Skip to content

Add controls to serving-nscert and enable at all times #11969

@evankanderson

Description

@evankanderson

Describe the feature

Currently, serving-nscert is a separate optional YAML which isn't well documented on the website. It requests a wildcard cert for every namespace in the kuberntes cluster. Users might not want to install this for the following reasons:

  • It requires DNS integration
  • It creates a certificate for every namespace, including system-owned namespaces

Adding a small amountof configuration seems like it could mitigate these issues. For example, using a label selector on namespaces would allow:

kubernetes.io/metadata.name not in (kube-system, contour-external)

(This would also allow a default of no selector = apply to no namespaces, so we could add the controller to the default set we ship.)

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/featureWell-understood/specified features, ready for coding.lifecycle/staleDenotes an issue or PR has remained open with no activity and has become stale.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions