66
66
fruit : apple
67
67
key : " ca.crt"
68
68
69
+ # And another Secret source, but this time instead of specifying a key from the Secret data,
70
+ # including all certificates from every key
71
+ - secret :
72
+ name : " my-regional-cas"
73
+ includeAllKeys : true
74
+
69
75
# A ConfigMap in the "trust" namespace; see "Trust Namespace" below for further details
70
76
- configMap :
71
77
name : " my-org.net"
77
83
matchLabels :
78
84
fruit : apple
79
85
key : " ca.crt"
86
+
87
+ # And another ConfigMap source, but this time instead of specifying a key from the ConfigMap data,
88
+ # including all certificates from every key
89
+ - secret :
90
+ name : " my-org-cas"
91
+ includeAllKeys : true
80
92
81
93
# A manually specified string
82
94
- inLine : |
@@ -103,26 +115,35 @@ spec:
103
115
linkerd.io/inject : " enabled"
104
116
` ` `
105
117
118
+ All sources and target options are documented in the trust-manager [API reference documentation](./api-reference.md).
119
+
120
+ #### Sources
121
+
106
122
` Bundle` resources currently support several source types:
107
123
108
124
- ` configMap` - a `ConfigMap` resource in the trust-manager namespace
109
125
- ` secret` - a `Secret` resource in the trust-manager namespace
110
126
- ` inLine` - a manually specified string containing at least one certificate
111
127
- ` useDefaultCAs` - usually, a bundle of publicly trusted certificates
112
128
113
- ` ConfigMap` is the default target type, but as of v0.7.0 trust-manager also supports `Secret` resources as targets.
114
-
115
- Support for `Secret` targets must be explicitly enabled in the trust-manager controller; see details below under "Enable Secret targets".
129
+ Both `ConfigMap` and `Secret`, support specifying a data key (`key`) that contains at least one certificate or use the
130
+ ` includeAllKeys` option to include all certificates from every key in the resource. The latter is useful in dynamic
131
+ environments where key names are only known at runtime. When defining a `ConfigMap` or `Secret` source, the `key` and
132
+ `includeAllKeys` fields are mutually exclusive : only one **must** be set, but not both.
116
133
117
134
Both `ConfigMap` and `Secret` also support specifying label selectors to select multiple resources at once, which is useful in dynamic
118
135
environments where the name of the `ConfigMap` or `Secret` is known only at runtime. When adding a source, either of type `ConfigMap` or `Secret`,
119
136
the fields `name` and `selector` are mutually exclusive : one **must** be set, but not both.
120
137
121
-
122
- All sources and target options are documented in the trust-manager [API reference documentation](./api-reference.md) .
138
+ These features can be combined to, for instance, select all Secrets with a specific label and include every
139
+ certificate from each key within those Secrets .
123
140
124
141
# ### Targets
125
142
143
+ ` ConfigMap` is the default target type, but as of v0.7.0 trust-manager also supports `Secret` resources as targets.
144
+
145
+ Support for `Secret` targets must be explicitly enabled in the trust-manager controller; see details below under "Enable Secret targets".
146
+
126
147
All `Bundle` targets are written to `ConfigMap`s (and/or `Secret`s) whose name matches that of the
127
148
` Bundle` , and every target has a PEM-formatted bundle included.
128
149
0 commit comments