-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
All endpoints (ingress) have the same secretName #22935
Comments
@AObuchow |
Any news ? |
@batleforc do you happen to have a reproducer devfile for this? Is there some specific configuration required for the endpoints? I apologize for taking so long to look into this issue. |
Hello @AObuchow ,
Once the workspace created, you can check the main ingress and the one bind to https-3000 and see that they have the same secretName. |
@batleforc Could you please clarify the issue that occurs on OpenShift in more detail? This seems to be a separate issue if I'm not misunderstanding? Please try to provide an example of an endpoint that causes your issue as well as the expected vs actual behaviour. It might make sense to open up a new Che issue for this (which I can gladly do for you once I understand the issue). Thank you :) |
The issue with OpenShift is that we need to have some annotations put on the route in order to have HTTPS, but in the current case no annotation goes down to the end user route. |
Sounds good, thank you for the quick reply @batleforc :) Have you seen that we added support for endpoint annotations from the devfile specification? See "Support devfile endpoint annotations" in the Che 7.92 release notes. Here's the associated PR. I wonder if this is the feature you were looking for? |
Yes I've seen it, it's more or less what I intended, in our case we need those annotations to be by default and not opt-in |
I think your issue would be #23118 then 😎 If that's the case, please leave a comment on it just asking for the issue to be prioritized. Otherwise, please submit a new issue and tag "@" me in it :) |
Absolutely up! It would be really nice to have the possibility of having multiple endpoints with their own certificate issued by Cert Manager thanks to the annotation. At the moment we are using a workaround that consists in removing the owner reference from metadata in the certificate resource and adding all the endpoints URL of the workspace under the spec.DNSnames, but it's quite annoying doing all this manual job whenever a new workspace coming out... |
Describe the bug
Will working on a web project (Api Rust, Front JSxRust), i set up 3 endpoints that end up with 3 different DNS and should likewise have 3 different secretname
Che version
7.84@latest
Steps to reproduce
kubectl get ingress | grep "{Workspace Name}" | awk '{print "kubectl get ingress " $1 " -o yaml | yq .spec.tls[0].secretName"}' | bash
The endpoints is like the pod's name ending with "-endpoints"
Expected behavior
Each endpoint should have a different SecretName like {pod name}-{endpoint name}-endpoints wich would allow each endpoint to have a valid certificate generated with CertManager
Runtime
Kubernetes (vanilla)
Screenshots
No response
Installation method
chectl/latest, chectl/next
Environment
Linux
Eclipse Che Logs
No response
Additional context
No response
The text was updated successfully, but these errors were encountered: