Skip to content

Commit 3c13398

Browse files
authored
Merge pull request #2761 from ahardin-rh/2324-followup
Follow-up edits to PR#2324
2 parents 067988b + 12f6bc4 commit 3c13398

File tree

1 file changed

+12
-11
lines changed

1 file changed

+12
-11
lines changed

Diff for: dev_guide/secrets.adoc

+12-11
Original file line numberDiff line numberDiff line change
@@ -120,17 +120,18 @@ Repositories for Builds] for more information.
120120
[[service-serving-certificate-secrets]]
121121
=== Service Serving Certificate Secrets
122122

123-
To secure communication to your service, you can have the cluster generate a signed
124-
serving certificate/key pair into a secret in your namespace. To do this, set the
125-
"*service.alpha.openshift.io/serving-cert-secret-name*" to the name you want to use
126-
for your secret. Your PodSpec can then mount that secret and when it is available
127-
your pod will run. The certificate will be good for the internal service DNS name:
128-
`*<service.name>.<service.namespace>.svc*`. The certificate and key are in PEM format,
129-
stored in `*tls.crt*` and `*tls.key*` respectively.
130-
131-
Other pods can trust cluster-created certificates (which are only signed for internal
132-
DNS names), by using the CA bundle in the `*/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt*`
133-
file that is automatically mounted in their pod.
123+
To secure communication to your service, have the cluster generate a signed
124+
serving certificate/key pair into a secret in your namespace. To do this, set
125+
the `*service.alpha.openshift.io/serving-cert-secret-name*` to the name you want
126+
to use for your secret. Then, your *PodSpec* can mount that secret. When it is
127+
available, your pod will run. The certificate will be good for the internal
128+
service DNS name, `*<service.name>.<service.namespace>.svc*`. The certificate
129+
and key are in PEM format, stored in `*tls.crt*` and `*tls.key*` respectively.
130+
131+
Other pods can trust cluster-created certificates (which are only signed for
132+
internal DNS names), by using the CA bundle in the
133+
*_/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt_* file that is
134+
automatically mounted in their pod.
134135

135136
[[secrets-restrictions]]
136137
== Restrictions

0 commit comments

Comments
 (0)