Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add tls #52

Open
wants to merge 2 commits into
base: main
Choose a base branch
from
Open

Add tls #52

wants to merge 2 commits into from

Conversation

R-Lawton
Copy link
Contributor

@R-Lawton R-Lawton commented Sep 10, 2024

Copy link

openshift-ci bot commented Sep 13, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: R-Lawton

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

},
issuerRef: {
name: selectedCertIssuer,
kind: 'ClusterIssuer',
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think these can also use NS scoped Issuer's too?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

do you mean you can specify a NS for the issuer?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No i mean cert-manager can use either a ClusterIssuer (cluster-scoped) or an Issuer (ns-scoped)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

oh i did not know there was two types makes sense ill change that


<Title headingLevel="h1">{('Create TLS Policy')}</Title>
<p className='help-block co-m-pane__heading-help-text'>
<div> Targets Gateway API networking resources Gateways to provide tls for gateway listeners by managing the lifecycle of tls certificates using CertManager</div>
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

probably want to i18n this in the very excellently named locales/en/plugin__console-plugin-template.json

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yup forgot about i18n ill update all the relevant places

<FormHelperText>
<HelperText>
<HelperTextItem>
Reference to a Kubernetes resource that the policy attaches to. To create an additional gateway got to
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i18n

<FormHelperText>
<HelperText>
<HelperTextItem>
Reference to the issuer for the created certificate. To create an additional Issuer got to
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i18n

import { History } from 'history';

export function handleCancel (namespace: string, policyType:string ,data , history: History) {
history.push(`/k8s/all-namespaces/kuadrant.io~v1alpha1~TLSPolicy`)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
history.push(`/k8s/all-namespaces/kuadrant.io~v1alpha1~TLSPolicy`)
history.push(`/k8s/all-namespaces/kuadrant.io~v1alpha1~TLSPolicy`)

maybe something like

Suggested change
history.push(`/k8s/all-namespaces/kuadrant.io~v1alpha1~TLSPolicy`)
history.push(`/k8s/all-namespaces/kuadrant.io~v1alpha1~${policyType}`)

guess we'd need an apiVersion too

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes good point, i could got to the policies view we create instead so we don't need to worry about API version

@openshift-merge-robot
Copy link
Collaborator

PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: No status
Development

Successfully merging this pull request may close these issues.

3 participants