You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
The CRDS show that you should be able to pass configuration like this (this is from terraform, that's where the variables are coming from):
Describe the bug
The CRDS show that you should be able to pass configuration like this (this is from terraform, that's where the variables are coming from):
but if you create a VirtualGateway with that configuration you will recieve an error:
BadRequestException: One type of TLS Validation Context Trust must be set.
This appears to be because although ACM is defined in the Go type the conversion code doesn't actually consider ACM.
Steps to reproduce
Using a k8s VirtualGateway object in EKS, attempt to use ACM (specifically an ACM Private certificate authority ARN) for listener tls validation.
Expected outcome
Client requests are verified against the given ACM Private CA.
Environment
v1.4.3
840364872350.dkr.ecr.us-west-2.amazonaws.com/aws-appmesh-envoy:v1.20.0.1-prod
No
v1.21.5-eks-bc4871b
Yes, see above.
Additional Context:
If you can't fix the implementation, at least fix the custom resource definitions to dis-allow this.
This can be worked around by storing the certificate in a secret and using it by file, again this is using terraform:
Then in your deployment
and modify the VirtualGateway spec above
The text was updated successfully, but these errors were encountered: