-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Eventing TLS: Support exposing cluster-local CA Certs for addressables resources #14196
Comments
Few questions:
|
We just made a release, so technically yes ... renaming a field seems painful
I thought that Serving internal TLS will remove this limitation eventually (cc @ReToCode), I don't think even in non-eventing case you want clients to do any complex SAN logic to call a service |
Actually I was wrong - the |
Exactly. This should not be an issue and we (will) know what CA signed the certificate for |
/triage accepted |
As discussed earlier, we will integrate Eventing and Serving TLS using ConfigMaps with trust bundles (indirectly integrating Knative with trust-manager: https://cert-manager.io/docs/trust/trust-manager/) (see #14717 and knative/eventing#7532). I think CA certs field in the status is still handy for quick experiments/development in the self-signed issuer case but it's optional. So closing this issue for now |
Describe the feature
As the Eventing TLS proposal describes we should expose CA certs for Serving's addressables resources in the resource status when using HTTPS
The text was updated successfully, but these errors were encountered: