You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy/helm/secret-operator/crds/crds.yaml
+23-1
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ spec:
40
40
description: |-
41
41
The [`autoTls` backend](https://docs.stackable.tech/home/nightly/secret-operator/secretclass#backend-autotls) issues a TLS certificate signed by the Secret Operator. The certificate authority can be provided by the administrator, or managed automatically by the Secret Operator.
42
42
43
-
A new certificate and keypair will be generated and signed for each Pod, keys or certificates are never reused.
43
+
A new certificate and key pair will be generated and signed for each Pod, keys or certificates are never reused.
44
44
properties:
45
45
ca:
46
46
description: Configures the certificate authority used to issue Pod certificates.
@@ -58,6 +58,28 @@ spec:
58
58
59
59
If `autoGenerate: true` then the Secret Operator will prepare a new CA certificate the old CA approaches expiration. If `autoGenerate: false` then the Secret Operator will log a warning instead.
60
60
type: string
61
+
keyGeneration:
62
+
default:
63
+
rsa:
64
+
length: 2048
65
+
description: The algorithm used to generate a key pair and required configuration settings. Currently only RSA and a key length of 2048, 3072 or 4096 bits can be configured.
66
+
oneOf:
67
+
- required:
68
+
- rsa
69
+
properties:
70
+
rsa:
71
+
properties:
72
+
length:
73
+
description: The amount of bits used for generating the RSA keypair. Currently, `2048`, `3072` and `4096` are supported. Defaults to `2048` bits.
74
+
enum:
75
+
- 2048
76
+
- 3072
77
+
- 4096
78
+
type: integer
79
+
required:
80
+
- length
81
+
type: object
82
+
type: object
61
83
secret:
62
84
description: Reference (name and namespace) to a Kubernetes Secret object where the CA certificate and key is stored in the keys `ca.crt` and `ca.key` respectively.
<1> `autoTls.ca.keyGeneration` specifies which algorithm and additional parameters are used
51
+
<2> `autoTls.ca.keyGeneration.rsa` specifies the RSA key pair algorithm (RSA currently is the only one supported)
52
+
<3> `autoTls.ca.keyGeneration.rsa.length` specifies the amount of bits used for generating the RSA key pair. Currently, `2048`, `3072` and `4096` are supported. Defaults to `2048` bits.
53
+
54
+
CAUTION: Using more than `2048` bits will significantly increase the computation time to create new key pairs.
55
+
The SSL Labs https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices[SSL and TLS Deployment Best Practices] as of 2024-10-01 recommend
56
+
57
+
> For most websites, using RSA keys stronger than 2,048 bits and ECDSA keys stronger than 256 bits is a waste of CPU power and might impair user experience
58
+
59
+
If options higher than `2048` are chosen, the CPU resources for the secret operator should be increased in order to avoid Pods being stuck in `Pending` waiting for the computation of their key pair.
60
+
41
61
==== Certificate lifetime
42
62
43
63
By default the Secret Operator will generally aim to use as short-lived certificates as possible.
@@ -375,7 +395,7 @@ The secret contains the following files:
375
395
Both stores are encrypted, with an empty string as the passphrase.
376
396
377
397
NOTE: When using the xref:#backend-k8ssearch[] backend, it is _strongly_ recommended to store secrets in the use the xref:#format-tls-pem[] format instead.
378
-
The secret operator supports converting PEM keypairs into PKCS#12, but not the other way around.
398
+
The secret operator supports converting PEM key pairs into PKCS#12, but not the other way around.
0 commit comments