Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update documentation regarding private registries usage #1023

Open
Amphaal opened this issue Jan 28, 2025 · 0 comments
Open

Update documentation regarding private registries usage #1023

Amphaal opened this issue Jan 28, 2025 · 0 comments
Labels
enhancement New feature or request

Comments

@Amphaal
Copy link

Amphaal commented Jan 28, 2025

Instead of passing insecure: true to our own private registries, we might want to do something better, like injecting our own baked CA Bundle into the Pod. Using helm, we might just add something like below to the values (I am using Ansible to invoke Helm btw) :

Image

cert_manager__org__root_ca__bundle in my case would be the secret containing my generated bundle, which is configured by cert-manager's Bundle CRD, which for me looks like this:

apiVersion: trust.cert-manager.io/v1alpha1
kind: Bundle
metadata:
  name: "{{ cert_manager__org__root_ca__bundle }}"
spec:
  sources:
    - useDefaultCAs: true # include default trusted CAs
    # include our own root
    - secret:
        name: "{{ cert_manager__org__root_ca }}"
        key: ca.crt
  target:
    secret:
      key: ca.crt
    # make it available to namespaces with said labels
    namespaceSelector:
      matchLabels:
        trust: enabled

as a side note, I require my argocd namespace to look like this for cert-manager to automagically copy the Bundle into its namespace:

api_version: v1
kind: Namespace
metadata:
    name: argocd
    labels:
      # makes the default Org Root CA available within this namespace's Secrets
      trust: enabled

My guess is that, looking at few tickets here regarding verification issues of certificates, guildelines along thoses lines would be beneficial to some folks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant