-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Inject CA trust bundle into managed containers and set SSL_CERT_DIR #491
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: osmman The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
1a2354b
to
0738637
Compare
Can you create |
I mean can modify the CI to use keycloak (self signed) route instead of the insecure service https://github.com/securesign/secure-sign-operator/blob/main/.github/workflows/main.yml#L187 This should verify I am not sure how to test the annotation injection. But with that ^^ we will know that the volume is correctly mounted and the |
Yes, that will be good to modify Keycloack deployment on Kind cluster. I think Openshift CI uses self signed certificates if I remember correctly. |
/lgtm |
/retest |
0738637
to
12d158a
Compare
/lgtm |
/test tas-operator-e2e |
related to https://issues.redhat.com/browse/SECURESIGN-703 and https://issues.redhat.com/browse/SECURESIGN-1037