For tenant it is important to send manifest to the right provider as well as for provider to ensure only owners can access their deployments. Thus each account must create certificate prior deploying workload or starting the provider.
Note In this guide --from
is referring to the key main
which has been previously created with akash key add
. Consider changing to the name of yours.
Manage certificates
By default certificate is valid for 365 days from the moment of issuing
Create
Client (aka tenant) certificate
Provider certificate
It is important for provider to list same domain(s) as hostURI in provider attributes For example if HostURI: https://example.com
the example.com
must be listed as one of the domains in the certificate
Locally certificates and it’s respective private key are stored in single file in akash home directory. The name of the file is stated as <address>.pem
. For example certificate created with key main
the file will be named as akash1gp3scyd8aye3z8szf3mpqzgsg4csyplcqehxus.pem
If file already exists user will be prompted to check if certificate already present on chain:
- certificate is not on chain: user is prompted whether to commit or to leave as is
- certificate is on chain: user prompted to revoke it or leave as is
To create certificate without being prompted use --rie
flag (revoke if exists)
Custom expiration dates
Use following flags to set custom period of validity
naf
: valid not after. value either number of days withd
suffix364d
or RFC3339 formatted timestampnbf
: valid not before. value must be RFC3339 formatted timestamp
Note flags above are valid for both client and server certificates
example1
certificate valid for 180days after issuing
example2
certificate valid for 180days after date of start
example3
certificate valid for 365days after date of start
Revoke
Query
To query certificates for particular account
To filter by state