enable provider webhooks #195
                
     Merged
            
            
          
  Add this suggestion to a batch that can be applied as a single commit.
  This suggestion is invalid because no changes were made to the code.
  Suggestions cannot be applied while the pull request is closed.
  Suggestions cannot be applied while viewing a subset of changes.
  Only one suggestion per line can be applied in a batch.
  Add this suggestion to a batch that can be applied as a single commit.
  Applying suggestions on deleted lines is not supported.
  You must change the existing code in this line in order to create a valid suggestion.
  Outdated suggestions cannot be applied.
  This suggestion has been applied or marked resolved.
  Suggestions cannot be applied from pending reviews.
  Suggestions cannot be applied on multi-line comments.
  Suggestions cannot be applied while the pull request is queued to merge.
  Suggestion cannot be applied right now. Please check back later.
  
    
  
    
What this PR does / why we need it:
For webhooks, the main pod of a
PlatformServicelikely needs to mount a secret containing TLS certificates, while the init job is likely to create/update this secret and therefore cannot mount it (at least not on the initial run). Configuring this scenario is not possible with theextraVolumesandextraVolumeMountsfield inside the PlatformService'sspec, because the configuration from there is applied to both pods.This PR adds aDuring deployment of the provider, the deployment controller now checks if a webhook TLS secret exists for the provider. The name of the secret is derived from a method that has been added to thewebhookfield to all provider resources'spec, containing anenabledfield. If true, a certificate secret will automatically be mounted in the regular pod belonging to the provider.lib/ utilspackage.Which issue(s) this PR fixes:
Required for openmcp-project/project-workspace-operator#132
Special notes for your reviewer:
Release note: