Skip to content
This repository has been archived by the owner on Mar 6, 2023. It is now read-only.

Support DNS validation method #41

Open
pearj opened this issue Oct 21, 2017 · 20 comments
Open

Support DNS validation method #41

pearj opened this issue Oct 21, 2017 · 20 comments

Comments

@pearj
Copy link

pearj commented Oct 21, 2017

Hi,

I have an openshift deployment where the routes are not internet accessible, so I need to use dns to do domain verification instead.

Does openshift-acme support the dns method? I saw some passing references, but I have no idea how to actually configure it.

I'd be using Route 53 in the first case.

Thanks

@akowasch
Copy link

Hi,

I'm also interested in dns challenge. Just like @pearj I have an openshift cluster where routes are not accessible from the internet. Instead of Route 53 I'm using google cloud dns.

I saw that you have to develop a plugin. Is there any further information? I would like to develop one for the google cloud platform, if there isn't already one.

Thanks

@tnozicka
Copy link
Owner

Hi @pearj and @andreas-kowasch

unfortunately openshift-acme doesn't support dns challenges yet. But let me assure you that I see this as a perfectly valid use case and this is on our roadmap.

As the DNS exposing is heavily dependent on your provider API the plan is to use plugin API to support wide range of provides.

@pearj
Copy link
Author

pearj commented Oct 25, 2017

I don't suppose we can leverage the existing certbot plugins somehow?

Maybe you could use https://github.com/go-python/gopy or https://github.com/sbinet/go-python then you could re-use all of the existing plugins in go?

What do you think?

@tnozicka
Copy link
Owner

For the long term I'd like to do the DNS plugin REST based to be language independent so you would just wrap those in simple http server.

To start with I'll probably use some of the native Go ones already there.

@cben
Copy link

cben commented Feb 22, 2018

Let's Encrypt recently started offering wildcard certs, with DNS validation only.
Is this interesting for openshift-acme?

  • Could potentially maintain a wildcard router default cert (also stored in a secret, router-certs in default namespace).
    Not sure it has benefit if you're running openshift-acme for individual routes anyway?
    Though it does allow routes on the default subdomain to be instantaneously valid instead of waiting for LE.
  • The main use case IMHO is an openshift so firewalled/isolated that letting it control public DNS is impractical; in such an env, a wildcard cert is the next best thing, it's not too hard to "smuggle" one from outside every 3 month.
    This use case sounds like it belongs better in openshift-ansible (or a small standalone playbook); again, one needs to plug the part to control your DNS but ansible has tons of modules for these.

@tnozicka
Copy link
Owner

Yes, wildcard certs are interesting mainly because of providing them for default router and thus for routes using the default domain. In some environments users are not allowed to have custom host or upload their own certs.

I guess that raises priority for implementing DNS challenge. When the rewrite merges, things should get moving more fluently.

@tnozicka tnozicka changed the title how to use the dns method? Support DNS validation method Feb 23, 2018
@tobru
Copy link

tobru commented Apr 20, 2018

Now that the rewrite has been merged and seems to have improved the overall state very well, are there any plans to continue on this side of things? DNS validation would be a great addition, as Wildcard support get's requested more and more.

@cben
Copy link

cben commented Aug 1, 2018

About plugins: there is discussion on kubernetes-sigs/external-dns#555 about what it would take for external-dns to abstract this away.

@tnozicka
Copy link
Owner

tnozicka commented Aug 1, 2018

That looks promising at least as a library. Thanks for pointing that out.
Every time CRD is involved people don't think about multitenancy and we can't use that directly though.

@openshift-bot
Copy link

Issues go stale after 90d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle stale

@openshift-bot
Copy link

Stale issues rot after 30d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle rotten
/remove-lifecycle stale

@openshift-bot
Copy link

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

@openshift-ci-robot
Copy link
Collaborator

@openshift-bot: Closing this issue.

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@tnozicka
Copy link
Owner

/reopen
/remove-lifecycle rotten
/lifecycle frozen

@openshift-ci-robot
Copy link
Collaborator

@tnozicka: Reopened this issue.

In response to this:

/reopen
/remove-lifecycle rotten
/lifecycle frozen

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@rmahroua
Copy link

rmahroua commented Apr 6, 2020

Any updates on this feature? Thanks :)

@tnozicka
Copy link
Owner

tnozicka commented Apr 9, 2020

not yet, but with ACME v2 merged it's not far :)

@rmahroua
Copy link

rmahroua commented Apr 9, 2020

Excellent, thanks for update.

@devopstales
Copy link

Any updates on this?

@obabec
Copy link

obabec commented Nov 10, 2021

Any updates for Route 53 domain validation? Thanks

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

10 participants