-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
controlplane/authenticator: allow to use kubernetes.io/tls
secrets
#344
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some nits, and corner case to doublecheck, everything else looks good!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me !
I totally miss this when refactored the CP.
The reason we are keeping the old names is to avoid the friction on the migration and save the renaming for existing users that have this configured ?
12b7415
to
bbf1e43
Compare
Yes, the idea is to avoid making a big breaking change if there is a clean way of providing backwards compat. Or, in the words of Helm maintainers, because we are nice people :P |
// Earlier versions of the integration allowed to define a secret of type corev1.SecretTypeOpaque, with the required | ||
// certs and keys stored in keys named as the constants below. | ||
// New versions can also consume a secret of type corev1.SecretTypeTLS, using standard names for certificate and key. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
Thanks for clarifying , make sense to me. And the PR LGTM thanks! |
Fixes #342