You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
backends: # Don't look at the Superset CRD structure, we are only interested in the tls stuff here
110
+
- name: my-trino
111
+
trino:
112
+
discoveryConfigName: my-trino
113
+
# override tls from the global config, OPTIONALLY
114
+
tlsSecretClass: my-second-pki
115
+
----
116
+
117
+
==== Pros
118
+
119
+
* Operator does not need to read/look at the DiscoveryConfig (as we can statically set up the secret-op tls secretClass volumes rather than retrieving them from the DiscoveryConfig).
120
+
* Some clients only support a single pki, in that case we could not give the ability to overwrite the secretClass coming from the product itself.
121
+
122
+
==== Cons
123
+
124
+
* The client has to know what pki/secretClass the server is using.
125
+
126
+
=== TLS: Include caCert in Discovery config
127
+
128
+
Trino discovery:
129
+
[source,yaml]
130
+
----
131
+
metadata:
132
+
name: my-trino
133
+
endpoint:
134
+
host: trino-coordinator.ns.svc.cluster.local
135
+
port: 8443
136
+
protocol:
137
+
http: {}
138
+
# OR
139
+
https:
140
+
caBundle: | # Containing a PEM certificate
141
+
=== BEGIN CERTIFICATE ===
142
+
XXX
143
+
=== END CERTIFICATE ===
144
+
----
58
145
59
146
==== Pros
60
147
148
+
* Assuming DiscoveryConfig is located within a CM, the operator can simply mount the discovery CM to get the ca.crt. Operator does not need to read/look at the DiscoveryConfig.
149
+
* Easier for external clients to use as they don't need to know the concept of SecretClasses and don't even need to run withing k8s.
150
+
* The client has to *not* know what pki/secretClass the server is using.
61
151
62
152
==== Cons
63
153
154
+
* BIG QUESTION: How should the product operator get the ca cert from the SecretClass it uses to get the *server* cert from?
155
+
** The secret-op could e.g. offer an HTTP api to fetch the ca.crt of a given SecretClass or e.g. write the ca.crt into the status of a SecretClass
156
+
157
+
158
+
=== Authentication: Add AuthenticationClass to Discovery Config
159
+
160
+
Trino discovery:
161
+
[source,yaml]
162
+
----
163
+
metadata:
164
+
name: my-trino
165
+
authentication:
166
+
authenticationClass: my-class
167
+
----
168
+
169
+
==== Cons
170
+
171
+
* Operator has to read the AuthenticationClass to determine its type (pw/tls/keytab) and set up the needed volumes and commands.
172
+
* The AuthenticationClass is meant to describe "how should a server verify connecting clients" and re-purpose it to mean "how a client should authenticate itself".
173
+
174
+
175
+
=== Authentication: Add SecretClass to Discovery Config
0 commit comments