-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Export issued cert into AWS ACM #3711
Comments
This would be a great feature. May I suggest that the imported ACM certificate be tagged to associate it with the For now, a possible workaround is to import the certificate into ACM from the import (
"encoding/pem"
"errors"
"github.com/aws/aws-sdk-go/service/acm"
corev1 "k8s.io/api/core/v1"
)
func makeImportCertificateInput(secret *corev1.Secret) (input acm.ImportCertificateInput, err error) {
raw := secret.Data["tls.crt"]
block, _ := pem.Decode(raw) // extract the first certificate from the `tls.crt` key
if block == nil || !(block.Type == "PUBLIC KEY" || block.Type == "CERTIFICATE") {
return input, errors.New("failed to decode PEM block")
}
input.Certificate = pem.EncodeToMemory(block)
input.CertificateChain = secret.Data["tls.crt"]
input.PrivateKey = secret.Data["tls.key"]
return input, nil
} |
Related issue: kubernetes-sigs/aws-load-balancer-controller#1084 |
Issues go stale after 90d of inactivity. |
Issues go stale after 90d of inactivity. |
Issues go stale after 90d of inactivity. |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. |
Stale issues rot after 30d of inactivity. |
Rotten issues close after 30d of inactivity. |
@jetstack-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/reopen |
@lawliet89: You can't reopen an issue/PR unless you authored it or you are a collaborator. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/reopen |
@sylr: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Rotten issues close after 30d of inactivity. |
@jetstack-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Any chances on getting this implemented? |
Is your feature request related to a problem? Please describe.
We'd like to use ALB load balancer with certificates issued to cert-manager by other CA (like let's encrypt).
Describe the solution you'd like
Have cert manager export the issued certs to AWS ACM in addition to k8s secret.
Describe alternatives you've considered
Additional context
There are issues about issuing certificates from ACM, this issue is about doing the opposite.
Environment details (remove if not applicable):
/kind feature
The text was updated successfully, but these errors were encountered: