-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve configuration options for tlsSecretName/dispatchUpstreamCASecretName #272
Comments
You can specify the same secret when specifying the secret and the upstream ca: spec:
tlsSecretName: your-tls-secret
dispatchUpstreamCASecretName: your-tls-secret We do this exact thing in the e2e tests. We intentionally match the cert-manager conventions here. I'll leave this issue open because I think it indicates a deficiency in the docs. Please ping again if the above doesn't work for you. |
Hi @ecordell: This is from a spicedb deployed as suggested (repeated use of the same secret):
The secret is mounted at Have I misconfigured / misunderstood something? |
No, you're absolutely right, the tests tricked me because the connection will validate when using the cert directly instead of the CA. I opened #273 to address this. Thanks for the report! |
#273 is merged and in the latest release! |
I've configured a CA-type ClusterIssuer with cert-manager to include the ca.crt in the certificate (https://cert-manager.io/docs/configuration/ca/#deployment, see "Note").
This option allows to include the CA certificate as ca.crt into a secret that otherwise resides in a different namespace (cert-manager). The outcome is that generated secrets contain tls.crt, tls.key, and ca.crt.
I'd like to feed this into the tls configuration without additional processing (like copying the ca.crt from the secret and placing it as tls.crt into another one). In the present state I needed to reverse engineer from the PodSpec how the input it expected and then provide it accordingly.
The text was updated successfully, but these errors were encountered: