- 
          
- 
                Notifications
    You must be signed in to change notification settings 
- Fork 2.6k
Closed
Labels
Description
Feature and motivation
The ingress resource created by the chart adds always the nginx.ingress.kubernetes.io/proxy-ssl-secret annotation which makes this ingress inaccessible by default if the tls secret is created, for example, by cert manager.
Code cample showing that the annotation is mandatory:
    {{- if not (empty .sslSecret) }}
nginx.ingress.kubernetes.io/proxy-ssl-secret: {{ tpl .sslSecret $ | quote }}
    {{- else if (empty $.Values.ingress.tls) }}
nginx.ingress.kubernetes.io/proxy-ssl-secret: {{ tpl (printf "%s/%s" $.Release.Namespace (include "seleniumGrid.tls.fullname" $)) $ | quote }}
    {{- else }}
nginx.ingress.kubernetes.io/proxy-ssl-secret: {{ tpl (printf "%s/%s" $.Release.Namespace (index $.Values.ingress.tls 0).secretName) $ | quote }}
    {{- end }}
I propose that if .sslSecret is empty, that annotation should not be added. This can be achieved in multiple ways, one could be by simply disabling the default value:
    {{- if not (empty .sslSecret) }}
nginx.ingress.kubernetes.io/proxy-ssl-secret: {{ tpl .sslSecret $ | quote }}
    {{- else if (empty $.Values.ingress.tls) }}
nginx.ingress.kubernetes.io/proxy-ssl-secret: {{ tpl (printf "%s/%s" $.Release.Namespace (include "seleniumGrid.tls.fullname" $)) $ | quote }}
    {{- end }}
Usage example
I would use this feature to be able to create an ingress resource without the nginx.ingress.kubernetes.io/proxy-ssl-secret annotation.