Community Note
- Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
- Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
- If you are interested in working on this issue or have submitted a pull request, please leave a comment
Tell us about the feature
Allow users to provide additional CA certificates that PGBouncer will trust for client TLS verification, while keeping the operator's automatic certificate management intact. Today users face an all-or-nothing choice — this feature removes that constraint.
Which product(s) is this request for?
Operators, PostgreSQL
Tell us about the problem
PGBouncer client TLS is configured with a single client_tls_ca_file. The operator today generates this file automatically (internal PKI or cert-manager), but the only way to trust external clients using a custom CA is to set customTLSSecret, which switches the operator into fully manual TLS mode, requiring the user to manage the entire PKI lifecycle (certificate rotation, key management, etc.).
Acceptance Criteria
References
Issue #1457
PGBouncer TLS config docs (client_tls_ca_file)
PEM certificate bundle concatenation
internal/pgbouncer/certificates.go — current TLS constants and paths
internal/pgbouncer/reconcile.go — Secret() and Pod() functions to modify
Community Note
Tell us about the feature
Allow users to provide additional CA certificates that PGBouncer will trust for client TLS verification, while keeping the operator's automatic certificate management intact. Today users face an all-or-nothing choice — this feature removes that constraint.
Which product(s) is this request for?
Operators, PostgreSQL
Tell us about the problem
PGBouncer client TLS is configured with a single client_tls_ca_file. The operator today generates this file automatically (internal PKI or cert-manager), but the only way to trust external clients using a custom CA is to set customTLSSecret, which switches the operator into fully manual TLS mode, requiring the user to manage the entire PKI lifecycle (certificate rotation, key management, etc.).
Acceptance Criteria
References
Issue #1457
PGBouncer TLS config docs (client_tls_ca_file)
PEM certificate bundle concatenation
internal/pgbouncer/certificates.go — current TLS constants and paths
internal/pgbouncer/reconcile.go — Secret() and Pod() functions to modify