You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 3, 2021. It is now read-only.
Is this a BUG REPORT or FEATURE REQUEST?:
/kind bug
What happened:
Certificate Authorities, client certs, and server certificates generated as part of the default manifest are not (all) configured with usages.
With kubo_ca, we do not set the key_usage, which results in a CA that doesn't have a usage set for keyCertSign or cRLSign:
- name: kubo_ca
type: certificate
options:
is_ca: true
common_name: ca
While the RFC doesn't explicitly disallow this, it makes little sense to have a CA that doesn't have at leastkeyCertSign.
For server certs, we have tls-kubelet, where we do not set extended_key_usage to make it clear that this cert is intended as the server cert for kubelet's API server (e.g. serverAuth):
The same goes for Docker, Heapster, Dashboard, and so on.
What you expected to happen:
Certs should have both their key_usage and extended_key_usage configured and consistent with one another. It's worth consulting both RFC 5280 and the Credhub API.
How to reproduce it (as minimally and precisely as possible):
Deploy CFCR using manifests/cfcr.yml, check the creds either by pulling them from Credhub, looking at them on the VM, or by using something like openssl s_client against the API servers.
Anything else we need to know?:
Cert names in the manifest are confusing. tls-kubelet-client is not a client cert for the kubelet, but rather a cert that kube-apiserver presents when communicating with the kubelet. It's probably worth revisiting the variable names, but the fact that they're also missing their usages only makes it more confusing.
The text was updated successfully, but these errors were encountered:
Is there a way to work around this in order to complete the tutorial linked above? After approving the request we are not seeing the certificate entering the status of issued.
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Is this a BUG REPORT or FEATURE REQUEST?:
/kind bug
What happened:
Certificate Authorities, client certs, and server certificates generated as part of the default manifest are not (all) configured with usages.
With
kubo_ca
, we do not set thekey_usage
, which results in a CA that doesn't have a usage set forkeyCertSign
orcRLSign
:While the RFC doesn't explicitly disallow this, it makes little sense to have a CA that doesn't have at least
keyCertSign
.For server certs, we have
tls-kubelet
, where we do not setextended_key_usage
to make it clear that this cert is intended as the server cert forkubelet
's API server (e.g.serverAuth
):The same goes for Docker, Heapster, Dashboard, and so on.
What you expected to happen:
Certs should have both their
key_usage
andextended_key_usage
configured and consistent with one another. It's worth consulting both RFC 5280 and the Credhub API.How to reproduce it (as minimally and precisely as possible):
Deploy CFCR using
manifests/cfcr.yml
, check the creds either by pulling them from Credhub, looking at them on the VM, or by using something likeopenssl s_client
against the API servers.Anything else we need to know?:
Cert names in the manifest are confusing.
tls-kubelet-client
is not a client cert for thekubelet
, but rather a cert thatkube-apiserver
presents when communicating with thekubelet
. It's probably worth revisiting the variable names, but the fact that they're also missing their usages only makes it more confusing.The text was updated successfully, but these errors were encountered: