You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`domains`| strings | required | One or more domains the provider is being served from. ||
39
40
|`experimental`| section | optional | The experimental options that are subject to change or removal. ||
@@ -56,13 +57,13 @@ The configuration file is **required** by the provider. It contains
56
57
57
58
#### Considerations for Unix platforms
58
59
59
-
[1]: One of `acme` or `listen_socket_path` must be defined.
60
+
[1]: One of `acme`, `serving_cert_file` or `listen_socket_path` must be defined.
60
61
61
62
[3]: The `allow_insecure_scheme` should only be used in a local development environment for testing purposes. It only works in conjunction with `insecure_addr` or `listen_socket_path`.
62
63
63
64
#### Considerations for Windows platforms
64
65
65
-
[1]: One of `acme` or `listen_named_pipe_name` must be defined.
66
+
[1]: One of `acme`, `serving_cert_file` or `listen_named_pipe_name` must be defined.
66
67
67
68
[3]: The `allow_insecure_scheme` should only be used in a local development environment for testing purposes. It only works in conjunction with `insecure_addr` or `listen_named_pipe_name`.
68
69
@@ -77,6 +78,8 @@ will be rejected. Likewise, when ACME is used, the `domains` list contains the
77
78
allowed domains for which certificates will be obtained. The TLS handshake
78
79
will terminate if another domain is requested.
79
80
81
+
[4]: SPIRE OIDC Discovery provider monitors and reloads the files provided in the `serving_cert_file` configuration at runtime.
0 commit comments