Skip to content

Commit 69746b9

Browse files
authored
NGF: Secret support for BackendTLSPolicy (#315)
NGF now supports the ability to configure a BackendTLSPolicy with a Secret containing the CA certificate.
1 parent 74f9d3a commit 69746b9

File tree

2 files changed

+5
-3
lines changed

2 files changed

+5
-3
lines changed

Diff for: content/ngf/how-to/traffic-security/securing-backend-traffic.md

+3-1
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,9 @@ We can see we a status 400 Bad Request message from NGINX.
216216

217217
## Create the backend TLS configuration
218218

219-
To configure the backend TLS terminationm, first we will create the ConfigMap that holds the `ca.crt` entry for verifying our self-signed certificates:
219+
{{< note >}} This example uses a `ConfigMap` to store the CA certificate, but you can also use a `Secret`. This could be a better option if integrating with [cert-manager](https://cert-manager.io/). The `Secret` should have a `ca.crt` key that holds the contents of the CA certificate. {{< /note >}}
220+
221+
To configure the backend TLS termination, first we will create the ConfigMap that holds the `ca.crt` entry for verifying our self-signed certificates:
220222

221223
```yaml
222224
kubectl apply -f - <<EOF

Diff for: content/ngf/overview/gateway-api-compatibility.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -355,10 +355,10 @@ Fields:
355355
- `kind`: Supports `Service`.
356356
- `name`: Supported.
357357
- `validation`
358-
- `caCertificateRefs`: Supports single reference to a `ConfigMap`, with the CA certificate in a key named `ca.crt`.
358+
- `caCertificateRefs`: Supports single reference to a `ConfigMap` or `Secret`, with the CA certificate in a key named `ca.crt`.
359359
- `name`: Supported.
360360
- `group`: Supported.
361-
- `kind`: Supports `ConfigMap`.
361+
- `kind`: Supports `ConfigMap` and `Secret`.
362362
- `hostname`: Supported.
363363
- `wellKnownCertificates`: Supports `System`. This will set the CA certificate to the Alpine system root CA path `/etc/ssl/cert.pem`. NB: This option will only work if the NGINX image used is Alpine based. The NGF NGINX images are Alpine based by default.
364364
- `subjectAltNames`: Not supported.

0 commit comments

Comments
 (0)