@@ -22,6 +22,7 @@ import (
2222 metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
2323 "k8s.io/apimachinery/pkg/util/intstr"
2424 commonv1a1 "knative.dev/eventing/pkg/apis/common/integration/v1alpha1"
25+ "knative.dev/eventing/pkg/apis/feature"
2526 "knative.dev/eventing/pkg/apis/sinks/v1alpha1"
2627 "knative.dev/eventing/pkg/reconciler/integration"
2728 "knative.dev/pkg/kmeta"
@@ -34,7 +35,7 @@ var sinkImageMap = map[string]string{
3435 "aws-sns" : "gcr.io/knative-nightly/aws-sns-sink:latest" ,
3536}
3637
37- func MakeDeploymentSpec (sink * v1alpha1.IntegrationSink ) * appsv1.Deployment {
38+ func MakeDeploymentSpec (sink * v1alpha1.IntegrationSink , featureFlags feature. Flags ) * appsv1.Deployment {
3839 t := true
3940
4041 deploy := & appsv1.Deployment {
@@ -86,7 +87,7 @@ func MakeDeploymentSpec(sink *v1alpha1.IntegrationSink) *appsv1.Deployment {
8687 Protocol : corev1 .ProtocolTCP ,
8788 Name : "https" ,
8889 }},
89- Env : makeEnv (sink ),
90+ Env : makeEnv (sink , featureFlags ),
9091 VolumeMounts : []corev1.VolumeMount {
9192 {
9293 Name : CertificateName (sink ),
@@ -138,26 +139,32 @@ func MakeService(sink *v1alpha1.IntegrationSink) *corev1.Service {
138139 }
139140}
140141
141- func DeploymentName (sink * v1alpha1.IntegrationSink ) string {
142- return kmeta .ChildName (sink .Name , "-deployment" )
143- }
144-
145- func makeEnv (sink * v1alpha1.IntegrationSink ) []corev1.EnvVar {
142+ func makeEnv (sink * v1alpha1.IntegrationSink , featureFlags feature.Flags ) []corev1.EnvVar {
146143 var envVars []corev1.EnvVar
147144
148- //QUARKUS_HTTP_SSL_CERTIFICATE_FILES=/mount/certs/server.crt
149- //QUARKUS_HTTP_SSL_CERTIFICATE_KEY-FILES=/mount/certs/server.key
145+ // Transport encryption environment variables
146+ if ! featureFlags .IsDisabledTransportEncryption () {
147+ envVars = append (envVars , []corev1.EnvVar {
148+ {
149+ Name : "QUARKUS_HTTP_SSL_CERTIFICATE_FILES" ,
150+ Value : "/etc/" + CertificateName (sink ) + "/tls.crt" ,
151+ },
152+ {
153+ Name : "QUARKUS_HTTP_SSL_CERTIFICATE_KEY-FILES" ,
154+ Value : "/etc/" + CertificateName (sink ) + "/tls.key" ,
155+ },
156+ }... )
157+ }
150158
151- envVars = append (envVars , []corev1.EnvVar {
152- {
153- Name : "QUARKUS_HTTP_SSL_CERTIFICATE_FILES" ,
154- Value : "/etc/" + CertificateName (sink ) + "/tls.crt" ,
155- },
156- {
157- Name : "QUARKUS_HTTP_SSL_CERTIFICATE_KEY-FILES" ,
158- Value : "/etc/" + CertificateName (sink ) + "/tls.key" ,
159- },
160- }... )
159+ // No HTTP with strict TLS
160+ if featureFlags .IsStrictTransportEncryption () {
161+ envVars = append (envVars , []corev1.EnvVar {
162+ {
163+ Name : "QUARKUS_HTTP_INSECURE_REQUESTS" ,
164+ Value : "disabled" ,
165+ },
166+ }... )
167+ }
161168
162169 // Log environment variables
163170 if sink .Spec .Log != nil {
0 commit comments