Open
Description
RKE version:
1.0.0
When specifying custom certificates, RKE assumes that the specified CA directly signs final certificates for kubernetes components. There's no way to specify custom certificates using intermediate CA:
- validation of certificates fails due to issuer name mismatch (i.e. https://github.com/rancher/rke/blob/adc5941/pki/util.go#L773)
- there's no way to inform kubernetes components to serve whole certificate chain instead of just their own certificate
Such intermediate-CA setup would be beneficial in case of intermediate CA rotation as is in our case - it's only needed to supply the long-lived, offline root CA to clients to trust the rotated intermediate certificates.
gz#12775