Automator: update istio.io@ reference docs (#7553)

This commit is contained in:
Istio Automation 2020-06-15 06:42:19 -07:00 committed by GitHub
parent 772d0093ac
commit 06d7e54e7d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 26 additions and 1 deletions

View File

@ -1013,6 +1013,27 @@ certificates to use in verifying a presented server certificate. If
omitted, the proxy will not verify the server’s certificate.
Should be empty if mode is <code>ISTIO_MUTUAL</code>.</p>
</td>
<td>
No
</td>
</tr>
<tr id="ClientTLSSettings-credential_name">
<td><code>credentialName</code></td>
<td><code>string</code></td>
<td>
<p>The name of the secret that holds the TLS certs for the
client including the CA certificates. Applicable
only on Kubernetes. Secret must exist in the same
namespace with the proxy using the certificates.
The secret (of type <code>generic</code>)should contain the
following keys and values: <code>key: &lt;privateKey&gt;</code>,
<code>cert: &lt;serverCert&gt;</code>, <code>cacert: &lt;CACertificate&gt;</code>.
Secret of type tls for client certificates along with
ca.crt key for CA certificates is also supported.
Only one of client certificates and CA certificate
or credentialName can be specified.</p>
</td>
<td>
No

View File

@ -745,7 +745,11 @@ No
holds the TLS certs including the CA certificates. Applicable
only on Kubernetes. The secret (of type<code>generic</code>) should
contain the following keys and values: <code>key:
&lt;privateKey&gt;</code>, <code>cert: &lt;serverCert&gt;</code>, <code>cacert: &lt;CACertificate&gt;</code>.</p>
&lt;privateKey&gt;</code>, <code>cert: &lt;serverCert&gt;</code>, <code>cacert: &lt;CACertificate&gt;</code>.
Secret of type tls for server certificates along with
ca.crt key for CA certificates is also supported.
Only one of server certificates and CA certificate
or credentialName can be specified.</p>
</td>
<td>