openshift-acme icon indicating copy to clipboard operation
openshift-acme copied to clipboard

Support DNS validation method

Open pearj opened this issue 7 years ago • 20 comments

Hi,

I have an openshift deployment where the routes are not internet accessible, so I need to use dns to do domain verification instead.

Does openshift-acme support the dns method? I saw some passing references, but I have no idea how to actually configure it.

I'd be using Route 53 in the first case.

Thanks

pearj avatar Oct 21 '17 12:10 pearj

Hi,

I'm also interested in dns challenge. Just like @pearj I have an openshift cluster where routes are not accessible from the internet. Instead of Route 53 I'm using google cloud dns.

I saw that you have to develop a plugin. Is there any further information? I would like to develop one for the google cloud platform, if there isn't already one.

Thanks

akowasch avatar Oct 22 '17 11:10 akowasch

Hi @pearj and @andreas-kowasch

unfortunately openshift-acme doesn't support dns challenges yet. But let me assure you that I see this as a perfectly valid use case and this is on our roadmap.

As the DNS exposing is heavily dependent on your provider API the plan is to use plugin API to support wide range of provides.

tnozicka avatar Oct 23 '17 13:10 tnozicka

I don't suppose we can leverage the existing certbot plugins somehow?

Maybe you could use https://github.com/go-python/gopy or https://github.com/sbinet/go-python then you could re-use all of the existing plugins in go?

What do you think?

pearj avatar Oct 25 '17 20:10 pearj

For the long term I'd like to do the DNS plugin REST based to be language independent so you would just wrap those in simple http server.

To start with I'll probably use some of the native Go ones already there.

tnozicka avatar Oct 26 '17 07:10 tnozicka

Let's Encrypt recently started offering wildcard certs, with DNS validation only. Is this interesting for openshift-acme?

  • Could potentially maintain a wildcard router default cert (also stored in a secret, router-certs in default namespace). Not sure it has benefit if you're running openshift-acme for individual routes anyway? Though it does allow routes on the default subdomain to be instantaneously valid instead of waiting for LE.
  • The main use case IMHO is an openshift so firewalled/isolated that letting it control public DNS is impractical; in such an env, a wildcard cert is the next best thing, it's not too hard to "smuggle" one from outside every 3 month. This use case sounds like it belongs better in openshift-ansible (or a small standalone playbook); again, one needs to plug the part to control your DNS but ansible has tons of modules for these.

cben avatar Feb 22 '18 13:02 cben

Yes, wildcard certs are interesting mainly because of providing them for default router and thus for routes using the default domain. In some environments users are not allowed to have custom host or upload their own certs.

I guess that raises priority for implementing DNS challenge. When the rewrite merges, things should get moving more fluently.

tnozicka avatar Feb 23 '18 18:02 tnozicka

Now that the rewrite has been merged and seems to have improved the overall state very well, are there any plans to continue on this side of things? DNS validation would be a great addition, as Wildcard support get's requested more and more.

tobru avatar Apr 20 '18 10:04 tobru

About plugins: there is discussion on https://github.com/kubernetes-incubator/external-dns/issues/555 about what it would take for external-dns to abstract this away.

cben avatar Aug 01 '18 08:08 cben

That looks promising at least as a library. Thanks for pointing that out. Every time CRD is involved people don't think about multitenancy and we can't use that directly though.

tnozicka avatar Aug 01 '18 11:08 tnozicka

Issues go stale after 90d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close. Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle stale

openshift-bot avatar Mar 22 '19 21:03 openshift-bot

Stale issues rot after 30d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle rotten. Rotten issues close after an additional 30d of inactivity. Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle rotten /remove-lifecycle stale

openshift-bot avatar Apr 21 '19 23:04 openshift-bot

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen. Mark the issue as fresh by commenting /remove-lifecycle rotten. Exclude this issue from closing again by commenting /lifecycle frozen.

/close

openshift-bot avatar May 22 '19 00:05 openshift-bot

@openshift-bot: Closing this issue.

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen. Mark the issue as fresh by commenting /remove-lifecycle rotten. Exclude this issue from closing again by commenting /lifecycle frozen.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

openshift-ci-robot avatar May 22 '19 00:05 openshift-ci-robot

/reopen /remove-lifecycle rotten /lifecycle frozen

tnozicka avatar Jun 27 '19 15:06 tnozicka

@tnozicka: Reopened this issue.

In response to this:

/reopen /remove-lifecycle rotten /lifecycle frozen

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

openshift-ci-robot avatar Jun 27 '19 15:06 openshift-ci-robot

Any updates on this feature? Thanks :)

rmahroua avatar Apr 06 '20 22:04 rmahroua

not yet, but with ACME v2 merged it's not far :)

tnozicka avatar Apr 09 '20 16:04 tnozicka

Excellent, thanks for update.

rmahroua avatar Apr 09 '20 18:04 rmahroua

Any updates on this?

devopstales avatar Jun 12 '20 13:06 devopstales

Any updates for Route 53 domain validation? Thanks

obabec avatar Nov 10 '21 09:11 obabec