Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Addon] Add Let's Encrypt ACME Configuration in traefik Addon #368

Open
2 tasks
charlie0129 opened this issue Jun 7, 2022 · 6 comments
Open
2 tasks

[Addon] Add Let's Encrypt ACME Configuration in traefik Addon #368

charlie0129 opened this issue Jun 7, 2022 · 6 comments

Comments

@charlie0129
Copy link
Member

charlie0129 commented Jun 7, 2022

The traefik helm chart has included support for ACME certificate resolver configuration through helm Values: traefik/traefik-helm-chart#419

Currently, we need to manually input cert and key with traefik addon.

It is better if Let's Encrypt ACME is supported.

  • Support multiple domains in cert-manager.
  • Tutorial on how to use cert-manager and traefik together
@barnettZQG
Copy link
Collaborator

@charlie0129 Good proposal, do you contribute?

@charlie0129
Copy link
Member Author

charlie0129 commented Jun 7, 2022

Sure, then I will work on this later.

@wonderflow
Copy link
Collaborator

why don't add let's encriypt as an addon, so other addon can dependsOn it if they need mTLS.

@charlie0129
Copy link
Member Author

IMO, it is just used for one-way TLS on the public Internet (or k8s Ingress)? Not so sure if it is widely used for mTLS.

@wonderflow
Copy link
Collaborator

Yes, it's popular, you can check: https://cloud.redhat.com/blog/using-kubernetes-operators-to-manage-lets-encrypt-ssl-tls-certificates-for-red-hat-openshift-dedicated

I'm not sure if there's any better alternatives.

@charlie0129
Copy link
Member Author

Very informative. I will check how it is achievable using addons.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants