Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for ingress tls entry #94

Closed
wants to merge 2 commits into from
Closed

Add support for ingress tls entry #94

wants to merge 2 commits into from

Conversation

hardillb
Copy link
Contributor

part of #83

Basic TLS ingress entry

Description

Related Issue(s)

#83

Checklist

  • I have read the contribution guidelines
  • Suitable unit/system level tests have been added and they pass
  • Documentation has been updated
    • Upgrade instructions
    • Configuration details
    • Concepts
  • Changes flowforge.yml?
    • Issue/PR raised on flowforge/helm to update ConfigMap Template
    • Issue/PR raised on flowforge/CloudProject to update values for Staging/Production

Labels

  • Backport needed? -> add the backport label
  • Includes a DB migration? -> add the area:migration label

part of #83

Basic TLS ingress entry
@hardillb hardillb self-assigned this Jul 12, 2023
@dfulgham
Copy link
Contributor

Should have the tls section refer to a specific secret for the ca certificates.

I don't know if nginx-ingress can reference/use a configMap (ff-ca-certs), looks like it only supports secrets. ?

hosts: [
url.host
]
}]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

secretName: "ff-apps-ca-secret"

Or something, to hold the wildcard ca certificate to be used for applications, would need to be documented.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ff-apps-ca-secrets is not a Secret, it's a collection of CA certs that the instance should trust, so not useful here.

I'm still working out how to solve this nicely, there are 2 possible approaches

  1. A single shared wildcard cert/key in a single secret
  2. A secret per instance, and something like CertManager issuing new ACME provisioned certs for each.

Both have pros/cons for different environments.

Still not sure how we will populate this, or if it should point
to a shared wildcard cert
@hardillb
Copy link
Contributor Author

superseded by #131

@hardillb hardillb closed this Jan 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants