Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add flag to override GRPC Authority Header #5449

Closed
aliaqel-stripe opened this issue Jan 31, 2024 · 0 comments · Fixed by #5450
Closed

Add flag to override GRPC Authority Header #5449

aliaqel-stripe opened this issue Jan 31, 2024 · 0 comments · Fixed by #5450
Assignees
Labels
feature All issues for new features that have been committed to

Comments

@aliaqel-stripe
Copy link
Contributor

Proposal

We would like to be able to pass a command-line flag to the KEDA Adapter to override the GRPC Authority Header in the requests it makes to the KEDA Operator.

Use-Case

The address we use for our envoy proxy is not in the SAN provided by TLS Certificate of the pod that comes from our CA. If we can override the Authority Header with host name we know will be in the SAN of the certificate returned from the Envoy Proxy, we won't need to disable TLS.

Is this a feature you are interested in implementing yourself?

Yes

Anything else?

No response

@aliaqel-stripe aliaqel-stripe added feature-request All issues for new features that have not been committed to needs-discussion labels Jan 31, 2024
@JorTurFer JorTurFer added feature All issues for new features that have been committed to and removed needs-discussion feature-request All issues for new features that have not been committed to labels Jan 31, 2024
@github-project-automation github-project-automation bot moved this from To Triage to Ready To Ship in Roadmap - KEDA Core Feb 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature All issues for new features that have been committed to
Projects
Archived in project
Development

Successfully merging a pull request may close this issue.

2 participants