openshift-acme is ACME Controller for OpenShift and Kubernetes clusters. It will automatically provision certificates using ACME v2 protocol and manage their lifecycle including automatic renewals.
The controller is provider independent but to start with we would recommend you to use Let's Encrypt (https://letsencrypt.org). For more information checkout section Deploy.)
Once openshift-acme controller is running on your cluster all you have to do is annotate your Route or other supported object like this:
metadata:
annotations:
kubernetes.io/tls-acme: "true"
openshift-acme provides multiple options to deploy the controller so you can deploy it even as a regular user in a shared cluster only for specific namespaces you have access to. We intentionally avoid using CRDs which require system:admin privileges.
We have created deployments to get you started in just a few seconds. (But feel free to create one that suits your needs.)
Let's encrypt provides two environments: live and staging. The environment is chosen based on the issuer ConfigMap that is created.
staging is meant for testing the controller or making sure you can try it out without the fear or exhausting your rate limits and it will provide you with certificates signed by Let's Encrypt staging CA making the certs not trusted!
live will provide you with trusted certificates but has lower rate limits. This is what you want when you're done testing/evaluating the controller
openshift-acme now supports only ACME v2 protocol. For the time of the transition the old images using ACME v1 are kept in docker.io/tnozicka/openshift-acme:v0.8.0
. There is no plan to support the old version and while you can still use it until the endpoints are turned off, we advise you to try the new version of the controller and migrate.
OpenShift Routes are fully supported.
If you annotate your Route with "acme.openshift.io/secret-name": "