-
Notifications
You must be signed in to change notification settings - Fork 689
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enforce the use of kubernetes.io/tls
secret types.
#1697
Labels
priority/important-soon
Must be staffed and worked on either currently, or very soon, ideally in time for the next release.
Milestone
Comments
davecheney
added
the
priority/important-soon
Must be staffed and worked on either currently, or very soon, ideally in time for the next release.
label
Oct 14, 2019
I'm working on this next. |
Related to #1702 |
Proposed rules:
|
jpeach
added a commit
to jpeach/contour
that referenced
this issue
Oct 16, 2019
Clarify the validation of the types of secrets that Contour will accept for TLS key+cert pairs and CA certificate bundles. Contour only accepts TLS key+cert pairs from secrets of type "kubernetes.io/tls". These secrets may contain an additional "ca.crt" field that stores the CA certificate bundle. Contour will otherwise accept CA certificate bundles from generic secrets (whose type is "Opaque" or is empty). Contour will ignore all other types of secrets. This fixes projectcontour#1697. Signed-off-by: James Peach <[email protected]>
jpeach
added a commit
to jpeach/contour
that referenced
this issue
Oct 16, 2019
Clarify the validation of the types of secrets that Contour will accept for TLS key+cert pairs and CA certificate bundles. Contour only accepts TLS key+cert pairs from secrets of type "kubernetes.io/tls". These secrets may contain an additional "ca.crt" field that stores the CA certificate bundle. Contour will otherwise accept CA certificate bundles from generic secrets (whose type is "Opaque" or is empty). Contour will ignore all other types of secrets. This fixes projectcontour#1697. Signed-off-by: James Peach <[email protected]>
jpeach
added a commit
to jpeach/contour
that referenced
this issue
Oct 16, 2019
Clarify the validation of the types of secrets that Contour will accept for TLS key+cert pairs and CA certificate bundles. Contour only accepts TLS key+cert pairs from secrets of type "kubernetes.io/tls". These secrets may contain an additional "ca.crt" field that stores the CA certificate bundle. Contour will otherwise accept CA certificate bundles from generic secrets (whose type is "Opaque" or is empty). Contour will ignore all other types of secrets. This fixes projectcontour#1697. Signed-off-by: James Peach <[email protected]>
jpeach
added a commit
to jpeach/contour
that referenced
this issue
Oct 17, 2019
Clarify the validation of the types of secrets that Contour will accept for TLS key+cert pairs and CA certificate bundles. Contour only accepts TLS key+cert pairs from secrets of type "kubernetes.io/tls". These secrets may contain an additional "ca.crt" field that stores the CA certificate bundle. Contour will otherwise accept CA certificate bundles from generic secrets (whose type is "Opaque" or is empty). Contour will ignore all other types of secrets. This fixes projectcontour#1697. Signed-off-by: James Peach <[email protected]>
jpeach
added a commit
to jpeach/contour
that referenced
this issue
Oct 17, 2019
Clarify the validation of the types of secrets that Contour will accept for TLS key+cert pairs and CA certificate bundles. Contour only accepts TLS key+cert pairs from secrets of type "kubernetes.io/tls". These secrets may contain an additional "ca.crt" field that stores the CA certificate bundle. Contour will otherwise accept CA certificate bundles from generic secrets (whose type is "Opaque" or is empty). Contour will ignore all other types of secrets. This fixes projectcontour#1697. Signed-off-by: James Peach <[email protected]>
jpeach
added a commit
to jpeach/contour
that referenced
this issue
Oct 18, 2019
Clarify the validation of the types of secrets that Contour will accept for TLS key+cert pairs and CA certificate bundles. Contour only accepts TLS key+cert pairs from secrets of type "kubernetes.io/tls". These secrets may contain an additional "ca.crt" field that stores the CA certificate bundle. Contour will otherwise accept CA certificate bundles from generic secrets (whose type is "Opaque" or is empty). Contour will ignore all other types of secrets. This fixes projectcontour#1697. Signed-off-by: James Peach <[email protected]>
jpeach
added a commit
to jpeach/contour
that referenced
this issue
Oct 18, 2019
Clarify the validation of the types of secrets that Contour will accept for TLS key+cert pairs and CA certificate bundles. Contour only accepts TLS key+cert pairs from secrets of type "kubernetes.io/tls". These secrets may contain an additional "ca.crt" field that stores the CA certificate bundle. Contour will otherwise accept CA certificate bundles from generic secrets (whose type is "Opaque" or is empty). Contour will ignore all other types of secrets. This fixes projectcontour#1697. Signed-off-by: James Peach <[email protected]>
Document this per #1415 |
jpeach
added a commit
to jpeach/contour
that referenced
this issue
Oct 18, 2019
Clarify the validation of the types of secrets that Contour will accept for TLS key+cert pairs and CA certificate bundles. Contour only accepts TLS key+cert pairs from secrets of type "kubernetes.io/tls". These secrets may contain an additional "ca.crt" field that stores the CA certificate bundle. Contour will otherwise accept CA certificate bundles from generic secrets (whose type is "Opaque" or is empty). Contour will ignore all other types of secrets. This fixes projectcontour#1697. Signed-off-by: James Peach <[email protected]>
jpeach
added a commit
to jpeach/contour
that referenced
this issue
Oct 18, 2019
Clarify the validation of the types of secrets that Contour will accept for TLS key+cert pairs and CA certificate bundles. Contour only accepts TLS key+cert pairs from secrets of type "kubernetes.io/tls". These secrets may contain an additional "ca.crt" field that stores the CA certificate bundle. Contour will otherwise accept CA certificate bundles from generic secrets (whose type is "Opaque" or is empty). Contour will ignore all other types of secrets. This fixes projectcontour#1697. Signed-off-by: James Peach <[email protected]>
jpeach
added a commit
that referenced
this issue
Oct 18, 2019
Clarify the validation of the types of secrets that Contour will accept for TLS key+cert pairs and CA certificate bundles. Contour only accepts TLS key+cert pairs from secrets of type "kubernetes.io/tls". These secrets may contain an additional "ca.crt" field that stores the CA certificate bundle. Contour will otherwise accept CA certificate bundles from generic secrets (whose type is "Opaque" or is empty). Contour will ignore all other types of secrets. This fixes #1697. Signed-off-by: James Peach <[email protected]>
having a small issue due to this, see: #2138 (comment) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
priority/important-soon
Must be staffed and worked on either currently, or very soon, ideally in time for the next release.
Currently, Contour can allow the use of secrets that are not of type
kubernetes.io/tls
if they are not service account tokens and contain the expected data keys.We should consider enforcing a requirement that the secret be of type
kubernetes.io/tls
. This makes the requirement clearer for users and improves separation of secrets in the cluster. It would also make it a bit easier to implement a certificate validation controller.The text was updated successfully, but these errors were encountered: