-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add tls #52
base: main
Are you sure you want to change the base?
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: R-Lawton The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
00043d1
to
3560d6b
Compare
Signed-off-by: R-Lawton <[email protected]>
Signed-off-by: R-Lawton <[email protected]>
}, | ||
issuerRef: { | ||
name: selectedCertIssuer, | ||
kind: 'ClusterIssuer', |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think these can also use NS scoped Issuer
's too?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
do you mean you can specify a NS for the issuer?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No i mean cert-manager can use either a ClusterIssuer
(cluster-scoped) or an Issuer
(ns-scoped)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
oh i did not know there was two types makes sense ill change that
|
||
<Title headingLevel="h1">{('Create TLS Policy')}</Title> | ||
<p className='help-block co-m-pane__heading-help-text'> | ||
<div> Targets Gateway API networking resources Gateways to provide tls for gateway listeners by managing the lifecycle of tls certificates using CertManager</div> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
probably want to i18n this in the very excellently named locales/en/plugin__console-plugin-template.json
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yup forgot about i18n ill update all the relevant places
<FormHelperText> | ||
<HelperText> | ||
<HelperTextItem> | ||
Reference to a Kubernetes resource that the policy attaches to. To create an additional gateway got to |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i18n
<FormHelperText> | ||
<HelperText> | ||
<HelperTextItem> | ||
Reference to the issuer for the created certificate. To create an additional Issuer got to |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i18n
import { History } from 'history'; | ||
|
||
export function handleCancel (namespace: string, policyType:string ,data , history: History) { | ||
history.push(`/k8s/all-namespaces/kuadrant.io~v1alpha1~TLSPolicy`) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
history.push(`/k8s/all-namespaces/kuadrant.io~v1alpha1~TLSPolicy`) | |
history.push(`/k8s/all-namespaces/kuadrant.io~v1alpha1~TLSPolicy`) |
maybe something like
history.push(`/k8s/all-namespaces/kuadrant.io~v1alpha1~TLSPolicy`) | |
history.push(`/k8s/all-namespaces/kuadrant.io~v1alpha1~${policyType}`) |
guess we'd need an apiVersion too
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes good point, i could got to the policies view we create instead so we don't need to worry about API version
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Form view of the create:
Yaml view of the create (schema no showing trying to figure out why)
Follow up: