Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: Add Support for Trusting Self-Signed Certificates in Virtual Clusters #2308

Open
mdzhigarov opened this issue Dec 3, 2024 · 1 comment

Comments

@mdzhigarov
Copy link

Is your feature request related to a problem?

Hello vCluster Team,

I am a software developer using vCluster to spin up virtual Kubernetes clusters within my organization. While I am an admin of the virtual clusters I create, I do not have administrative access to the vCluster control plane or the underlying physical Kubernetes nodes.

In my workflow, I use a private Docker registry secured with a self-signed certificate. To ensure that my virtual clusters can pull images from this registry, I need a way to configure the virtual clusters to trust the self-signed certificate.

On a vanilla Kubernetes cluster, this would typically involve adding the certificate to the nodes under /etc/docker/certs.d. However, in the context of virtual clusters, I do not have access to the nodes or control over the container runtime configuration.

Proposed Feature
I would like to request a feature that allows users to specify custom CA certificates (e.g., a self-signed certificate) when creating a virtual cluster. This feature should ensure that the virtual cluster's container runtime and kubelet trust the provided certificates for image pulls and other secure connections.

Possible Implementation Ideas:
Provide a configuration option (e.g., in the vcluster create command or the virtual cluster helm chart) to specify a custom CA certificate file.
During the creation process, ensure that this certificate is installed in the appropriate location inside the virtual cluster environment so that:
The container runtime trusts the registry when pulling images.
Kubernetes components trust the registry or any services secured by the self-signed certificate.
Use Case:
This feature would be invaluable for developers using virtual clusters in environments where private registries with self-signed certificates are common. It would eliminate the need for manual workarounds and align the behavior of virtual clusters with that of standard Kubernetes clusters.

Thank you for considering this request! Please let me know if I can provide any additional details or clarifications.

Best regards,
Marin

Which solution do you suggest?

Provide a configuration option (e.g., in the vcluster create command or the virtual cluster helm chart) to specify a custom CA certificate file.
During the creation process, ensure that this certificate is installed in the appropriate location inside the virtual cluster environment so that:
The container runtime trusts the registry when pulling images.
Kubernetes components trust the registry or any services secured by the self-signed certificate.

Which alternative solutions exist?

No response

Additional context

No response

@matskiv
Copy link
Contributor

matskiv commented Dec 3, 2024

I don't think this is in scope for the vcluster as it relies on the host cluster for the container runtime and shouldn't be making this kind of change to the hosts container runtime.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants