Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mount SSL_CERT_FILE in system-wide trust store #2486

Merged
merged 1 commit into from Feb 28, 2023

Conversation

hjiawei
Copy link
Contributor

@hjiawei hjiawei commented Feb 17, 2023

Description

This changeset mounts the default SSL_CERT_FILE to system-wide trust store under /etc/pki/tls/cert.pem for applications linking legacy libssl.

For PR author

  • Tests for change.
  • If changing pkg/apis/, run make gen-files
  • If changing versions, run make gen-versions

For PR reviewers

A note for code reviewers - all pull requests must have the following:

  • Milestone set according to targeted release.
  • Appropriate labels:
    • kind/bug if this is a bugfix.
    • kind/enhancement if this is a a new feature.
    • enterprise if this PR applies to Calico Enterprise only.

@marvin-tigera marvin-tigera added this to the v1.30.0 milestone Feb 17, 2023
@hjiawei hjiawei changed the title Mount legacy SSL_CERT_FILE in system-wide trust store Mount SSL_CERT_FILE in system-wide trust store Feb 17, 2023
Copy link
Member

@rene-dekker rene-dekker left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

This changeset mounts the default `SSL_CERT_FILE` to system-wide trust
store under `/etc/pki/tls/cert.pem` for applications linking legacy
libssl.
@rene-dekker rene-dekker merged commit 0b245f9 into tigera:master Feb 28, 2023
@hjiawei hjiawei deleted the ssl-cert-volmount branch February 28, 2023 22:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants