Skip to content

Security Self Assessment: [STRIDE-INFODISCLOSE-3] RFE: Improve certificate management in Cluster API #5490

@fabriziopandini

Description

@fabriziopandini

User Story

As a user/operator I would like to have control on how certificates are created
As a user/operator I would like to have visibility on certificate expiration date
As a user/operator I would like CAPI to support me in certificate lifecycle management
As a user/operator I would like to have the option to rely on external tools for certificate management

Detailed Description

As of today Cluster API provide a minimal support for certificate management, mostly util for management of secrets with certificate authorities, while over time the responsibility of creating certificates has been delegated to control plane providers.

While this approach worked well, some shortcomings are starting to surface, mostly boiling up to the fact that there is no top level certificate management primitives in our API, and this makes it difficult and fragmented the answer to:

  • how can I customise certificate at provisioning time
  • how can I monitor state of my certificates (expiration date)
  • how can CAPI support me in certificate lifecycle management tasks, like certificate renewal or CA rotation

Last but not least, CAPI leaks of a clean interface for integrating with external tools for certificate management, like e.g Hashicorp Vault.

This issue is about starting an effort for rethinking this area, and providing a clean solution for addressing above concerns starting from the two issues that mostly concern users, that are better support for certificate renewal and CA rotation tasks

/kind feature
/kind proposal

@randomvariable to add more from a provider PoV

Metadata

Metadata

Assignees

No one assigned

    Labels

    area/control-planeIssues or PRs related to control-plane lifecycle managementarea/securityIssues or PRs related to securitykind/featureCategorizes issue or PR as related to a new feature.kind/proposalIssues or PRs related to proposals.lifecycle/frozenIndicates that an issue or PR should not be auto-closed due to staleness.priority/important-soonMust be staffed and worked on either currently, or very soon, ideally in time for the next release.sig/securityCategorizes an issue or PR as relevant to SIG Security.triage/acceptedIndicates an issue or PR is ready to be actively worked on.

    Type

    No type

    Projects

    Status

    Implemented

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions