Andrej van der Zee
Andrej van der Zee
[Project board link](https://github.com/orgs/k8ssandra/projects/8/views/1?pane=issue&itemId=13937803) We are moving from opscenter to Reaper. How can we serve reaper with TLS, without setting up a proxy? I am missing SSL config options: ``` server:...
On Android 4.0.4, ZTE Blade III, external storage is not writable. The following method returns false: static public boolean isExternalStorageWritable() { String state = Environment.getExternalStorageState(); if (Environment.MEDIA_MOUNTED.equals(state)) { return true;...
### Pull Request Motivation We have integrated Cert Manager with GlobalSign ACME. Their backend requires `certificate.spec.encodeUsagesInRequest` explicitly to be `false` and `certificate.spec.usages` to be empty/unset. For example, this generates a...
The Vault (cluster)issuer does not allow to read a token from local filesystem, while it does not take care about renewing Vault tokens itself: https://github.com/cert-manager/cert-manager/issues/5437 This means that we have...
The documentation https://cert-manager.io/v0.16-docs/configuration/vault/ sais: ``` cert-manager does not refresh these token automatically and so another process must be put in place to do this. ``` Can I suggest an option...
The configuration of the ClusterIssuer with Vault should have an option for using the mounted token. Currently a secret is configured and read by cert-manager. This is awkward and requires...
### Preflight Checklist - [X] I agree to follow the [Code of Conduct](https://github.com/dexidp/dex/blob/master/.github/CODE_OF_CONDUCT.md) that this project adheres to. - [X] I have searched the [issue tracker](https://www.github.com/dexidp/dex/issues) for an issue that...
This PR fixes using the chart with kustomization terraform provider: ```╷ │ Error: github.com/kbst/terraform-provider-kustomize/kustomize.kustomizationResourceDiff: "policy/PodSecurityPolicy/perfana/mimir-distributed": is not namespace scoped but has metadata.namespace set ``` PodSecurityPolicies are not namespaced so the...
This MR: - Removes namespace from non-namespaced `ClusterRoleBinding` object - Adds namespace to namespaced `Role` object
The provider can only data source one particular user, but _not_ all users from a particular realm or group. For example by a new data source `keycloak_users`: ``` data "keycloak_realm"...