-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow customers to request CA cert (e.g. for external clients) #410
Comments
This needs to be documented as well (once implemented) |
So we have a few options to go on here...
I'm inclined to say that a CM is the way to go here. It should be easier for outsiders to interact with, and is already supported by things like k8s mounts. It also means we don't have to interact with webhooks or worry about what happens when said webhook goes down. If we go with the CM approach then we also have to decide who is responsible for deciding where it should go.
So far, I'm leaning towards 2b, but that is far from a final call. |
I just wanted to mention that in the future we also need a mechanism to generate cert-pairs for the users. |
There is a similar Issue for Pods: #320
As a SDP user I need to get the current ca.crt so that I can put it in external clients or e.g. OpenShift routes.
Things to watch out
Workaround
Until this is implemented you can use one of the following workarounds:
ca.crt
from the referenced Secret in the SecretClass. Usually it is calledsecret-provisioner-tls-ca
and is located either in thedefault
orstackable-operators
namespace.The text was updated successfully, but these errors were encountered: