BackendTLSPolicy: Support CACerts in Secrets
Description:
Describe the desired behavior, what scenario it enables and how it would be used.
Relates to https://github.com/envoyproxy/gateway/pull/2247
[optional Relevant Links:]
Any extra documentation required to understand the issue.
https://github.com/envoyproxy/gateway/pull/2247#discussion_r1436045542 shall we really process CAs in secrets ?
I'm interested in this, please tell me more information.
After we discuss the results, please assign them to me. Thanks!
This issue has been automatically marked as stale because it has not had activity in the last 30 days.
https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1alpha2.BackendTLSPolicyConfig
Support: Core - An optional single reference to a Kubernetes ConfigMap, with the CA certificate in a key named ca.crt. Support: Implementation-specific (More than one reference, or other kinds of resources).
Vault helm chart uses cert-manager to generate a kubernetes.io/tls type secret having a ca.crt key.
I guess any app who needs a custom ca/keypair is doing the same. Duplicating the ca.crt key in a ConfigMap for a backendTLSPolicy leads to inconsistencies on ca rotation, I'd love to avoid that burden.
This issue has been automatically marked as stale because it has not had activity in the last 30 days.