-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Auto discovery default certificate and certificate list #4490
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: abeowlu The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Welcome @abeowlu! |
|
Hi @abeowlu. Thanks for your PR. I'm waiting for a github.com member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Issue
#4090
Description
AWS ELB API ignores the default certificate when certificate list is provided in TLS negotiation.
The auto discovered default certificate is needed for TLS negotiation. Adding the default certificate discovered to the extre certificate list
brief logic change:
certificate-arnimplements similar functionality, and that logic shortcircuits auto-discovery executionChecklist
README.md, or thedocsdirectory)BONUS POINTS checklist: complete for good vibes and maybe prizes?! 🤯