diff --git a/.github/ISSUE_TEMPLATE/bug-report.md b/.github/ISSUE_TEMPLATE/bug-report.md new file mode 100644 index 0000000..2033d4c --- /dev/null +++ b/.github/ISSUE_TEMPLATE/bug-report.md @@ -0,0 +1,45 @@ +--- +name: Bug report +about: Create a report to help us improve +title: "[BUG]" +labels: bug +assignees: '' + +--- + +**Describe the Bug** + +A clear and concise description of what the bug is. + +**To Reproduce** + +Steps to reproduce the behavior: +1. Go to '...' +2. Click on '....' +3. Scroll down to '....' +4. See error + +**Expected Behavior** + +A clear and concise description of what you expected to happen. + +**Screenshots and Logs** + +If applicable, add screenshots and logs to help explain your problem. + +**Product Deployment** + +Please complete the following information: + - Deployment format: [e.g. software, container] + - Version [e.g. 8.0.0] + +**Desktop** + +Please complete the following information: + - OS: [e.g. iOS] + - Browser [e.g. chrome, safari] + - Version [e.g. 22] + +**Additional Context** + +Add any other context about the problem here. diff --git a/.github/ISSUE_TEMPLATE/config.yml b/.github/ISSUE_TEMPLATE/config.yml new file mode 100644 index 0000000..4fd06e9 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/config.yml @@ -0,0 +1,7 @@ +blank_issues_enabled: true + +# Update url below as needed. +contact_links: + - name: GitHub Discussions + url: https://github.com/Keyfactor/ejbca-ce/discussions + about: Join in-depth discussions or ask questions diff --git a/.github/ISSUE_TEMPLATE/feature_request.md b/.github/ISSUE_TEMPLATE/feature_request.md new file mode 100644 index 0000000..05a453e --- /dev/null +++ b/.github/ISSUE_TEMPLATE/feature_request.md @@ -0,0 +1,25 @@ +--- +name: Feature request +about: Suggest an idea for this project +title: '' +labels: '' +assignees: '' + +--- + +**Is your feature request related to a problem or specific use case? Please describe.** +A clear and concise description of the problem or use case. + +**Describe the solution you'd like** +A clear and concise description of what you want to happen. + +**Describe alternatives you've considered** +A clear and concise description of any alternative solutions or features you've considered. + +**Product deployment** +Please complete the following information: + - Deployment format: [e.g. software, container] + - Version [e.g. 8.0.0] + +**Additional context** +Add any other context or screenshots about the feature request here. diff --git a/.github/images/community-ejbca.png b/.github/images/community-ejbca.png new file mode 100644 index 0000000..e7b988e Binary files /dev/null and b/.github/images/community-ejbca.png differ diff --git a/.github/images/community-signserver.png b/.github/images/community-signserver.png new file mode 100644 index 0000000..f2fda10 Binary files /dev/null and b/.github/images/community-signserver.png differ diff --git a/.github/images/keyfactor-ejbca-enterprise.png b/.github/images/keyfactor-ejbca-enterprise.png new file mode 100644 index 0000000..2117b79 Binary files /dev/null and b/.github/images/keyfactor-ejbca-enterprise.png differ diff --git a/.github/images/keyfactor-signserver-enterprise.png b/.github/images/keyfactor-signserver-enterprise.png new file mode 100644 index 0000000..739b112 Binary files /dev/null and b/.github/images/keyfactor-signserver-enterprise.png differ diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md new file mode 100644 index 0000000..1866168 --- /dev/null +++ b/.github/pull_request_template.md @@ -0,0 +1,16 @@ +## Describe your changes + + + +## How has this been tested? + + + +## Checklist before requesting a review + + +- [ ] I have performed a self-review of my code +- [ ] I have kept the patch limited to only change the parts related to the patch +- [ ] This change requires a documentation update + +See also [Contributing Guidelines](../../CONTRIBUTING.md). diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md new file mode 100644 index 0000000..18bd580 --- /dev/null +++ b/CONTRIBUTING.md @@ -0,0 +1,7 @@ +# Contributing Guidelines + +For information on how to contribute to EJBCA and related tools, see [EJBCA Contributing Guidelines](https://github.com/Keyfactor/ejbca-ce/blob/main/CONTRIBUTING.md). + + diff --git a/README.md b/README.md index 46d22ef..bcae5dd 100644 --- a/README.md +++ b/README.md @@ -22,12 +22,13 @@ ejbca-k8s-csr-signer is open source and supported on best effort level for this - - Kubernetes logo + + + EJBCA logo - - - Helm logo + + + EJBCA logo # EJBCA Certificate Signing Request Proxy for K8s @@ -36,24 +37,44 @@ ejbca-k8s-csr-signer is open source and supported on best effort level for this The EJBCA Certificate Signing Request Proxy for K8s forwards certificate signing requests generated by Kubernetes to [EJBCA](https://www.primekey.com/products/ejbca-enterprise/) for signing by a trusted enterprise certificate authority. The signer operates within the [K8s CertificateSigningRequests API](https://kubernetes.io/docs/reference/access-authn-authz/certificate-signing-requests/) and implements a Controller that uses the the V1 CertificateSigningRequests informer to handle associated resources. CSRs are only enrolled if they are approved using an [approver](https://github.com/kubernetes/kubernetes/tree/master/pkg/controller/certificates/approver). -## Community supported -We welcome contributions. +## Get started + +To get started with the EJBCA Certificate Signing Request (CSR) Proxy for K8s, see [Getting started](https://github.com/Keyfactor/ejbca-k8s-csr-signer/blob/main/docs/getting-started.md). + +For more information on usage, configuration, and integration, see the following links: +* [Demo usage with Istio](docs/istio-deployment.markdown) +* [Runtime Customization](docs/annotations.markdown) +* [End Entity Name Selection](docs/endentitynamecustomization.markdown) +* [Testing](docs/testing.markdown) -The cert-manager external issuer for Keyfactor command is open source and community supported, meaning that there is **no SLA** applicable for these tools. +#### System Requirements -###### To report a problem or suggest a new feature, use the **[Issues](../../issues)** tab. If you want to contribute actual bug fixes or proposed enhancements, see the [contribution guidelines](https://github.com/Keyfactor/command-k8s-csr-signer/blob/main/CONTRIBUTING.md) and use the **[Pull requests](../../pulls)** tab. +To run the EJBCA K8s CSR Signer container a system should fulfill these minimum requirements: +* CPU: 100m +* RAM: 128MB + ## Migration from EJBCA CSR Signer v1.0 to v2.0 The EJBCA CSR Signer v2.0 has breaking changes from v1.0. To migrate from v1.0 to v2.0, uninstall the v1.0 deployment and install the v2.0 deployment. The v2.0 deployment uses the same configuration as v1.0, but the configuration is now stored in a Kubernetes ConfigMap. See the [Getting Started](docs/getting-started.markdown) to install the v2.0 deployment. -## Documentation -* [Getting Started](docs/getting-started.markdown) -* Usage - * [Demo usage with Istio](docs/istio-deployment.markdown) - * [Runtime Customization](docs/annotations.markdown) - * [End Entity Name Selection](docs/endentitynamecustomization.markdown) -* [Testing](docs/testing.markdown) -* [License](LICENSE) +## Community Support +In the [Keyfactor Community](https://www.keyfactor.com/community/), we welcome contributions. + +The Community software is open-source and community-supported, meaning that **no SLA** is applicable. + +* To report a problem or suggest a new feature, go to [Issues](../../issues). +* If you want to contribute actual bug fixes or proposed enhancements, see the [Contributing Guidelines](CONTRIBUTING.md) and go to [Pull requests](../../pulls). + +## Commercial Support + +Commercial support is available for [EJBCA Enterprise](https://www.keyfactor.com/products/ejbca-enterprise/). + +## License +For license information, see [LICENSE](LICENSE). + +## Related Projects +See all [Keyfactor EJBCA GitHub projects](https://github.com/orgs/Keyfactor/repositories?q=ejbca). + diff --git a/README_NEW.md b/README_NEW.md new file mode 100644 index 0000000..e1cbd20 --- /dev/null +++ b/README_NEW.md @@ -0,0 +1,54 @@ + + + EJBCA logo + + + + EJBCA logo + + +# EJBCA Certificate Signing Request Proxy for K8s + +[![Go Report Card](https://goreportcard.com/badge/github.com/Keyfactor/ejbca-k8s-csr-signer)](https://goreportcard.com/report/github.com/Keyfactor/ejbca-k8s-csr-signer) [![GitHub tag (latest SemVer)](https://img.shields.io/github/v/tag/keyfactor/ejbca-k8s-csr-signer?label=release)](https://github.com/keyfactor/ejbca-k8s-csr-signer/releases) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) [![license](https://img.shields.io/github/license/keyfactor/ejbca-k8s-csr-signer.svg)]() + +The EJBCA Certificate Signing Request Proxy for K8s forwards certificate signing requests generated by Kubernetes to [EJBCA](https://www.primekey.com/products/ejbca-enterprise/) for signing by a trusted enterprise certificate authority. The signer operates within the [K8s CertificateSigningRequests API](https://kubernetes.io/docs/reference/access-authn-authz/certificate-signing-requests/) and implements a Controller that uses the the V1 CertificateSigningRequests informer to handle associated resources. CSRs are only enrolled if they are approved using an [approver](https://github.com/kubernetes/kubernetes/tree/master/pkg/controller/certificates/approver). + +## Get started + +To get started with the EJBCA Certificate Signing Request (CSR) Proxy for K8s, see [Getting started](https://github.com/Keyfactor/ejbca-k8s-csr-signer/blob/main/docs/getting-started.md). + +For more information on usage, configuration, and integration, see the following links: +* [Demo usage with Istio](docs/istio-deployment.markdown) +* [Runtime Customization](docs/annotations.markdown) +* [End Entity Name Selection](docs/endentitynamecustomization.markdown) +* [Testing](docs/testing.markdown) + +#### System Requirements + +To run the EJBCA K8s CSR Signer container a system should fulfill these minimum requirements: + +* CPU: 100m +* RAM: 128MB + +## Migration from EJBCA CSR Signer v1.0 to v2.0 + +The EJBCA CSR Signer v2.0 has breaking changes from v1.0. To migrate from v1.0 to v2.0, uninstall the v1.0 deployment and install the v2.0 deployment. The v2.0 deployment uses the same configuration as v1.0, but the configuration is now stored in a Kubernetes ConfigMap. See the [Getting Started](docs/getting-started.markdown) to install the v2.0 deployment. + +## Community Support +In the [Keyfactor Community](https://www.keyfactor.com/community/), we welcome contributions. + +The Community software is open-source and community-supported, meaning that **no SLA** is applicable. + +* To report a problem or suggest a new feature, go to [Issues](../../issues). +* If you want to contribute actual bug fixes or proposed enhancements, see the [Contributing Guidelines](CONTRIBUTING.md) and go to [Pull requests](../../pulls). + +## Commercial Support + +Commercial support is available for [EJBCA Enterprise](https://www.keyfactor.com/products/ejbca-enterprise/). + +## License +For license information, see [LICENSE](LICENSE). + +## Related Projects +See all [Keyfactor EJBCA GitHub projects](https://github.com/orgs/Keyfactor/repositories?q=ejbca). + diff --git a/SECURITY.md b/SECURITY.md new file mode 100644 index 0000000..5f8e838 --- /dev/null +++ b/SECURITY.md @@ -0,0 +1,7 @@ +# Security Policy + +To read our Security Policy, see [EJBCA Security Policy](https://github.com/Keyfactor/ejbca-ce/blob/main/SECURITY.md). + + diff --git a/integration-manifest.json b/integration-manifest.json index 2f51cb5..16901bf 100644 --- a/integration-manifest.json +++ b/integration-manifest.json @@ -4,6 +4,7 @@ "name": "ejbca-k8s-csr-signer", "status": "production", "link_github": true, + "update_catalog": true, "platform_matrix": "linux/arm64,linux/amd64,linux/s390x,linux/ppc64le", "description": "An implementation of the Kubernetes CSR signing API that routes Certificate Signing Requests from the cluster to the EJBCA Enrollment API", "support_level": "kf-community", diff --git a/readme_source.md b/readme_source.md index 2061c34..03c6b6f 100644 --- a/readme_source.md +++ b/readme_source.md @@ -1,9 +1,10 @@ - - Kubernetes logo + + + EJBCA logo - - - Helm logo + + + EJBCA logo # EJBCA Certificate Signing Request Proxy for K8s @@ -12,22 +13,41 @@ The EJBCA Certificate Signing Request Proxy for K8s forwards certificate signing requests generated by Kubernetes to [EJBCA](https://www.primekey.com/products/ejbca-enterprise/) for signing by a trusted enterprise certificate authority. The signer operates within the [K8s CertificateSigningRequests API](https://kubernetes.io/docs/reference/access-authn-authz/certificate-signing-requests/) and implements a Controller that uses the the V1 CertificateSigningRequests informer to handle associated resources. CSRs are only enrolled if they are approved using an [approver](https://github.com/kubernetes/kubernetes/tree/master/pkg/controller/certificates/approver). -## Community supported -We welcome contributions. +## Get started + +To get started with the EJBCA Certificate Signing Request (CSR) Proxy for K8s, see [Getting started](https://github.com/Keyfactor/ejbca-k8s-csr-signer/blob/main/docs/getting-started.md). + +For more information on usage, configuration, and integration, see the following links: +* [Demo usage with Istio](docs/istio-deployment.markdown) +* [Runtime Customization](docs/annotations.markdown) +* [End Entity Name Selection](docs/endentitynamecustomization.markdown) +* [Testing](docs/testing.markdown) -The cert-manager external issuer for Keyfactor command is open source and community supported, meaning that there is **no SLA** applicable for these tools. +#### System Requirements -###### To report a problem or suggest a new feature, use the **[Issues](../../issues)** tab. If you want to contribute actual bug fixes or proposed enhancements, see the [contribution guidelines](https://github.com/Keyfactor/command-k8s-csr-signer/blob/main/CONTRIBUTING.md) and use the **[Pull requests](../../pulls)** tab. +To run the EJBCA K8s CSR Signer container a system should fulfill these minimum requirements: +* CPU: 100m +* RAM: 128MB + ## Migration from EJBCA CSR Signer v1.0 to v2.0 The EJBCA CSR Signer v2.0 has breaking changes from v1.0. To migrate from v1.0 to v2.0, uninstall the v1.0 deployment and install the v2.0 deployment. The v2.0 deployment uses the same configuration as v1.0, but the configuration is now stored in a Kubernetes ConfigMap. See the [Getting Started](docs/getting-started.markdown) to install the v2.0 deployment. -## Documentation -* [Getting Started](docs/getting-started.markdown) -* Usage - * [Demo usage with Istio](docs/istio-deployment.markdown) - * [Runtime Customization](docs/annotations.markdown) - * [End Entity Name Selection](docs/endentitynamecustomization.markdown) -* [Testing](docs/testing.markdown) -* [License](LICENSE) +## Community Support +In the [Keyfactor Community](https://www.keyfactor.com/community/), we welcome contributions. + +The Community software is open-source and community-supported, meaning that **no SLA** is applicable. + +* To report a problem or suggest a new feature, go to [Issues](../../issues). +* If you want to contribute actual bug fixes or proposed enhancements, see the [Contributing Guidelines](CONTRIBUTING.md) and go to [Pull requests](../../pulls). + +## Commercial Support + +Commercial support is available for [EJBCA Enterprise](https://www.keyfactor.com/products/ejbca-enterprise/). + +## License +For license information, see [LICENSE](LICENSE). + +## Related Projects +See all [Keyfactor EJBCA GitHub projects](https://github.com/orgs/Keyfactor/repositories?q=ejbca).