-
Story
-
Resolution: Unresolved
-
Normal
-
cert-manager-1.18
-
None
-
5
-
True
-
-
False
-
-
-
OAPE Sprint 276, OAPE Sprint 277, OAPE Sprint 278
-
3
Update `istiocsr.operator.openshift.io` API to support configuring optional CA certificate chain configured as a confimap reference to be mounted as volume in cert-manager-istio-csr deployment object, which is useful for providing the CAs issued by vault, venafi and other issuers.
This is important to avoid Trust on first use. Please follow https://github.com/cert-manager/istio-csr/issues/103#issuecomment-923882792 comment for more details.
Current Behavior:
- The `istio-csr` controller currently fetches the secret referenced in the self-signed based Issuer, and creates a ConfigMap with the CA certificate found in the secret.
What's required
- When `issuer.spec.ca.secretName` is present, and CA chain is not configured, controller should handle making the CA certificate available.
- If the CA chain is configured, then controller should add it to deployment object along with the relevant validations, like configMap should exist, the configured key should be present, and key should be pem content and a CA chain.
- The `VolumeMount` which will added should align with the value set for `--root-ca-file` here
Acceptance Criteria:
- istio-csr controller should update the status in `istiocsr.operator.openshift.io` with degraded error when the required configuration is not present or validation fails.
- e2e's and UT's must be added covering both the scenarios.
Reference Issue: https://issues.redhat.com/browse/CM-564
- is related to
-
OCPSTRAT-1974 [GA] istio-csr integration for cert-manager
-
- In Progress
-
- links to