-
-
Notifications
You must be signed in to change notification settings - Fork 6
feat: Support putting TrustStore information in Secret #597
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Hm, I also have a vague memory of that we ran into some issues around OpenShift expecting the certificates to use relative hostnames rather than FQDNs... |
I had the same observation, but I think I wouldn't focus to much an OpenShift in particular here. |
a78d7f7
to
2dbc207
Compare
The field |
I searched a bit and could not find a real world CRD example. But happy if someone else finds one :) |
Please vote for this CRD change on this comment |
A customer today asked for this, and mentioned
this should clarify that OpenShift expects it as a Secret |
Description
Small follow-up of #557
This PR allows the Trustore information (such as the ca.crt) to not only be put in a ConfigMap, but also a Secret.
This was requested by a customer, they mentioned it is required by OpenShift routes, but didn't check that.
The first commit is only test refactoring, I'd suggest reviewing it separately.
CRD change
Actual schema change
Definition of Done Checklist
Author
Reviewer
Acceptance