-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(helm): add customCaCerts value #707
feat(helm): add customCaCerts value #707
Conversation
The initContainers key should only be templated if there are any initContainers specified in the values file.
Co-authored-by: Michael Berlec <[email protected]>
Kudos, SonarCloud Quality Gate passed! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems to work fine, but is there any way to test this? For example could there be a helm test, that executes the keytool
command via a remote shell, and verifies that the cert is in the resulting list?
Don't know if it's worth it though, just a thought.
Testing is always a good thing - but I see some challenges here. Another way would be to implement a separate test via e.g. CI which might be a little bit overwhelming here. |
I see your point.
Maybe it could be as easy as opening a shell to the running container, and execute the |
WHAT
Add Helm chart value (
customCaCerts
) to support adding additional custom ca-certs to the control- and dataplane pods.WHY
If your company is using a certificate authority which is not inside the common
/opt/java/openjdk/lib/security/cacerts
file connections will not be trusted.A connection in between will then fail in lack of trusted certificates.
When only using public signed certificate you will not need this value.
HOW
With this change you will be able to specify additional custom certificates as follows in your values file:
When one or more certificates are added to the dict they will be each added via a initContainer and emptyDir to both cp and dp.
To view the added certificates you can run the keytool with following command:
keytool -list -keystore /opt/java/openjdk/lib/security/cacerts -storepass changeit | grep -i your-cert-name
Marco Lecheler [email protected] Mercedes-Benz Tech Innovation GmbH (ProviderInformation)