Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feat: Add support for cert-manager #210

Closed
jp-gouin opened this issue Oct 24, 2024 · 2 comments
Closed

Feat: Add support for cert-manager #210

jp-gouin opened this issue Oct 24, 2024 · 2 comments
Labels
enhancement New feature or request wontfix This will not be worked on

Comments

@jp-gouin
Copy link
Owner

jp-gouin commented Oct 24, 2024

Is your feature request related to a problem? Please describe.
For production environment , it's best to verify the certificate during the replication between each nodes. Currently this is only possible by bringing our own certificate.

Describe the solution you'd like
Add a certificate resource for cert-manager support. Need to input the issuerRef.
dnsNames can be computed automatically using the services name, headless + replica count

The value could look like :

initTLSSecret:
...
  certManager: 
    issuerRef:
        name: selfsigned-ca
        kind: Issuer

(Feel free to upvote it, so I can get a sense at how useful it can be :) )

@jp-gouin jp-gouin added the enhancement New feature or request label Oct 24, 2024
@olegeech-me
Copy link
Contributor

Integration with cert-manager would significantly improve the setup. Using self-signed certificates requires manually distributing the CA file to all LDAP consumer services to ensure proper certificate validation. The primary challenge is correctly mapping LDAP hostnames to the ACME domain. For example, issuing a wildcard certificate for *.ldap.example.com (assuming the user owns example.com) allows this certificate to be used across all LDAP instances. The key is to configure the Helm chart to update all LDAP endpoints to use domain names like ldap-0.ldap.example.com or ldap-readonly-0.example.com. However, it's not possible to include internal Kubernetes service names (e.g., ldap-0.ldap-headless.openldap.svc.cluster.local) in an ACME certificate's Subject Alternative Names (SANs), as Let's Encrypt does not issue certificates for such internal domains.

Copy link

stale bot commented Dec 28, 2024

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the wontfix This will not be worked on label Dec 28, 2024
@stale stale bot closed this as completed Jan 4, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request wontfix This will not be worked on
Projects
None yet
Development

No branches or pull requests

2 participants