@@ -823,8 +823,8 @@ func (cnf *Configurator) addOrUpdateCASecret(secret *api_v1.Secret) string {
823
823
crtData , crlData := GenerateCAFileContent (secret )
824
824
crtSecretName := fmt .Sprintf ("%s-%s" , name , CACrtKey )
825
825
crlSecretName := fmt .Sprintf ("%s-%s" , name , CACrlKey )
826
- crtFileName := cnf .nginxManager .CreateSecret (crtSecretName , crtData , nginx .TLSSecretFileMode )
827
- crlFileName := cnf .nginxManager .CreateSecret (crlSecretName , crlData , nginx .TLSSecretFileMode )
826
+ crtFileName := cnf .nginxManager .CreateSecret (crtSecretName , crtData , nginx .ReadWriteOnlyFileMode )
827
+ crlFileName := cnf .nginxManager .CreateSecret (crlSecretName , crlData , nginx .ReadWriteOnlyFileMode )
828
828
return fmt .Sprintf ("%s %s" , crtFileName , crlFileName )
829
829
}
830
830
@@ -919,7 +919,7 @@ func (cnf *Configurator) AddOrUpdateResources(resources ExtendedResources, reloa
919
919
func (cnf * Configurator ) addOrUpdateTLSSecret (secret * api_v1.Secret ) string {
920
920
name := objectMetaToFileName (& secret .ObjectMeta )
921
921
data := GenerateCertAndKeyFileContent (secret )
922
- return cnf .nginxManager .CreateSecret (name , data , nginx .TLSSecretFileMode )
922
+ return cnf .nginxManager .CreateSecret (name , data , nginx .ReadWriteOnlyFileMode )
923
923
}
924
924
925
925
// AddOrUpdateSpecialTLSSecrets adds or updates a file with a TLS cert and a key from a Special TLS Secret (eg. DefaultServerSecret, WildcardTLSSecret).
@@ -929,7 +929,7 @@ func (cnf *Configurator) AddOrUpdateSpecialTLSSecrets(secret *api_v1.Secret, sec
929
929
data := GenerateCertAndKeyFileContent (secret )
930
930
931
931
for _ , secretName := range secretNames {
932
- cnf .nginxManager .CreateSecret (secretName , data , nginx .TLSSecretFileMode )
932
+ cnf .nginxManager .CreateSecret (secretName , data , nginx .ReadWriteOnlyFileMode )
933
933
}
934
934
935
935
if ! cnf .DynamicSSLReloadEnabled () {
0 commit comments