@@ -120,17 +120,18 @@ Repositories for Builds] for more information.
120
120
[[service-serving-certificate-secrets]]
121
121
=== Service Serving Certificate Secrets
122
122
123
- To secure communication to your service, you can have the cluster generate a signed
124
- serving certificate/key pair into a secret in your namespace. To do this, set the
125
- "*service.alpha.openshift.io/serving-cert-secret-name*" to the name you want to use
126
- for your secret. Your PodSpec can then mount that secret and when it is available
127
- your pod will run. The certificate will be good for the internal service DNS name:
128
- `*<service.name>.<service.namespace>.svc*`. The certificate and key are in PEM format,
129
- stored in `*tls.crt*` and `*tls.key*` respectively.
130
-
131
- Other pods can trust cluster-created certificates (which are only signed for internal
132
- DNS names), by using the CA bundle in the `*/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt*`
133
- file that is automatically mounted in their pod.
123
+ To secure communication to your service, have the cluster generate a signed
124
+ serving certificate/key pair into a secret in your namespace. To do this, set
125
+ the `*service.alpha.openshift.io/serving-cert-secret-name*` to the name you want
126
+ to use for your secret. Then, your *PodSpec* can mount that secret. When it is
127
+ available, your pod will run. The certificate will be good for the internal
128
+ service DNS name, `*<service.name>.<service.namespace>.svc*`. The certificate
129
+ and key are in PEM format, stored in `*tls.crt*` and `*tls.key*` respectively.
130
+
131
+ Other pods can trust cluster-created certificates (which are only signed for
132
+ internal DNS names), by using the CA bundle in the
133
+ *_/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt_* file that is
134
+ automatically mounted in their pod.
134
135
135
136
[[secrets-restrictions]]
136
137
== Restrictions
0 commit comments