Skip to content

Commit caa00af

Browse files
committed
automatic service serving cert signer
1 parent 086ea0f commit caa00af

File tree

1 file changed

+15
-0
lines changed

1 file changed

+15
-0
lines changed

dev_guide/secrets.adoc

+15
Original file line numberDiff line numberDiff line change
@@ -116,6 +116,21 @@ Pull Secrets] for more information.
116116
See link:builds.html#using-private-repositories-for-builds[Using Private
117117
Repositories for Builds] for more information.
118118

119+
[[service-serving-certificate-secrets]]
120+
=== Service Serving Certificate Secrets
121+
122+
To secure communication to your service, you can have the cluster generate a signed
123+
serving certificate/key pair into a secret in your namespace. To do this, set the
124+
"*service.alpha.openshift.io/serving-cert-secret-name*" to the name you want to use
125+
for your secret. Your PodSpec can then mount that secret and when it is available
126+
your pod will run. The certificate will be good for the internal service DNS name:
127+
`*<service.name>.<service.namespace>.svc*`. The certificate and key are in PEM format,
128+
stored in `*tls.crt*` and `*tls.key*` respectively.
129+
130+
Other pods can trust cluster-created certificates (which are only signed for internal
131+
DNS names), by using the CA bundle in the `*/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt*`
132+
file that is automatically mounted in their pod.
133+
119134
[[secrets-restrictions]]
120135
== Restrictions
121136

0 commit comments

Comments
 (0)