Skip to content

Ingress controller loads TLS cert/key from volume mount#623

Merged
istio-merge-robot merged 8 commits intoistio:masterfrom
myidpt:ingress
Sep 1, 2017
Merged

Ingress controller loads TLS cert/key from volume mount#623
istio-merge-robot merged 8 commits intoistio:masterfrom
myidpt:ingress

Conversation

@myidpt
Copy link
Copy Markdown

@myidpt myidpt commented Aug 31, 2017

This PR enables ingress controller to load TLS cert/key from volume mount, which is set by operator from secret.

This PR with istio/old_pilot_repo#1149 fixes istio/old_pilot_repo#1134.
Release note:

Ingress controller loads TLS cert/key from volume mount

@myidpt
Copy link
Copy Markdown
Author

myidpt commented Sep 1, 2017

@kyessenov @ldemailly @andraxylia PTAL. Thanks!

Copy link
Copy Markdown
Member

@ldemailly ldemailly left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ty!
/lgtm

data:
tls.key:
tls.crt:
---
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why is this needed?

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it to prevent the container from not starting until the CA generates the secret?

Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You are partially right - this is to prevent container from not starting.
The ingress controller TLS key/cert (for external traffic) is not managed by CA. The operator needs to replace the secret with the real ones when TLS is enabled for external traffic.
To be specific, the operators needs to do:
kubectl delete secret istio-ingress-certs; kubectl create secret tls istio-ingress-certs --key /tmp/tls.key --cert /tmp/tls.crt

@istio-merge-robot
Copy link
Copy Markdown

/lgtm cancel //PR changed after LGTM, removing LGTM. @myidpt

@myidpt
Copy link
Copy Markdown
Author

myidpt commented Sep 1, 2017

/retest

@ldemailly
Copy link
Copy Markdown
Member

/lgtm

@istio-merge-robot
Copy link
Copy Markdown

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: ldemailly

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these OWNERS Files:

You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment

@myidpt
Copy link
Copy Markdown
Author

myidpt commented Sep 1, 2017

@yutongz @sebastienvas Hi folks, can you please take a look at the error? It seems the quota is insufficient for project 450874614208.

@ldemailly
Copy link
Copy Markdown
Member

/retest

@istio-merge-robot
Copy link
Copy Markdown

/test all [submit-queue is verifying that this PR is safe to merge]

@istio-merge-robot
Copy link
Copy Markdown

Automatic merge from submit-queue

@istio-merge-robot istio-merge-robot merged commit 07d20b5 into istio:master Sep 1, 2017
@ldemailly
Copy link
Copy Markdown
Member

hey can you redo this such as it sticks when someone does updateVersion ?
you need to update the templates, not the generated files

ldemailly added a commit that referenced this pull request Sep 2, 2017
Unfortunately running
install/updateVersion.sh
-x gcr.io/istio-testing,f043c7ea6bf68cb1603a7e17e9e1b3ac8b568859

Has the side effect of undoing #623
@istio-testing
Copy link
Copy Markdown
Collaborator

@myidpt: The following tests failed, say /retest to rerun them all:

Test name Commit Details Rerun command
prow/e2e-suite-no_rbac-auth.sh eb5eacc link /test e2e-suite-no_rbac-auth
prow/e2e-suite-rbac-auth.sh eb5eacc link /test e2e-suite-rbac-auth
Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@myidpt myidpt deleted the ingress branch September 2, 2017 03:23
rshriram pushed a commit that referenced this pull request Oct 30, 2017
Automatic merge from submit-queue

Ingress controller loads TLS cert/key from volume mount

This PR enables ingress controller to load TLS cert/key from volume mount, which is set by operator from secret.

This PR with istio/old_pilot_repo#1149 fixes #1134.
**Release note**:
```release-note
Ingress controller loads TLS cert/key from volume mount
```

Former-commit-id: 07d20b5
vbatts pushed a commit to vbatts/istio that referenced this pull request Oct 31, 2017
Automatic merge from submit-queue

Ingress controller loads TLS cert/key from volume mount

This PR enables ingress controller to load TLS cert/key from volume mount, which is set by operator from secret.

This PR with istio/old_pilot_repo#1149 fixes istio#1134.
**Release note**:
```release-note
Ingress controller loads TLS cert/key from volume mount
```

Former-commit-id: 07d20b5
mandarjog pushed a commit that referenced this pull request Oct 31, 2017
mandarjog pushed a commit that referenced this pull request Nov 2, 2017
Automatic merge from submit-queue

Ingress controller loads TLS cert/key from volume mount

This PR enables ingress controller to load TLS cert/key from volume mount, which is set by operator from secret.

This PR with istio/old_pilot_repo#1149 fixes #1134.
**Release note**:
```release-note
Ingress controller loads TLS cert/key from volume mount
```

Former-commit-id: 07d20b5
kyessenov pushed a commit to kyessenov/istio that referenced this pull request Aug 13, 2018
* Add conffiles to avoid overriding on upgrade

* Fix the 'x' used for debugging
howardjohn pushed a commit to howardjohn/istio that referenced this pull request Jan 12, 2020
…ecks (istio#623)

Signed-off-by: Chun Lin Yang <clyang@cn.ibm.com>
howardjohn pushed a commit to howardjohn/istio that referenced this pull request Jan 12, 2020
…stio#623)

* Ignore a warning in kubectl apply when namespace is already created.

* Add TODO and k8s issue number.

* Fix PR comments.
0x01001011 pushed a commit to thedemodrive/istio that referenced this pull request Jul 16, 2020
* add EnforcementMode to RbacConfig

* add more comment

* add more comment
cam-garrison pushed a commit to cam-garrison/istio that referenced this pull request Mar 5, 2026
Co-authored-by: mkralik3 <mkralik@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Use volume mount to propagate TLS key/cert to Ingress

7 participants