You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: site/content/docs/main/config/tls-delegation.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,8 @@ In order to support wildcard certificates, TLS certificates for a `*.somedomain.
4
4
This facility allows the owner of a TLS certificate to delegate, for the purposes of referencing the TLS certificate, permission to Contour to read the Secret object from another namespace.
5
5
Delegation works for both HTTPProxy and Ingress resources, however it needs an annotation to work with Ingress v1.
6
6
7
+
If the `--watch-namespaces` configuration flag is used, it must define all namespaces that will be referenced by the delegation.
8
+
7
9
The [`TLSCertificateDelegation`][1] resource defines a set of `delegations` in the `spec`.
8
10
Each delegation references a `secretName` from the namespace where the `TLSCertificateDelegation` is created as well as describing a set of `targetNamespaces` in which the certificate can be referenced.
9
11
If all namespaces should be able to reference the secret, then set `"*"` as the value of `targetNamespaces` (see example below).
@@ -24,7 +26,7 @@ spec:
24
26
- "*"
25
27
```
26
28
27
-
In this example, the permission for Contour to reference the Secret `example-com-wildcard` in the `admin` namespace has been delegated to HTTPProxy and Ingress objects in the `example-com` namespace.
29
+
In this example, the permission for Contour to reference the Secret `example-com-wildcard` in the `www-admin` namespace has been delegated to HTTPProxy and Ingress objects in the `example-com` namespace.
28
30
Also, the permission for Contour to reference the Secret `another-com-wildcard` from all namespaces has been delegated to all HTTPProxy and Ingress objects in the cluster.
29
31
30
32
To reference the secret from an HTTPProxy or Ingress v1beta1 you must use the slash syntax in the `secretName`:
Copy file name to clipboardExpand all lines: site/content/docs/main/config/virtual-hosts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -132,7 +132,7 @@ Proper RBAC rules should also be created to restrict what namespaces Contour has
132
132
An example of this is included in the [examples directory][1] and shows how you might create a namespace called `root-httproxy`.
133
133
134
134
_**Note:** The restricted root namespace feature is only supported for HTTPProxy CRDs.
135
-
`--root-namespaces`does not affect the operation of Ingress objects._
135
+
`--root-namespaces`does not affect the operation of Ingress objects. In order to limit other resources, see the `--watch-namespaces` configuration flag._
Copy file name to clipboardExpand all lines: site/content/docs/main/deploy-options.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -219,6 +219,9 @@ Also see the [upgrade guides][15] on steps to roll out a new version of Contour.
219
219
220
220
It's possible to run multiple instances of Contour within a single Kubernetes cluster.
221
221
This can be useful for separating external vs. internal ingress, for having separate ingress controllers for different ingress classes, and more.
222
+
Each Contour instance can also be configured via the `--watch-namespaces` flag to handle their own namespaces. This allows the Kubernetes RBAC objects
223
+
to be restricted further.
224
+
222
225
The recommended way to deploy multiple Contour instances is to put each instance in its own namespace.
223
226
This avoids most naming conflicts that would otherwise occur, and provides better logical separation between the instances.
224
227
However, it is also possible to deploy multiple instances in a single namespace if needed; this approach requires more modifications to the example manifests to function properly.
0 commit comments