-
-
Notifications
You must be signed in to change notification settings - Fork 6
feat: Support putting TrustStore information in Secret #597
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Hm, I also have a vague memory of that we ran into some issues around OpenShift expecting the certificates to use relative hostnames rather than FQDNs... |
I had the same observation, but I think I wouldn't focus to much an OpenShift in particular here. |
a78d7f7
to
2dbc207
Compare
The field |
I searched a bit and could not find a real world CRD example. But happy if someone else finds one :) |
Please vote for this CRD change on this comment |
A customer today asked for this, and mentioned
this should clarify that OpenShift expects it as a Secret |
Decision approved |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Do we need doc updates?
@@ -395,6 +395,18 @@ spec: | |||
secretClassName: | |||
description: The name of the SecretClass that the request concerns. | |||
type: string | |||
targetKind: | |||
default: ConfigMap |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I missed the boat on this, but I think Secret
should be the default.
I assume ConfigMap was chosen as a default for good reason, so please continue.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh I guess because that was the existing behaviour.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Correct, existing behavior is a ConfigMap. If we would default to Secret it's breaking ;)
Also I recall someone in a discussion saying that we should try to be transparent that this is not confidential data.
Added to concepts page in 7613599 |
Description
Small follow-up of #557
This PR allows the Trustore information (such as the ca.crt) to not only be put in a ConfigMap, but also a Secret.
This was requested by a customer, they mentioned it is required by OpenShift routes, but didn't check that.
The first commit is only test refactoring, I'd suggest reviewing it separately.
CRD change
Actual schema change
Definition of Done Checklist
Author
Reviewer
Acceptance