summaryrefslogtreecommitdiff
path: root/events
diff options
context:
space:
mode:
authormarkyjackson-taulia <marky.r.jackson@gmail.com>2019-12-27 08:04:44 -0800
committermarkyjackson-taulia <marky.r.jackson@gmail.com>2019-12-27 08:04:44 -0800
commit650311d10dcb6bf844bdd9ccc11ddfe04a483985 (patch)
tree66b8d7603e5ddd158602e8ed76f136626b5b4b7b /events
parentbdff0489119d55af2ad1d7dbc435b7c299d7883e (diff)
unconference notes from James Munnelly cert manager presentation
Signed-off-by: markyjackson-taulia <marky.r.jackson@gmail.com>
Diffstat (limited to 'events')
-rw-r--r--events/2019/11-contributor-summit/unconference-notes/cert-manager-james-munnelly.md76
1 files changed, 76 insertions, 0 deletions
diff --git a/events/2019/11-contributor-summit/unconference-notes/cert-manager-james-munnelly.md b/events/2019/11-contributor-summit/unconference-notes/cert-manager-james-munnelly.md
new file mode 100644
index 00000000..0820e5b7
--- /dev/null
+++ b/events/2019/11-contributor-summit/unconference-notes/cert-manager-james-munnelly.md
@@ -0,0 +1,76 @@
+#### Presenter:James Munnelly
+
+#### Topic: Cert-Manager
+
+#### Date & Time: 11:30
+
+#### Notes
+
+Are there different ways that Kubernetes consumes secrets? Because there are different ways Kubernetes uses secrets.
+
+With webhooks and ca-bundle needing to be inline is approached it ca-injector.
+
+You add annotation into webhook resource and inject ca-crt for reference.
+Cert manager uses it for its own TLS injections.
+
+People are giving their permissions to the daemonsets which have ability to query all secrets anyways, so there should
+be some separating at the daemonset level to restrict access to secrets across the cluster.
+
+Like the node emission controller.
+
+The CSR api should be extended, there has been interest in adding certificate class.
+Originally there was just a certificate resource which represented long running cert.
+
+Looking at adding approval controllers
+
+Put together CSI driver for that specific request api which you can add volume to your pod which will go off in the
+background request certificate api for new certificate. Using this you could take the pod identity to make the request,
+and a approval system that was watching the pods and approve it when it sees request
+
+Security issues are still a problem with certmanager because of the access to api secrets and the lack of restriction
+to individual secrets
+
+Node authorizer + node restriction plugin this will help restrict secrets by pod the driver uses the pods identity to
+create the request.
+
+There is a csi driver for reading vault secret and inserting them into your pod, uses its own driver and you have to
+grant it all permissions.
+
+With service ca approach with open shift you just create annotations and it will handle everything for you
+
+That is also what csidriver is doing you say you want a secret and then you just get one.
+
+Annotating a service could leverage a webhook to get a certificate with that services name, at the service level it
+would make CA and then you would get the certificates. Per pod basics and you would throw the CA in the ingress.
+
+How do people see themselves using csi driver
+
+Since 1.12 service accounts have been injected but it doesn't solve service authentication
+people tend to use Kubernetes as auth mechanism for service to service auth but not necessarily is the best method
+should creat infrastructure to do that properly.
+
+Control the setup of who or what service accounts issues these requests. Vault doesn't behave like a kubernetes api and
+this is why it would be a better choice
+
+Need a way to control certificate requests and permissions across services and ingress to not give full access and
+restrict by pod rather than namespace???
+
+CSI drivers assuming pod identity, unsure.
+
+CSI drivers are root on nodes.
+
+Use service-api for now.
+
+Want to give csi drivers their own credentials to do things on behalf of pods.
+
+
+how to add identity to pod so when it requests cert through api add something to request so it can be determined
+identity or request and if it has access to request cert.
+
+#### Key Leanings / Take aways
+Changes are going to resolve around the CSR request.
+
+
+#### Action items
+- Figure out what would be needed in certificates signing request api to merge into sig-auth write down users stories
+and propose to sig-auth