Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Simplify handling of ssl certificates #956

Merged
merged 1 commit into from
Jul 13, 2017
Merged

Conversation

aledbf
Copy link
Member

@aledbf aledbf commented Jul 12, 2017

No description provided.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Jul 12, 2017
@k8s-reviewable
Copy link

This change is Reviewable

@coveralls
Copy link

Coverage Status

Coverage decreased (-0.007%) to 44.334% when pulling 2c35ce251c0fa8cae980b559195d888685db23e4 on aledbf:force-reload into 26fccdc on kubernetes:master.

@coveralls
Copy link

Coverage Status

Coverage decreased (-0.02%) to 44.327% when pulling 14a02d1 on aledbf:force-reload into 26fccdc on kubernetes:master.

@aledbf aledbf merged commit d416d02 into kubernetes:master Jul 13, 2017
@aledbf aledbf deleted the force-reload branch July 15, 2017 18:04
@dghubble
Copy link

I believe this causes logs for each ingress.kubernetes.io/ssl-passthrough: "true" Ingress:

host SOME_DOMAIN is listed on tls section but secretName is empty. Using default cert

Functionally seems ok.

glog.Warningf("ssl certificate for host %v is about to expire in 10 days", host)
}
if tlsSecretName == "" {
glog.Warningf("host %v is listed on tls section but secretName is empty. Using default cert", host)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@aledbf I do use wildcard domains and a wildcard certificate as the default cert. Using host without a secret is a feature on my deployment. Could this log be changed to V(3).Info?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes, there's already an open issue to increase the log leve

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants