title | authors | reviewers | approvers | editor | creation-date | last-updated | status | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Certificate Request CRD |
|
|
|
@joshvanl |
2019-07-08 |
2023-03-24 |
implementable |
- Summary
- Motivation
- Proposal
See also https://cert-manager.io/docs/concepts/certificaterequest/.
Currently, certificates issued via cert-manager rely on the Certificate
resource being reconciled by the Certificate
controller. This resource imposes
limitations on what issuers are able to honour the Certificate
resource as
well as other opinionated implementation details.
This proposal adds a new custom resource CertificateRequest
that contains an
x509 certificate signing request, a target issuer, and other metadata about the
request. Each issuer will have their own CertificateRequest
controller to
watch for resources that are referencing them. The Certificate
controller will
then rely on creating CertificateRequest
s to resolve its own Spec.
Currently the required use of the Certificate
resource means that users are
forced to:
- expose the signed certificate's private key to the API server
- be limited to the finite set of issuers as implemented into the cert-manager project, or, "in-tree"
- adhere to the
Certificate
controller's opinionated implementation, limiting scope for integrations with other projects - rely on developers of the cert-manager project for reviews and approval of new issuers
Due to these issues, cert-manager can be often unsuitable for some use cases/integrations or users are unsatisfied with some behaviour. Lack of exposure of options that a raw x509 certificate signing request provides can also be a source of frustration.
With cert-manger maintainers ensuring that all issuers are always fully supported and tested, it becomes difficult for new issuers to become accepted. Some developers of new issuers would be happy to maintain these issuers themselves however is not possible with all issuers belonging in the same code base and repository.
- Introduce the
CertificateRequest
resource. - Create a
CertificateRequest
controller for each in-tree issuer to resolveCertificateRequest
. - Change the implementation of the
Certificate
controller to rely on theCertificateRequest
resource to resolve the request. - Update documentation detailing this new behaviour and how it can be used to
develop out-of-tree implementations of an issuer
CertificateRequest
controller. - Create a boilerplate/scaffolding example code to help quick start developers on creating a controller with best practices.
- This proposal does not document or explore possible or planned integrations using this new functionality.
- This proposal will not investigate possible alignment or merging with the
Kubernetes internal
CertificateSigningRequest
resource. Although it is of interest, the motivation is mostly in order to get a built-in approval workflow for CertificateRequests. The feasibility of being able to implement a solution using the built-in type in the near future however is small, so we'd rather 'trail-blaze' here and then try and fold our changes back upstream at a later date.
This proposal will create the following new API types in the
cert-manager.io
group;
// CertificateRequestSpec defines the desired state of CertificateRequest
type CertificateRequestSpec struct {
// Requested certificate default Duration
// +optional
Duration *metav1.Duration `json:"duration,omitempty"`
// IssuerRef is a reference to the issuer for this CertificateRequest. If
// the 'kind' field is not set, or set to 'Issuer', an Issuer resource with
// the given name in the same namespace as the CertificateRequest will be
// used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer with
// the provided name will be used. The 'name' field in this stanza is
// required at all times. The group field refers to the API group of the
// issuer which defaults to 'cert-manager.io' if empty.
IssuerRef ObjectReference `json:"issuerRef"`
// Byte slice containing the PEM encoded CertificateSigningRequest
CSRPEM []byte `json:"csr"`
// IsCA will mark the resulting certificate as valid for signing. This
// implies that the 'signing' usage is set
// +optional
IsCA bool `json:"isCA,omitempty"`
}
// CertificateStatus defines the observed state of CertificateRequest and
// resulting signed certificate.
type CertificateRequestStatus struct {
// +optional
Conditions []CertificateRequestCondition `json:"conditions,omitempty"`
// Byte slice containing a PEM encoded signed certificate resulting from the
// given certificate signing request.
// +optional
Certificate []byte `json:"certificate,omitempty"`
// Byte slice containing the PEM encoded certificate authority of the signed
// certificate.
// +optional
CA []byte `json:"ca,omitempty"`
// FailureTime stores the time that this CertificateRequest failed.
// This is used to influence garbage collection and back-off.
// +optional
FailureTime *metav1.Time `json:"failureTime,omitempty"`
}
The CertificateRequestCondition
resembles much the same of the
CertificateRequestCondition
.
The ObjectReference
field type has had a new field Group
added as follows:
// ObjectReference is a reference to an object with a given name, kind and group.
type ObjectReference struct {
Name string `json:"name"`
// +optional
Kind string `json:"kind,omitempty"`
// +optional
Group string `json:"group,omitempty"`
}
The group refers to the API group that the target Issuer belongs to. This enables namespacing of references to different issuers of external API groups.
The CertificateRequest resource has Approved and Denied conditions. These conditions are based upon the certificates.k8s.io CertificateSigningRequest conditions of the same name. The purpose of these conditions is so that users, or "approvers", are able to mark a request as either Approved or Denied. This condition gates a signer from signing the request. A signer waits for a CertificateRequest to have an Approved condition before signing. A CertificateRequest with a Denied condition will never be signed.
The Approved and Denied conditions are two distinct condition types on the CertificateRequest. These conditions must only have the status of True, and are mutually exclusive (i.e. a CertificateRequest cannot have an Approved and Denied condition simultaneously). This behaviour is enforced in the cert-manager validating admission webhook.
An "approver" is an entity that is responsible for setting the Approved/Denied conditions. It is up to the approver's implementation as to what CertificateRequests are managed by that approver.
The Reason field of the Approved/Denied condition should be set to who set the condition. Who can be interpreted however makes sense to the approver implementation. For example, it may include the API group of an approving policy controller, or the client agent of a manual request.
The Message field of the Approved/Denied condition should be set to why the condition is set. Again, why can be interpreted however makes sense to the implementation of the approver. For example, the name of the resource that approves this request, the violations which caused the request to be denied, or the team to who manually approved the request.
A CertificateRequest that is Denied is considered to be in a final, failed state. If it was created for an issuance of a Certificate, the associated issuance will be failed.
Approved and Denied conditions are set by requesting against the /status
endpoint of the CertificateRequest resource. This is a divergence of the
certificates.k8s.io CertificateSigningRequest resource that utilises approval
,
as CustomResourceDefinitions may only define /status
or /scale
sub-resources.
Approvers must therefore have permissions to update the status sub-resource of
CertificateRequests. Approvers missing this permissions will have their request
rejected by the API server.
Setting the Approved or Denied conditions are restricted by the approver having sufficient RBAC permissions. These permissions are based upon the request itself - specifically the request's IssuerRef:
apiGroups: ["cert-manager.io"]
resources: ["signers"]
verbs: ["approve"]
resourceNames:
# namespaced signers
- "<signer-resource-types>.<signer-group>/<signer-namespace>.<signer-name>"
# cluster scoped signers
- "<signer-resource-types>.<signer-group>/<signer-name>"
# all signers of this resource name
- "<signer-resource-types>.<signer-group>/*"
An example ClusterRole that would grant the permissions to set the Approve and
Denied conditions of CertificateRequests that reference the cluster scoped
myissuers
external issuer, in the group my-example.io
, with the name myapp
:
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: my-example-io-my-issuer-myapp-approver
rules:
- apiGroups: ["cert-manager.io"]
resources: ["signers"]
verbs: ["approve"]
resourceNames: ["myissuers.my-example.io/myapp"]
These permissions are enforced using a SubjectAccessReview that is requested by the cert-manager Webhook component when an approver attempts to set the Approve or Denied condition. The approver UserInfo and IssuerRef fields on the CertificateRequest are used to build the SubjectAccessReview.
If the approver does not have sufficient permissions defined above to set the Approved or Denied conditions, the request will be rejected by the cert-manager validating admission webhook.
The RBAC permissions must be granted at the cluster scope (i.e. ClusterRoleBinding). This matches the same scoping behaviour as certificates.k8s.io CertificateSigningRequests.
Namespaced signers are represented by a namespaced resource using the syntax of
<signer-resource-types>.<signer-group>/<signer-namespace>.<signer-name>
The apiGroup
must always be cert-manager.io
, as all CertificateRequests
are in the cert-manager.io
group. Even though some signers may themselves not
belong to the cert-manager.io
group, the approve operation does.
The resource
must always be signers
. This matches the same resource as
required by certificates.k8s.io
CertificateSigningRequests.
The verbs
must always be approve
. This verb grants the approver the
permissions to set both Approved and Denied conditions.
Each entry of resourceNames
is made up of 3 parts: the signer resource type, signer group, and the
signer name.
The signer resource type should be the same string of the resource type of the signer.
The signer group should be the same string of the group of signer.
The name may be either a wild card '*' denoting all signer names in all namespaces, or instead a string which must match optionally a namespace, followed by the signer name as it appears in the IssuerRef.
An example of signing all myissuer
signers in all namespaces, and
clustermyissuers
with the name myapp
, in the my-example.io
group:
resourceNames:
# With the following, the user (i.e., the approver) can approve the CertificateRequests
# that reference any namespaced-scoped issuer of the type MyIssuers, in the
# group my-example.io, in any namespace with any name:
- myissuers.my-example.io/*
# Similar to the above, but any cluster-scoped issuer of the type
# ClusterMyIssuer:
- clustermyissuers.my-example.io/myapp
resourceNames:
# With the following, the user (i.e., the approver) can only approve the
# CertificateRequests in the namespace "foo" and that reference the
# namespace-scoped MyIssuer, in the group my-example.io, named "myapp":
- myissuers.my-example.io/foo.myapp
# Similar to the above, but in the namespace "bar":
- myissuers.my-example.io/bar.myapp
The validating admission webhook is responsible for making SubjectAccessReviews
to evaluate whether the approver has sufficient permissions to add the Approved
or Denied conditions. The webhook will attempt to first check whether
the use can approve all signers in all namespaced (wildcard), and if this fails,
whether it can approve for the exact signer (.<signer-name>
or
<signer-namespace>.<signer-name>
).
The webhook will keep a cache of the Discovery
API
which will be used to determine whether a referenced signer is namespaced or
not. If it is namespaced, the <signer-namespace>
will be populated with the
namespace that the CertificateRequest resides in. If the scope of the resource
cannot be determined, the request will be rejected.
The cert-manager controller is deployed with an internal approver controller. This controller will attempt to approve all CertificateRequests that are created, regardless of the contents of the request, or the issuer they reference.
By default, this approver is given the permission to approve all internal
signers, that is Issuer
and ClusterIssuer
cert-manager.io
signers. This
means its ClusterRole is given the resourceNames
: issuers.cert-manager.io/*
and clusterissuers.cert-manager.io/*
External issuers may consider whether they wish to install further RBAC that would allow the cert-manager approver controller to also approve CertificateRequests that reference these external issuers. This would involve creating a ClusterRole that permits approving that signer type, and binding that role to the cert-manager-controller ServiceAccount.
The default cert-manager approver controller may be disabled by adding the
--controllers=*,-certificaterequests-approver
argument to the
cert-manager-controller
component. This allows for other approvers to make
decisions about CertificateRequests, without racing against the internal
approver controller.
The philosophy for the CertificateRequest
controllers are planned to be as
minimal as possible in that the single goal of them is to enable its owning
Issuer
to create the resulting certificate. Once a sync on a
CertificateRequest
has been observed, the general flow is as follows:
-
Check the group belongs to the owning
Issuer
, exit if not. -
Check if
CertificateRequest
is in a terminal failed state. A controller may choose to add additional conditions to a failedCertificateRequest
, but must not attempt to issue a certificate. Currently terminal failed states are:Ready
condition with aFailed
reason // usually set by the issuerInvalidRequest
condition withTrue
status // usually set by the issuerDenied
condition withTrue
status // usually set by approver
-
Check the
Issuer
type is of the same type, exit if not. -
Verify the Spec of the
CertificateRequest
. -
If a certificate exits then update the status if needed and exit.
-
Sign the certificate via the Issuer using the contents of Spec.
It is worth noting that whether the certificate is invalid, out-of-date or
failed then the controller should take no further action on the resource. It is
the responsibility of a higher level controller such as the Certificate
controller to take further action to retry the certificate issuance through
managing the life cycle of the CertificateRequest
resources.
With all Issuer
s updated with CertificateRequest
controllers, the
Certificate
controller will be migrated to begin to use and manage the life
cycle CertificateRequest
s to resolve it's Spec. Further concrete
implementation details TBD.
The CertificateRequest
controller is responsible for creating Order
resources to fulfil ACME certificate requests. If the Order
fails due to a
non-networking or other non-transient issue then the Order
is marked as failed
- this means the
CertificateRequest
too shall be marked as failed and no further processing will take place by theCertificateRequest
controller on this resource.
Issuing controller considers all Denied CertificateRequests to be in a final failed state. The issuance will be failed and will be repeatedly retried with an exponential backoff ../20220118.certificate-issuance-exponential-backoff.md. If the cause of the denial was a misconfigured Certificate spec, the issuance will be retried immediately once the spec is corrected. If the cause of the denial was misconfigured policy resources, a user who has fixed the resources and wants to retry immediately can do so using cmctl renew
The issuing controller does not check Approved condition. It is the issuer's responsibility not to issue certificates for CertificateRequests that have not been approved.
A CertificateRequest
is considered in a final failed state if:
- it has a Ready condition with Failed reason
- it has a Denied condition with True status
- it has InvalidRequest reason with True status
The group name of IssuerRef
inside CertificateRequest
s is to be defaulted
to "cert-manager.io" if the field is empty, using a mutating webhook. This
means that if unspecified, CertificateRequest
objects will be put into the
ownership of the default pool of issuers in the cert-manager project.
Until the mutating webhook is fully implemented, we will handle defaulting internally in the controller.
In order for CertificateRequest
controllers to resolve requests, extra
information may be needed that is not present in the API Spec. To pass on this
information, a set of one or more annotations should be defined, with reliable
value pairs. These annotations should be considered optional. Any
CertificateRequest
controller that relies on these to function should
fallback gracefully or be marked as failed in the event a required annotation is
missing. The currently defined annotations are:
cert-manager.io/private-key-secret-name
: The name of the secret, in the same namespace as theCertificateRequest
, that stores the private key which was used to sign the x509 certificate signing request. This is required by theSelfSigning
issuer to sign its own certificate. If this annotation is missing or empty, theSelfSign
CertificateRequest
controller will mark the resource as failed and no further processing will take place on it. Currently theCertificate
controller adds this annotation to allCertificateRequest
resources it creates with the definedSecretName
in the Spec of theCertificate
.
Standard unit and end-to-end tests will be used to verify new behaviour, as used
by cert-manager currently. Current end-to-end tests for Certificate
resources
will also give a good signal for CertificateRequest
s once the controller has
migrated its implementation.
The introduction and consequently the reliance on this core resource for all cert-manager functions means it poses a high risk to bugs or unexpected behaviour appearing across the whole codebase. With this, it is key to ensure the change happens in incremental roll-outs and proper care is taken during testing.
The new resource could be potentially confusing for current cert-manager users. To mitigate this, proper documentation should be created to explain the changes. It should also be made clear that the resource is typically only to be consumed or managed by a more complex controller or system, not necessarily a human user.
- Creation of
CertificateRequest
resource. - A CA issuer
CertificateRequest
controller. - Exposing the single controller via a feature gated flag.
- All issuers have a
CertificateRequest
controller. - All controllers are enabled by default.
- The
Certificate
controller optionally makes use of theCertificateRequest
resource to resolve certificates when a feature flag is enabled.
- The
CertificateRequest
API resource should be considered stable. - The
Certificate
controller makes use of theCertificateRequest
resource to resolve certificates.