-
Notifications
You must be signed in to change notification settings - Fork 243
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
URL support for https #2191
Comments
/kind feature |
to create a secured route other then these two parameters. We need to have 3 more values present in the route struct
The |
We can provide these certificates and key as flags e.g. |
Just in case there is concern over complexity here, I think it is worth mentioning that if the cluster is already installed to correctly manage SSL on your behalf (as ours is... assuming we stay within the scope of the SSL domains) then we don't provide any of the certificate information from the client side. Cluster admins have already done it all. So my feedback was truly about the extremely simple use case where three lines fixes everything. I acknowledge a complete and all encompassing solution would be more complicated. |
completely understandable but we need to consider all possible scenarios including the ones where the cluster doesn't have already installed SSL and even allowing the |
@kadel @girishramnani We can have flags for passing the values of insecureEdgeTerminationPolicy, termination so that they can set to something else according to the user's requirement |
we need to consider kuberenetes here as well. |
@kadel @girishramnani We can start small and just have |
+1 on this. Was just about to open issue on this and found it. In addition would like this available in the devfile.yaml |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
Interested in this. Not sure if I have authority to do this but am going to try :) /remove-lifecycle rotten |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
Rotten issues close after 30d of inactivity. Reopen the issue by commenting /close |
@openshift-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I would love to see this added as well. Creating routes with tls options is a standard workflow in my team but currently to configure passthrough we have to go and modify the route after that fact. Reverting to /reopen |
@kevprice83: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Two concerns w.r.t taking this further:
|
Why wouldn't this be doable for Kubernetes?
What would be the extra information that needs to be defined in Devfile? |
Any update on this? This would be a great feature to allow developers develop securely using a cluster. |
This is already possible in odo with devfile.yaml. components:
- name: myroute
kubernetes:
inlined: |
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: myroute
spec:
port:
targetPort: 8080
tls:
insecureEdgeTerminationPolicy: Redirect
termination: edge
to:
kind: Service
name: frontend I'm not sure if it makes sense for odo to expose all possible Route/Ingress configuration options on the CLI. |
odo v3 uses port-forwarding for exposing the applications, https in this case doesn't make much sense (traffic between odo and cluster is already https). If users need custom Route or Ingress with https they have an option to define it inside the devfile as /close |
@kadel: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[kind/Feature]
Which functionality do you think we should add?
I would like to be able to generate https URLs using the URL command:
odo url create local-greg --port 8443 --tls=edge
Perhaps a new parameter like
--tls=edge
would result in adding this to the OCP route:This is the simple use case we are looking for, but no doubt there are others:
--tls=none
(default)--tls=passthrough
--tls=reencrypt
I have no personal experience with the last two... perhaps that are too complicated to support, but
edge
at least seems trivial.Why is this needed?
Our microservice security layer and keycloak can be sensitive to users not using https for traffic/logins. At the moment I am forced to manually modify the TLS config for the route inside the OCP console after performing
odo push
.The text was updated successfully, but these errors were encountered: