This repository has been archived by the owner on Feb 14, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 115
Apps not available via HTTPS #46
Labels
Comments
We have created an issue in Pivotal Tracker to manage this: https://www.pivotaltracker.com/story/show/171482241 The labels on this github issue will be updated when the story is started. |
Has this been solved by #64? |
XanderStrike
pushed a commit
that referenced
this issue
Apr 28, 2020
* This bump of CF K8s Networking includes two changes. 1. Removes the Status section from the Route CRD [#172569406](https://www.pivotaltracker.com/story/show/172569406). 2. Changes which gateway is associated with the virtual services for app routes. This is part of the work needed to have app ingress routing support TLS by default. * This also includes the changes to cf-for-k8s to enable app tls by default 1. New requirement for distinct app and system domains is documented in values files 2. Fields added for new cert to values files 3. generate-values now creates a 2nd cert for app ingress automatically fixes #46 Co-authored-by: Alex Standke <astandke@vmware.com>
This was referenced Apr 29, 2020
Closed by #179 |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Summary
HTTPS traffic does not reach apps running on cf-for-k8s.
Repro Steps
Context
Currently, there are two istio ingress gateways: one for the cf-system components and one for cf-workloads. The ingress gateway for cf-workloads namespace only configures a rule for unencrypted http traffic to port 80. Meanwhile the system component ingress gateway only listens for encrypted https traffic on port 443. So any encrypted https traffic to port 443 only matches the routing rule on the cf-system gateway and receives an istio 404 response. We expect to work with the cf-for-k8s networking team to resolve this issue.
The text was updated successfully, but these errors were encountered: