Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🔪 Investigate if ca cert update code is still required and if not remove the code #11

Open
ahmad-ibra opened this issue Jun 11, 2024 · 0 comments
Labels
spike Spike / investigation

Comments

@ahmad-ibra
Copy link
Collaborator

Description

Currently we have custom code to update ca certs as required.

The comment linked below implies that we may not need this specific functionality:
kubernetes-sigs/kind#2826 (comment)

Investigate if we can update the kind cluster template to mount the cert like the above comment suggests. If that works, we can remove the now redundant code.

AC

  • Investigate feasibility of mounting ca certs via an update to the kind cluster template
  • If the above works:
    • Update the kind cluster template
    • Remove the now redundant update ca cert code
@TylerGillson TylerGillson changed the title SPIKE: Investigate if ca cert update code is still required and if not remove the code 🔪 Investigate if ca cert update code is still required and if not remove the code Jun 11, 2024
@TylerGillson TylerGillson added the spike Spike / investigation label Jun 11, 2024
@dosubot dosubot bot added the stale Issue has not had recent activity or appears to be solved. Stale issues will be automatically closed label Sep 10, 2024
@dosubot dosubot bot closed this as not planned Won't fix, can't repro, duplicate, stale Sep 17, 2024
@dosubot dosubot bot removed the stale Issue has not had recent activity or appears to be solved. Stale issues will be automatically closed label Sep 17, 2024
@TylerGillson TylerGillson reopened this Sep 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
spike Spike / investigation
Projects
None yet
Development

No branches or pull requests

2 participants