-
Notifications
You must be signed in to change notification settings - Fork 198
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix documentation for ClientSSLCertSecret and ServerSSLCertSecret #840
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not sure if these are the better way of rephrasing them
api/v1beta1/kafkacluster_types.go
Outdated
// The secret must contains the keystore, truststore jks files and the password for them in base64 encoded format | ||
// under the keystore.jks, truststore.jks, password data fields. | ||
// The secret must contain the keystore, truststore jks files and the password for them in base64 encoded format and | ||
// the tls certificate, tls private key, CA certificate in PEM and base64 encoded format |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
// the tls certificate, tls private key, CA certificate in PEM and base64 encoded format | |
// the tls certificate, tls private key, CA certificate in PEM format with base64 encoding |
api/v1beta1/kafkacluster_types.go
Outdated
@@ -510,7 +511,7 @@ type CommonListenerSpec struct { | |||
// +kubebuilder:validation:Enum=ssl;plaintext;sasl_ssl;sasl_plaintext | |||
Type SecurityProtocol `json:"type"` | |||
// ServerSSLCertSecret is a reference to the Kubernetes secret that contains the server certificate for the listener to be used for SSL communication. | |||
// The secret must contain the keystore, truststore jks files and the password for them in base64 encoded format | |||
// The secret must contain the keystore, truststore jks files and the password for them in base64 encoded format and the tls certificate in PEM and base64 encoded format |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
// The secret must contain the keystore, truststore jks files and the password for them in base64 encoded format and the tls certificate in PEM and base64 encoded format | |
// The secret must contain the keystore, truststore jks files and the password for them in base64 encoded format and the tls certificate in PEM format with base64 encoding |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM aside from Darren's comments
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Run make manifests
to ensure that all artifacts are updated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
@bartam1 Can we merge this? |
What's in this PR?
It fixes the documentation for the ClientSSLCertSecret and ServerSSLCertSecret.
Why?
The secrets which are referenced by the ClientSSLCertSecret and ServerSSLCertSecret need to contain other fields than the keystore.jks, truststore.jks and password when they are used for inner broker or controller communication