-
Notifications
You must be signed in to change notification settings - Fork 264
feat(chart): add support for custom TLS secret for api.ingress, fallback to self-signed #4802
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
…ack to self-signed Signed-off-by: abelhoula <[email protected]>
✅ Deploy Preview for docs-kargo-io canceled.
|
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #4802 +/- ##
=======================================
Coverage 54.17% 54.17%
=======================================
Files 395 395
Lines 33792 33792
=======================================
Hits 18306 18306
Misses 14558 14558
Partials 928 928 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Signed-off-by: abelhoula <[email protected]>
This was already possible by setting Is there a specific reason that existing capability wasn't working for you? |
Many platforms pre-provision TLS secrets with standardized names (e.g., from external PKI/ACME controllers). Allowing |
I think the case wherein one has no control over the naming convention of the Secrets containing one's certs, outlying though I think it may be, seems like rational impetus for this. So I'm on board with the idea, but the following things need to be addressed for this PR to be merged:
Bottom line is that I am perfectly amenable to this change, but need it to be more thorough. |
…back to self-signed