Support internal-encryption to deploy internal certificates automatically#680
Conversation
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: nak3 The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Codecov Report
@@ Coverage Diff @@
## main #680 +/- ##
==========================================
- Coverage 94.85% 94.75% -0.10%
==========================================
Files 41 41
Lines 1243 1221 -22
==========================================
- Hits 1179 1157 -22
Misses 52 52
Partials 12 12
Continue to review full report at Codecov.
|
|
/cc @evankanderson @psschwei @skonto @rhuss net-kourier's unit test is failing but it can be fixed as knative-extensions/net-kourier#855 |
| # | ||
| # NOTE: This flag is in an alpha state and is mostly here to enable internal testing | ||
| # for now. Use with caution. | ||
| activator-ca: "" |
There was a problem hiding this comment.
I guess all that will be in the knative-serving-certs and SAN is set to data-plane.knative.dev
There was a problem hiding this comment.
Should the SAN include a per-namespace component?
|
LGTM let's wait for @evankanderson's approval. |
My initial thought was issue to mark the old configs as deprecated for a release and then drop them in the next one, but it looks like these flags were only added a couple of months ago in #648 , so don't think there's any problem with dropping. |
evankanderson
left a comment
There was a problem hiding this comment.
I love the simplification in configuration! One concern -- I think we should have different SANs per-namespace, to prevent any sort of network-confusion attacks
| # | ||
| # NOTE: This flag is in an alpha state and is mostly here to enable internal testing | ||
| # for now. Use with caution. | ||
| activator-ca: "" |
There was a problem hiding this comment.
Should the SAN include a per-namespace component?
I'm sort of in the same boat as Paul here -- I could go either way given how new this is and how hard the old way was to set up. I think my larger / largest concern about keeping vs dropping values is whether it makes it hard to integrate from this repo to the |
|
/lgtm |
|
(since the SAN is not actually specified in this PR, just mentioned by @skonto 's comment) |
Currently users have to deploy certificates manually with several options such as
activator-san,activator-ca,queue-proxy-caetc.Such deployment and management of the certificates is a big burden for users.
Hence, this patch supports
internal-encryptionconfig to deployinternal certificates automatically.
knative-extensions/net-kourier#855 and knative/serving#13005 demonstrated this change.