Update README File
This commit is contained in:
		
							parent
							
								
									26ccc10b7f
								
							
						
					
					
						commit
						c22b9104e9
					
				
							
								
								
									
										168
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										168
									
								
								README.md
									
									
									
									
									
								
							| @ -1,54 +1,148 @@ | |||||||
| # ACME webhook example | # ACME Webhook for INWX | ||||||
| 
 | 
 | ||||||
| The ACME issuer type supports an optional 'webhook' solver, which can be used | This project provides a cert-manager ACME Webhook for [Hetzner DNS](https://hetzner.de/)  | ||||||
| to implement custom DNS01 challenge solving logic. | and is based on the [Example Webhook](https://github.com/jetstack/cert-manager-webhook-example) | ||||||
| 
 | 
 | ||||||
| This is useful if you need to use cert-manager with a DNS provider that is not | This README and the inspiration for this webhook was mostly taken from [Stephan Müllers INWX Webhook](https://gitlab.com/smueller18/cert-manager-webhook-inwx) | ||||||
| officially supported in cert-manager core. |  | ||||||
| 
 | 
 | ||||||
| ## Why not in core? | ## Requirements | ||||||
| 
 | 
 | ||||||
| As the project & adoption has grown, there has been an influx of DNS provider | -   [helm](https://helm.sh/) >= v3.0.0 | ||||||
| pull requests to our core codebase. As this number has grown, the test matrix | -   [kubernetes](https://kubernetes.io/) >= v1.14.0 | ||||||
| has become un-maintainable and so, it's not possible for us to certify that | -   [cert-manager](https://cert-manager.io/) >= 0.12.0 | ||||||
| providers work to a sufficient level. |  | ||||||
| 
 | 
 | ||||||
| By creating this 'interface' between cert-manager and DNS providers, we allow | ## Configuration | ||||||
| users to quickly iterate and test out new integrations, and then packaging |  | ||||||
| those up themselves as 'extensions' to cert-manager. |  | ||||||
| 
 | 
 | ||||||
| We can also then provide a standardised 'testing framework', or set of | The following table lists the configurable parameters of the cert-manager chart and their default values. | ||||||
| conformance tests, which allow us to validate the a DNS provider works as |  | ||||||
| expected. |  | ||||||
| 
 | 
 | ||||||
| ## Creating your own webhook | | Parameter | Description | Default | | ||||||
|  | | --------- | ----------- | ------- | | ||||||
|  | | `groupName` | Group name of the API service. | `dns.hetzner.cloud` | | ||||||
|  | | `certManager.namespace` | Namespace where cert-manager is deployed to. | `kube-system` | | ||||||
|  | | `certManager.serviceAccountName` | Service account of cert-manager installation. | `cert-manager` | | ||||||
|  | | `image.repository` | Image repository | `mecodia/cert-manager-webhook-hetzner` | | ||||||
|  | | `image.tag` | Image tag | `latest` | | ||||||
|  | | `image.pullPolicy` | Image pull policy | `Always` | | ||||||
|  | | `service.type` | API service type | `ClusterIP` | | ||||||
|  | | `service.port` | API service port | `443` | | ||||||
|  | | `resources` | CPU/memory resource requests/limits | `{}` | | ||||||
|  | | `nodeSelector` | Node labels for pod assignment | `{}` | | ||||||
|  | | `affinity` | Node affinity for pod assignment | `{}` | | ||||||
|  | | `tolerations` | Node tolerations for pod assignment | `[]` | | ||||||
| 
 | 
 | ||||||
| Webhook's themselves are deployed as Kubernetes API services, in order to allow | ## Installation | ||||||
| administrators to restrict access to webhooks with Kubernetes RBAC. |  | ||||||
| 
 | 
 | ||||||
| This is important, as otherwise it'd be possible for anyone with access to your | ### cert-manager | ||||||
| webhook to complete ACME challenge validations and obtain certificates. |  | ||||||
| 
 | 
 | ||||||
| To make the set up of these webhook's easier, we provide a template repository | Follow the [instructions](https://cert-manager.io/docs/installation/) using the cert-manager documentation to install it within your cluster. | ||||||
| that can be used to get started quickly. |  | ||||||
| 
 | 
 | ||||||
| ### Creating your own repository | ### Webhook | ||||||
|  | 
 | ||||||
|  | ```bash | ||||||
|  | git clone https://github.com/mecodia/cert-manager-webhook-hetzner.git | ||||||
|  | cd cert-manager-webhook-hetzner | ||||||
|  | helm install --namespace kube-system cert-manager-webhook-hetzner ./deploy/hetzner-webhook | ||||||
|  | ``` | ||||||
|  | 
 | ||||||
|  | **Note**: The kubernetes resources used to install the Webhook should be deployed within the same namespace as the cert-manager. | ||||||
|  | 
 | ||||||
|  | To uninstall the webhook run | ||||||
|  | ```bash | ||||||
|  | helm uninstall --namespace kube-system cert-manager-webhook-hetzner | ||||||
|  | ``` | ||||||
|  | 
 | ||||||
|  | ## Issuer | ||||||
|  | 
 | ||||||
|  | Create a `ClusterIssuer` or `Issuer` resource as following: | ||||||
|  | ```yaml | ||||||
|  | apiVersion: cert-manager.io/v1alpha2 | ||||||
|  | kind: ClusterIssuer | ||||||
|  | metadata: | ||||||
|  |   name: letsencrypt-staging | ||||||
|  | spec: | ||||||
|  |   acme: | ||||||
|  |     # The ACME server URL | ||||||
|  |     server: https://acme-staging-v02.api.letsencrypt.org/directory | ||||||
|  | 
 | ||||||
|  |     # Email address used for ACME registration | ||||||
|  |     email: mail@example.com # REPLACE THIS WITH YOUR EMAIL!!! | ||||||
|  | 
 | ||||||
|  |     # Name of a secret used to store the ACME account private key | ||||||
|  |     privateKeySecretRef: | ||||||
|  |       name: letsencrypt-staging | ||||||
|  | 
 | ||||||
|  |     solvers: | ||||||
|  |       - dns01: | ||||||
|  |           webhook: | ||||||
|  |             groupName: dns.hetzner.cloud | ||||||
|  |             solverName: hetzner | ||||||
|  |             config: | ||||||
|  |               APIKey: <YOUR-DNS-API-KEY-HERE> | ||||||
|  | ``` | ||||||
|  | 
 | ||||||
|  | ### Credentials | ||||||
|  | For accessing Hetzner DNS API, you need a API Token which you can create in the [DNS Console](https://dns.hetzner.com/settings/api-token). | ||||||
|  | 
 | ||||||
|  | Currently we don't provide a way to use secrets for you API KEY. | ||||||
|  | 
 | ||||||
|  | ``` | ||||||
|  | 
 | ||||||
|  | ### Create a certificate | ||||||
|  | 
 | ||||||
|  | Finally you can create certificates, for example: | ||||||
|  | 
 | ||||||
|  | ```yaml | ||||||
|  | apiVersion: cert-manager.io/v1alpha2 | ||||||
|  | kind: Certificate | ||||||
|  | metadata: | ||||||
|  |   name: example-cert | ||||||
|  |   namespace: cert-manager | ||||||
|  | spec: | ||||||
|  |   commonName: example.com | ||||||
|  |   dnsNames: | ||||||
|  |     - example.com | ||||||
|  |   issuerRef: | ||||||
|  |     kind: ClusterIssuer | ||||||
|  |     name: letsencrypt-staging | ||||||
|  |   secretName: example-cert | ||||||
|  | ``` | ||||||
|  | 
 | ||||||
|  | ## Development | ||||||
|  | 
 | ||||||
|  | ### Requirements | ||||||
|  | 
 | ||||||
|  | -   [go](https://golang.org/) >= 1.13.0 | ||||||
| 
 | 
 | ||||||
| ### Running the test suite | ### Running the test suite | ||||||
| 
 | 
 | ||||||
| All DNS providers **must** run the DNS01 provider conformance testing suite, | 1. Download test binaries | ||||||
| else they will have undetermined behaviour when used with cert-manager. |  | ||||||
| 
 |  | ||||||
| **It is essential that you configure and run the test suite when creating a |  | ||||||
| DNS01 webhook.** |  | ||||||
| 
 |  | ||||||
| An example Go test file has been provided in [main_test.go](). |  | ||||||
| 
 |  | ||||||
| You can run the test suite with: |  | ||||||
| 
 |  | ||||||
|     ```bash |     ```bash | ||||||
| $ TEST_ZONE_NAME=example.com go test . |     scripts/fetch-test-binaries.sh | ||||||
|     ``` |     ``` | ||||||
| 
 | 
 | ||||||
| The example file has a number of areas you must fill in and replace with your | 1. Create a new test account at [Hetzner DNS Console](https://dns.hetzner.com/) or use an existing account | ||||||
| own options in order for tests to pass. | 
 | ||||||
|  | 1. Go to `testdata/config.json` and replace your api key. | ||||||
|  | 
 | ||||||
|  | 1. Download dependencies | ||||||
|  |     ```bash | ||||||
|  |     go mod download | ||||||
|  |     ``` | ||||||
|  | 
 | ||||||
|  | 1. Run tests with your created domain | ||||||
|  |     ```bash | ||||||
|  |     TEST_ZONE_NAME="$YOUR_NEW_DOMAIN." go test . | ||||||
|  |     ``` | ||||||
|  | 
 | ||||||
|  | ### Running the full suite with microk8s | ||||||
|  | 
 | ||||||
|  | Tested with Ubuntu: | ||||||
|  | 
 | ||||||
|  | ```bash | ||||||
|  | sudo snap install microk8s --classic | ||||||
|  | sudo microk8s.enable dns rbac | ||||||
|  | sudo microk8s.kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v0.12.0/cert-manager.yaml | ||||||
|  | sudo microk8s.config > /tmp/microk8s.config | ||||||
|  | export KUBECONFIG=/tmp/microk8s.config | ||||||
|  | helm install --namespace kube-system cert-manager-webhook-hetzner deploy/hetzner-webhook | ||||||
|  | ``` | ||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user