Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Apply OpenShift Ingress certificate to Kourier system-internal-tls is… #2665

Conversation

mgencur
Copy link
Contributor

@mgencur mgencur commented May 15, 2024

… used

Key "internal-encryption" is deprecated as part of knative/networking#858

Proposed Changes

  • Apply OpenShift Ingress certificate when system-internal-tls key is defined in KnativeServing:
spec:
  config:
    network:
      system-internal-tls: Enabled

… used

Key "internal-encryption" is deprecated.
@openshift-ci openshift-ci bot requested review from aliok and ReToCode May 15, 2024 12:48
Copy link
Contributor

openshift-ci bot commented May 15, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: mgencur

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@mgencur
Copy link
Contributor Author

mgencur commented May 15, 2024

/assign @ReToCode

@mgencur
Copy link
Contributor Author

mgencur commented May 15, 2024

OK. Seems like this will be done as part of https://github.com/openshift-knative/serverless-operator/pull/2663/files
Closing.

@mgencur mgencur closed this May 15, 2024
@@ -101,7 +98,8 @@ func addKourierEnvValues(ks base.KComponent) mf.Transformer {
}

networkCM := ks.GetSpec().GetConfig()[networkCMName]
if encrypt := networkCM[InternalEncryptionKey]; strings.ToLower(encrypt) == "true" {
if strings.ToLower(networkCM[networking.SystemInternalTLSKey]) == "true" ||
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think we need to support the old key longer, we deprecated it in the docs. Also the new value is enabled and has a type that can be used. Check out #2663.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants