-
Notifications
You must be signed in to change notification settings - Fork 1.3k
[helm] [self-hosted] correct proxy deployment to use kubernetes.io/tls
secrets
#3199
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
kubernetes.io/tls
secretskubernetes.io/tls
secrets
Thank you for pointing out the As middle ground we could default to It would still be a breaking change for those relying on the defaults, but one for which we could provide an easy upgrade route. WDYT? |
I guess it makes the chart a bit more complicated, but you could also just add in the values |
Any alternative to TLS Secrets can lead to confusion and additional complexity integrating with tools like
Maybe an update to the secret to rename the keys? @cyrilcros I really like this change :) |
Hi, in this case the Helm chart doesn't create a separate secret (see ingress docs). You would still to make a change to the templates (fullchain.pem -> tls.crt and privkey.pem -> tls.key). gitpod/chart/templates/proxy-deployment.yaml Line 159 in 19fb170
{{- else }} ... whatever is needed for tls.crt / tls. key ... {{- end -}} .@aledbf @csweichel that way that's no longer a breaking change |
88b3bbd
to
d2d4dd8
Compare
Can you emit a warning using a NOTES.txt file to suggest the migration to the new format if the old values are used? |
3cc3134
to
472414e
Compare
@aledbf that's done BUT I also previously altered the docs to document the new method. I have now seen in another issue those are included as a submodule. Should I just remove those doc changes from my pull requests and make them to the right repo? |
Users can still use the previous form but get a deprecation warning.
472414e
to
bca5238
Compare
@aledbf I removed the docs update, I will make something on the docs repository. For me this pull request is done.. |
Very good point indeed :)
I think it's fine for now. We'd keep this change in mind and add it to the #3262 issue. |
/werft run 👍 started the job as gitpod-build-kubernetes-tls-fix.0 |
@aledbf @csweichel any chance this could be merged soon? Thanks! |
I am suggesting this as a fix to #3183
Instead of fetching from an
existingSecret
various keys, you could use the Kuberneteskubernetes.io/tls
secret type. Onlyfullchain.pem
akatls.crt
andprivkey.pem
akatls.key
seem to be in use in the templates, the current documentations asks for more: https://www.gitpod.io/docs/self-hosted/latest/install/configure-ingress/See https://github.com/gitpod-io/gitpod/blob/master/chart/config/proxy/lib.ssl.conf .
ssl_dhparam
also seems to be off?You would need to edit your current existing secret, this is a breaking change!
Please feel absolutely free to close, this is only intended as a suggestion on how to fix... The documentation for the ingress would need to be changed too.
EDIT: I now just check if
fullchain.pem
andprivkey.pem
are in the secret and assumetls.crt
andtls.key
are there if it isn't the case. That's a non breaking change.