-
Notifications
You must be signed in to change notification settings - Fork 2.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kubernetes Extension Should be Aware of Standard TLS Properties #29999
Comments
The problem I see is determining at build time that we should provide the SSL port over the HTTP port.
|
IMO this makes sense. Only thing is that I might not generate the SSL port automatically, so only if the new Kubernetes property is present. |
Yeah, I think we can do this |
So, this issue should be addressed as:
If nobody works on this, I will when I'm back after my PTO in the second week of January. |
Perfect! Assigned the issue to you. |
FYI: I will start working in this tomorrow |
These changes will add an additional container port HTTPS in the generated manifests: ```yaml containers: - image: ... imagePullPolicy: IfNotPresent name: kubernetes-kind ports: - containerPort: 8080 name: http protocol: TCP - containerPort: 8443 name: https protocol: TCP ``` By default, the Ingress and Route resources will use the "http" port. However, as part of these changes, I've added a new property to select between "https" or "http", or any other that user might have added as part of the configuration. Example: ``` quarkus.kubernetes.ingress.target-port=https quarkus.openshift.route.target-port=https ``` Finally, note that the https container won't be added for the Knative resources because of the following Dekorate issue: dekorateio/dekorate#1119. Also, that the nodeport for Kind and Minikube resources will only be added for the http ports due to this Dekorate limitation: dekorateio/dekorate#1120. Both issues should be addressed in Dekorate and then fixed in a later pull requested. Fix quarkusio#29999
These changes will add an additional container port HTTPS in the generated manifests: ```yaml containers: - image: ... imagePullPolicy: IfNotPresent name: kubernetes-kind ports: - containerPort: 8080 name: http protocol: TCP - containerPort: 8443 name: https protocol: TCP ``` By default, the Ingress and Route resources will use the "http" port. However, as part of these changes, I've added a new property to select between "https" or "http", or any other that user might have added as part of the configuration. Example: ``` quarkus.kubernetes.ingress.target-port=https quarkus.openshift.route.target-port=https ``` Finally, note that the https container won't be added for the Knative resources because of the following Dekorate issue: dekorateio/dekorate#1119. Also, that the nodeport for Kind and Minikube resources will only be added for the http ports due to this Dekorate limitation: dekorateio/dekorate#1120. Both issues should be addressed in Dekorate and then fixed in a later pull requested. Fix quarkusio#29999
These changes will add an additional container port HTTPS in the generated manifests: ```yaml containers: - image: ... imagePullPolicy: IfNotPresent name: kubernetes-kind ports: - containerPort: 8080 name: http protocol: TCP - containerPort: 8443 name: https protocol: TCP ``` By default, the Ingress and Route resources will use the "http" port. However, as part of these changes, I've added a new property to select between "https" or "http", or any other that user might have added as part of the configuration. Example: ``` quarkus.kubernetes.ingress.target-port=https quarkus.openshift.route.target-port=https ``` Finally, note that the https container won't be added for the Knative resources because of the following Dekorate issue: dekorateio/dekorate#1119. Also, that the nodeport for Kind and Minikube resources will only be added for the http ports due to this Dekorate limitation: dekorateio/dekorate#1120. Both issues should be addressed in Dekorate and then fixed in a later pull requested. Fix quarkusio#29999
These changes will add an additional container port HTTPS in the generated manifests: ```yaml containers: - image: ... imagePullPolicy: IfNotPresent name: kubernetes-kind ports: - containerPort: 8080 name: http protocol: TCP - containerPort: 8443 name: https protocol: TCP ``` By default, the Ingress and Route resources will use the "http" port. However, as part of these changes, I've added a new property to select between "https" or "http", or any other that user might have added as part of the configuration. Example: ``` quarkus.kubernetes.ingress.target-port=https quarkus.openshift.route.target-port=https ``` Finally, note that the https container won't be added for the Knative resources since there seems to be a limitation at Knative side. Fix quarkusio#29999 asd
These changes will add an additional container port HTTPS in the generated manifests: ```yaml containers: - image: ... imagePullPolicy: IfNotPresent name: kubernetes-kind ports: - containerPort: 8080 name: http protocol: TCP - containerPort: 8443 name: https protocol: TCP ``` By default, the Ingress and Route resources will use the "http" port. However, as part of these changes, I've added a new property to select between "https" or "http", or any other that user might have added as part of the configuration. Example: ``` quarkus.kubernetes.ingress.target-port=https quarkus.openshift.route.target-port=https ``` Finally, note that the https container won't be added for the Knative resources since there seems to be a limitation at Knative side. Fix quarkusio#29999 asd
These changes will add an additional container port HTTPS in the generated manifests: ```yaml containers: - image: ... imagePullPolicy: IfNotPresent name: kubernetes-kind ports: - containerPort: 8080 name: http protocol: TCP - containerPort: 8443 name: https protocol: TCP ``` By default, the Ingress and Route resources will use the "http" port. However, as part of these changes, I've added a new property to select between "https" or "http", or any other that user might have added as part of the configuration. Example: ``` quarkus.kubernetes.ingress.target-port=https quarkus.openshift.route.target-port=https ``` Finally, note that the https container won't be added for the Knative resources since there seems to be a limitation at Knative side. Fix quarkusio#29999 asd
Description
When generating Kubernetes resources using the Kubernetes extension
I would expect that when set an the tls port, for example:
quarkus.http.ssl-port=443
This will be reflected in the generated
Deployment
resource, thus an additional port will be added to the container definition:In addition to that, if I turn off insecure requests, using:
quarkus.http.insecure-requests=disabled
The http port will not be generated anymore:
Implementation ideas
No response
The text was updated successfully, but these errors were encountered: