docs: clarify ExtensionTLS type#5154
Conversation
|
The implementation right now is a bit confusing. I propose that we adopt something similar to GW-API caCertificateRefs here to avoid the confusion. Regarding the change at hand: I would avoid linking cert-manager here, and keep it more concise, like:
|
|
Thanks for the quick review @guydc ! Overall agree with what you said. Updated docs to match current state |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #5154 +/- ##
==========================================
+ Coverage 65.30% 65.31% +0.01%
==========================================
Files 213 213
Lines 33915 33915
==========================================
+ Hits 22147 22152 +5
+ Misses 10438 10433 -5
Partials 1330 1330 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
@nareddyt can you run |
|
/retest |
|
|
|
Signed-off-by: Teju Nareddy <tejunareddy@gmail.com>
|
Hey all, sorry for the delay. Forgot this was not merged in... Fixed CI lint issue |
|
/retest |
|
/retest |
1 similar comment
|
/retest |
|
I think the test failure is unrelated |
Current document says to mount a secret that has a TLS private key. This is incorrect - Envoy Gateway acting as a client should not receive any private key.
Envoy Gateway doesn't support mTLS when connecting to extension server, so there is no need for private key today. This is verified by reading the code. EG is only looking for
tls.crtgateway/internal/extension/registry/extension_manager.go
Lines 265 to 276 in 28e1a48
Release Notes: No