Skip to content

Commit e686f36

Browse files
Merge pull request #96414 from snarayan-redhat/OSDOCS-34373_extsecrets_418
[enterprise-4.18] OSDOCS#34373: Making update permission optional for creating routes
2 parents 647f56c + 504ed5e commit e686f36

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

modules/cert-manager-configuring-routes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The following steps demonstrate the process of utilizing the {cert-manager-opera
1212

1313
* You have installed version 1.14.0 or later of the {cert-manager-operator}.
1414
* You have enabled the `RouteExternalCertificate` feature gate.
15-
* You have the `create` and `update` permissions on the `routes/custom-host` sub-resource.
15+
* You have `create` permission on the `routes/custom-host` sub-resource, which is used for both creating and updating routes.
1616
* You have a `Service` resource that you want to expose.
1717
1818
.Procedure

modules/nw-ingress-route-secret-load-external-cert.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This feature applies to both edge routes and re-encrypt routes.
1919
.Prerequisites
2020

2121
* You must enable the `RouteExternalCertificate` feature gate.
22-
* You must have the `create` and `update` permissions on the `routes/custom-host`.
22+
* You have `create` permission on the `routes/custom-host` sub-resource, which is used for both creating and updating routes.
2323
* You must have a secret containing a valid certificate/key pair in PEM-encoded format of type `kubernetes.io/tls`, which includes both `tls.key` and `tls.crt` keys.
2424
* You must place the referenced secret in the same namespace as the route you want to secure.
2525

0 commit comments

Comments
 (0)