@@ -811,10 +811,20 @@ github.com/fluxcd/pkg/apis/meta.LocalObjectReference
811811</td >
812812<td >
813813<em >(Optional)</em >
814- <p >CertSecretRef specifies the Secret containing the TLS authentication
815- data. The secret must contain a &lsquo ; certFile&rsquo ; and &lsquo ; keyFile&rsquo ; , and/or &lsquo ; caFile&rsquo ;
816- fields. It takes precedence over the values specified in the Secret
817- referred to by <code >.spec.secretRef</code >.</p >
814+ <p >CertSecretRef can be given the name of a Secret containing
815+ either or both of</p >
816+ <ul >
817+ <li >a PEM-encoded client certificate (<code >tls.crt</code >) and private
818+ key (<code >tls.key</code >);</li >
819+ <li >a PEM-encoded CA certificate (<code >ca.crt</code >)</li >
820+ </ul >
821+ <p >and whichever are supplied, will be used for connecting to the
822+ registry. The client cert and key are useful if you are
823+ authenticating with a certificate; the CA cert is useful if
824+ you are using a self-signed server certificate. The Secret must
825+ be of type <code >Opaque</code > or <code >kubernetes.io/tls</code >.</p >
826+ <p >It takes precedence over the values specified in the Secret referred
827+ to by <code >.spec.secretRef</code >.</p >
818828</td >
819829</tr >
820830<tr >
@@ -1109,17 +1119,20 @@ github.com/fluxcd/pkg/apis/meta.LocalObjectReference
11091119</td >
11101120<td >
11111121<em >(Optional)</em >
1112- <p >CertSecretRef can be given the name of a secret containing
1122+ <p >CertSecretRef can be given the name of a Secret containing
11131123either or both of</p >
11141124<ul >
1115- <li >a PEM-encoded client certificate (<code >certFile </code >) and private
1116- key (<code >keyFile </code >);</li >
1117- <li >a PEM-encoded CA certificate (<code >caFile </code >)</li >
1125+ <li >a PEM-encoded client certificate (<code >tls.crt </code >) and private
1126+ key (<code >tls.key </code >);</li >
1127+ <li >a PEM-encoded CA certificate (<code >ca.crt </code >)</li >
11181128</ul >
11191129<p >and whichever are supplied, will be used for connecting to the
11201130registry. The client cert and key are useful if you are
11211131authenticating with a certificate; the CA cert is useful if
1122- you are using a self-signed server certificate.</p >
1132+ you are using a self-signed server certificate. The Secret must
1133+ be of type <code >Opaque</code > or <code >kubernetes.io/tls</code >.</p >
1134+ <p >Note: Support for the <code >caFile</code >, <code >certFile</code > and <code >keyFile</code > keys have
1135+ been deprecated.</p >
11231136</td >
11241137</tr >
11251138<tr >
@@ -2503,10 +2516,20 @@ github.com/fluxcd/pkg/apis/meta.LocalObjectReference
25032516</td >
25042517<td >
25052518<em >(Optional)</em >
2506- <p >CertSecretRef specifies the Secret containing the TLS authentication
2507- data. The secret must contain a &lsquo ; certFile&rsquo ; and &lsquo ; keyFile&rsquo ; , and/or &lsquo ; caFile&rsquo ;
2508- fields. It takes precedence over the values specified in the Secret
2509- referred to by <code >.spec.secretRef</code >.</p >
2519+ <p >CertSecretRef can be given the name of a Secret containing
2520+ either or both of</p >
2521+ <ul >
2522+ <li >a PEM-encoded client certificate (<code >tls.crt</code >) and private
2523+ key (<code >tls.key</code >);</li >
2524+ <li >a PEM-encoded CA certificate (<code >ca.crt</code >)</li >
2525+ </ul >
2526+ <p >and whichever are supplied, will be used for connecting to the
2527+ registry. The client cert and key are useful if you are
2528+ authenticating with a certificate; the CA cert is useful if
2529+ you are using a self-signed server certificate. The Secret must
2530+ be of type <code >Opaque</code > or <code >kubernetes.io/tls</code >.</p >
2531+ <p >It takes precedence over the values specified in the Secret referred
2532+ to by <code >.spec.secretRef</code >.</p >
25102533</td >
25112534</tr >
25122535<tr >
@@ -3004,17 +3027,20 @@ github.com/fluxcd/pkg/apis/meta.LocalObjectReference
30043027</td >
30053028<td >
30063029<em >(Optional)</em >
3007- <p >CertSecretRef can be given the name of a secret containing
3030+ <p >CertSecretRef can be given the name of a Secret containing
30083031either or both of</p >
30093032<ul >
3010- <li >a PEM-encoded client certificate (<code >certFile </code >) and private
3011- key (<code >keyFile </code >);</li >
3012- <li >a PEM-encoded CA certificate (<code >caFile </code >)</li >
3033+ <li >a PEM-encoded client certificate (<code >tls.crt </code >) and private
3034+ key (<code >tls.key </code >);</li >
3035+ <li >a PEM-encoded CA certificate (<code >ca.crt </code >)</li >
30133036</ul >
30143037<p >and whichever are supplied, will be used for connecting to the
30153038registry. The client cert and key are useful if you are
30163039authenticating with a certificate; the CA cert is useful if
3017- you are using a self-signed server certificate.</p >
3040+ you are using a self-signed server certificate. The Secret must
3041+ be of type <code >Opaque</code > or <code >kubernetes.io/tls</code >.</p >
3042+ <p >Note: Support for the <code >caFile</code >, <code >certFile</code > and <code >keyFile</code > keys have
3043+ been deprecated.</p >
30183044</td >
30193045</tr >
30203046<tr >
0 commit comments