/cert-manager#2722 (comment)), so we may need to run our own controller that knows how to inject the CA into a separate configmap.