mirror of https://github.com/k3s-io/k3s
IngressTLS: allow secretName to be blank for SNI routing
parent
e01feae75a
commit
4d22c2fd6a
|
@ -8291,7 +8291,7 @@
|
|||
"items": {
|
||||
"$ref": "v1beta1.IngressTLS"
|
||||
},
|
||||
"description": "TLS configuration. Currently the Ingress only supports a single TLS port, 443, and assumes TLS termination. If multiple members of this list specify different hosts, they will be multiplexed on the same port according to the hostname specified through the SNI TLS extension."
|
||||
"description": "TLS configuration. Currently the Ingress only supports a single TLS port, 443. If multiple members of this list specify different hosts, they will be multiplexed on the same port according to the hostname specified through the SNI TLS extension, if the ingress controller fulfilling the ingress supports SNI."
|
||||
},
|
||||
"rules": {
|
||||
"type": "array",
|
||||
|
|
|
@ -806,7 +806,7 @@ span.icon > [class^="icon-"], span.icon > [class*=" icon-"] { cursor: default; }
|
|||
</tr>
|
||||
<tr>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">tls</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">TLS configuration. Currently the Ingress only supports a single TLS port, 443, and assumes TLS termination. If multiple members of this list specify different hosts, they will be multiplexed on the same port according to the hostname specified through the SNI TLS extension.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">TLS configuration. Currently the Ingress only supports a single TLS port, 443. If multiple members of this list specify different hosts, they will be multiplexed on the same port according to the hostname specified through the SNI TLS extension, if the ingress controller fulfilling the ingress supports SNI.</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1beta1_ingresstls">v1beta1.IngressTLS</a> array</p></td>
|
||||
<td class="tableblock halign-left valign-top"></td>
|
||||
|
@ -5910,7 +5910,7 @@ Both these may change in the future. Incoming requests are matched against the h
|
|||
</div>
|
||||
<div id="footer">
|
||||
<div id="footer-text">
|
||||
Last updated 2016-03-25 18:19:00 UTC
|
||||
Last updated 2016-03-28 22:44:09 UTC
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
|
|
|
@ -655,10 +655,11 @@ type IngressSpec struct {
|
|||
// specify a global default.
|
||||
Backend *IngressBackend `json:"backend,omitempty"`
|
||||
|
||||
// TLS is the TLS configuration. Currently the Ingress only supports a single TLS
|
||||
// port, 443, and assumes TLS termination. If multiple members of this
|
||||
// list specify different hosts, they will be multiplexed on the same
|
||||
// port according to the hostname specified through the SNI TLS extension.
|
||||
// TLS configuration. Currently the Ingress only supports a single TLS
|
||||
// port, 443. If multiple members of this list specify different hosts, they
|
||||
// will be multiplexed on the same port according to the hostname specified
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
TLS []IngressTLS `json:"tls,omitempty"`
|
||||
|
||||
// A list of host rules used to configure the Ingress. If unspecified, or
|
||||
|
|
|
@ -667,9 +667,10 @@ type IngressSpec struct {
|
|||
Backend *IngressBackend `json:"backend,omitempty"`
|
||||
|
||||
// TLS configuration. Currently the Ingress only supports a single TLS
|
||||
// port, 443, and assumes TLS termination. If multiple members of this
|
||||
// list specify different hosts, they will be multiplexed on the same
|
||||
// port according to the hostname specified through the SNI TLS extension.
|
||||
// port, 443. If multiple members of this list specify different hosts, they
|
||||
// will be multiplexed on the same port according to the hostname specified
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
TLS []IngressTLS `json:"tls,omitempty"`
|
||||
|
||||
// A list of host rules used to configure the Ingress. If unspecified, or
|
||||
|
|
|
@ -322,7 +322,7 @@ func (IngressRuleValue) SwaggerDoc() map[string]string {
|
|||
var map_IngressSpec = map[string]string{
|
||||
"": "IngressSpec describes the Ingress the user wishes to exist.",
|
||||
"backend": "A default backend capable of servicing requests that don't match any rule. At least one of 'backend' or 'rules' must be specified. This field is optional to allow the loadbalancer controller or defaulting logic to specify a global default.",
|
||||
"tls": "TLS configuration. Currently the Ingress only supports a single TLS port, 443, and assumes TLS termination. If multiple members of this list specify different hosts, they will be multiplexed on the same port according to the hostname specified through the SNI TLS extension.",
|
||||
"tls": "TLS configuration. Currently the Ingress only supports a single TLS port, 443. If multiple members of this list specify different hosts, they will be multiplexed on the same port according to the hostname specified through the SNI TLS extension, if the ingress controller fulfilling the ingress supports SNI.",
|
||||
"rules": "A list of host rules used to configure the Ingress. If unspecified, or no rule matches, all traffic is sent to the default backend.",
|
||||
}
|
||||
|
||||
|
|
|
@ -523,13 +523,6 @@ func ValidateIngressName(name string, prefix bool) (bool, string) {
|
|||
|
||||
func validateIngressTLS(spec *extensions.IngressSpec, fldPath *field.Path) field.ErrorList {
|
||||
allErrs := field.ErrorList{}
|
||||
// Currently the Ingress only supports HTTP(S), so a secretName is required.
|
||||
// This will not be the case if we support SSL routing at L4 via SNI.
|
||||
for i, t := range spec.TLS {
|
||||
if t.SecretName == "" {
|
||||
allErrs = append(allErrs, field.Required(fldPath.Index(i).Child("secretName"), spec.TLS[i].SecretName))
|
||||
}
|
||||
}
|
||||
// TODO: Perform a more thorough validation of spec.TLS.Hosts that takes
|
||||
// the wildcard spec from RFC 6125 into account.
|
||||
return allErrs
|
||||
|
|
|
@ -1320,8 +1320,6 @@ func TestValidateIngress(t *testing.T) {
|
|||
badHostIP := newValid()
|
||||
badHostIP.Spec.Rules[0].Host = hostIP
|
||||
badHostIPErr := fmt.Sprintf("spec.rules[0].host: Invalid value: '%v'", hostIP)
|
||||
noSecretName := newValid()
|
||||
noSecretName.Spec.TLS = []extensions.IngressTLS{{SecretName: ""}}
|
||||
|
||||
errorCases := map[string]extensions.Ingress{
|
||||
"spec.backend.serviceName: Required value": servicelessBackend,
|
||||
|
@ -1330,7 +1328,6 @@ func TestValidateIngress(t *testing.T) {
|
|||
"spec.rules[0].host: Invalid value": badHost,
|
||||
"spec.rules[0].http.paths: Required value": noPaths,
|
||||
"spec.rules[0].http.paths[0].path: Invalid value": noForwardSlashPath,
|
||||
"spec.tls[0].secretName: Required value": noSecretName,
|
||||
}
|
||||
errorCases[badPathErr] = badRegexPath
|
||||
errorCases[badHostIPErr] = badHostIP
|
||||
|
|
|
@ -1264,7 +1264,11 @@ func (i *IngressDescriber) describeIngress(ing *extensions.Ingress) (string, err
|
|||
func describeIngressTLS(out io.Writer, ingTLS []extensions.IngressTLS) {
|
||||
fmt.Fprintf(out, "TLS:\n")
|
||||
for _, t := range ingTLS {
|
||||
fmt.Fprintf(out, " %v terminates %v\n", t.SecretName, strings.Join(t.Hosts, ","))
|
||||
if t.SecretName == "" {
|
||||
fmt.Fprintf(out, " SNI routes %v\n", strings.Join(t.Hosts, ","))
|
||||
} else {
|
||||
fmt.Fprintf(out, " %v terminates %v\n", t.SecretName, strings.Join(t.Hosts, ","))
|
||||
}
|
||||
}
|
||||
return
|
||||
}
|
||||
|
|
|
@ -163,15 +163,6 @@ func TestUpdate(t *testing.T) {
|
|||
"foo.bar.com": {"/invalid[": "svc"}})
|
||||
return object
|
||||
},
|
||||
|
||||
func(obj runtime.Object) runtime.Object {
|
||||
object := obj.(*extensions.Ingress)
|
||||
object.Spec.TLS = append(object.Spec.TLS, extensions.IngressTLS{
|
||||
Hosts: []string{"foo.bar.com"},
|
||||
SecretName: "",
|
||||
})
|
||||
return object
|
||||
},
|
||||
)
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue