AWS Private CA Issuer
Issues certificates using AWS ACM Private CA.
AWS ACM Private CA is a module of the AWS Certificate Manager that can setup and manage private CAs.
cert-manager is a Kubernetes add-on to automate the management and issuance of TLS certificates from various issuing sources. It will ensure certificates are valid and up to date periodically, and attempt to renew certificates at an appropriate time before expiry.
This project acts as an add-on (see https://cert-manager.io/docs/configuration/external/) to cert-manager that signs off certificate requests using AWS PCA.
Setup
Install cert-manager first (https://cert-manager.io/docs/installation/kubernetes/).
Then install AWS PCA Issuer using Helm:
helm repo add awspca https://cert-manager.github.io/aws-privateca-issuerhelm install awspca/aws-privateca-issuer --generate-name
You can check the chart configuration in the default values file.
Configuration
As of now, the only configurable settings are access to AWS. So you can use AWS_REGION, AWS_ACCESS_KEY_ID or AWS_SECRET_ACCESS_KEY.
Alternatively, you can supply arbitrary secrets for the access and secret keys with the accessKeyIDSelector and secretAccessKeySelector fields in the ClusterIssuer and/or issuer manifests.
Access to AWS can also be configured using an EC2 instance role.
A minimal policy to use the issuer with an authority would look like follows:
{"Version": "2012-10-17","Statement": [{"Sid": "awspcaissuer","Action": ["acm-pca:DescribeCertificateAuthority", "acm-pca:GetCertificate", "acm-pca:IssueCertificate"],"Effect": "Allow","Resource": "arn:aws:acm-pca:<region>:<account_id>:certificate-authority/<resource_id>"}]}
Example Issuer
apiVersion: awspca.cert-manager.io/v1beta1kind: AWSPCAClusterIssuermetadata:name: examplespec:arn: <some-pca-arn>