Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

automatic service serving cert signer #2324

Merged
merged 1 commit into from Aug 30, 2016

Conversation

deads2k
Copy link
Contributor

@deads2k deads2k commented Jun 21, 2016

Adds documentation for the service serving certificate signer.

@smarterclayton how should we indicate that this is an alpha feature?

@ahardin-rh
Copy link
Contributor

@deads2k Did a review on what you have so far and this looks good 🎆

@smarterclayton
Copy link
Contributor

Yes this is alpha / tech preview.

On Fri, Jul 1, 2016 at 4:20 PM, Ashley Hardin notifications@github.com
wrote:

@deads2k https://github.com/deads2k Did a review on what you have so
far and this looks good 🎆


You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
#2324 (comment),
or mute the thread
https://github.com/notifications/unsubscribe/ABG_p8beeZfdVf4pUWJiQiZv8YWHp4rOks5qRXaUgaJpZM4I6_wu
.

serving certificate/key pair into a secret in your namespace. To do this, set the
"service.alpha.openshift.io/serving-cert-secret-name" to the name you want to use
for your secret. Your PodSpec can then mount that secret and when it is available
your pod will run. The certificate will be good for the internal service DNS name:
Copy link
Member

@sosiouxme sosiouxme Jul 22, 2016

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is/are the file name(s) of the key/cert on the secret? File format?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How long is the cert valid for, and how should renewal be handled?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How long is the cert valid for, and how should renewal be handled?

One year. The controller could be tweaked to find certs that are close to expiry and regenerate them. It hasn't been done yet, but the clock is ticking.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is/are the file name(s) of the key/cert on the secret? File format?

PEM, like our others. tls.crt, tls.key so that it matches the validation requirements for the tls secret type.


To secure communication to your service, you can have the cluster generate a signed
serving certificate/key pair into a secret in your namespace. To do this, set the
"service.alpha.openshift.io/serving-cert-secret-name" to the name you want to use
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

`*service.alpha.openshift.io/serving-cert-secret-name*`

@deads2k
Copy link
Contributor Author

deads2k commented Aug 30, 2016

comments addressed.

@ahardin-rh
Copy link
Contributor

Thanks!

@ahardin-rh ahardin-rh merged commit 067988b into openshift:master Aug 30, 2016
@ahardin-rh
Copy link
Contributor

[rev_history]
|xref:../dev_guide/secrets.adoc#dev-guide-secrets[Secrets]
|Added a new xref:../dev_guide/secrets.adoc#service-serving-certificate-secrets[Service Serving Certificate Secrets] section.
%

@vikram-redhat vikram-redhat modified the milestones: TEMP, OCP 3.3 GA Oct 7, 2016
@vikram-redhat vikram-redhat modified the milestones: OCP 3.3 GA, TEMP Nov 7, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants