Skip to content
This repository has been archived by the owner on Oct 11, 2024. It is now read-only.

ClusterRole blanket access to secrets #275

Answered by asoorm
illinar asked this question in General
Discussion options

You must be logged in to vote

Hi @illinar Thanks. We need these secrets so that we can perform TLS termination at the Gateway (ingress). Soon, we will also introduce automatic mTLS in the Operator too.

We are watching secrets of kubernetes.io/tls type and loading them into Tyk's certificate storage (if) they are referenced by a Tyk custom resource - ApiDefinition.

We attach a finalizer to them so that if / when the Secret is deleted, we can remove that cert from Tyk's certificate store when the certificate is deleted.

I need to investigate properly, but maybe we only need list, watch, get, update.
We could possibly remove create, patch, delete permissions.

#276

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by asoorm
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
2 participants