Skip to content
This repository has been archived by the owner on Feb 22, 2022. It is now read-only.

[stable/traefik] adding support for traefik wildcard certificates #6015

Merged
merged 5 commits into from Jul 15, 2018

Conversation

billimek
Copy link
Collaborator

What this PR does / why we need it: This PR is to include wildcard certificate support for the traefik chart. See https://docs.traefik.io/configuration/acme/#wildcard-domains for more details on this capability.

Which issue this PR fixes (optional, in fixes #<issue number>(, fixes #<issue_number>, ...) format, will close that issue when PR gets merged): fixes #5379

Special notes for your reviewer: Based on the original work provided by @farfeduc

@k8s-ci-robot
Copy link
Contributor

Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA.

It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.


Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. label Jun 10, 2018
@k8s-ci-robot k8s-ci-robot added needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Jun 10, 2018
@billimek
Copy link
Collaborator Author

Signed CLA

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. and removed cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. labels Jun 10, 2018
@billimek
Copy link
Collaborator Author

/assign @krancour

@billimek billimek changed the title adding support for traefik wildcard certificates [stable/traefik] adding support for traefik wildcard certificates Jun 11, 2018
@billimek
Copy link
Collaborator Author

Added support for multiple sets of domains

@billimek
Copy link
Collaborator Author

When testing this change locally this is a subset of the output to demonstrate it working as intended:

helm install --debug --dry-run local/traefik --set acme.enabled=true,acme.domains.enabled=true:

<snip>
data:
  traefik.toml: |
    # traefik.toml
    logLevel = "INFO"
    defaultEntryPoints = ["http", "httpn"]
    [entryPoints]
      [entryPoints.http]
      address = ":80"
      compress = true
      [entryPoints.httpn]
      address = ":8880"
      compress = true
    [kubernetes]
    [acme]
    email = "admin@example.com"
    storage = "/acme/acme.json"
    entryPoint = "https"
    onHostRule = true
    caServer = "https://acme-staging-v02.api.letsencrypt.org/directory"
    [[acme.domains]]
       main = "*.example.com"
       sans = ["example.com"]
    [[acme.domains]]
       main = "*.example2.com"
       sans = ["test1.example2.com", "test2.example2.com"]
<snip>

@unguiculus
Copy link
Member

/ok-to-test

@k8s-ci-robot k8s-ci-robot removed the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Jun 17, 2018
@unguiculus
Copy link
Member

/assign

@unguiculus
Copy link
Member

ping @krancour

@billimek
Copy link
Collaborator Author

/assign @dtomcej

@k8s-ci-robot
Copy link
Contributor

@billimek: GitHub didn't allow me to assign the following users: dtomcej.

Note that only kubernetes members and repo collaborators can be assigned.

In response to this:

/assign @dtomcej

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@billimek
Copy link
Collaborator Author

/assign @emilevauge

@k8s-ci-robot
Copy link
Contributor

@billimek: GitHub didn't allow me to assign the following users: emilevauge.

Note that only kubernetes members and repo collaborators can be assigned.

In response to this:

/assign @emilevauge

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@billimek
Copy link
Collaborator Author

billimek commented Jun 29, 2018

@unguiculus with @krancour unfortunately stepping away from Traefik review duties, do you know how to get another person in the OWNERS file assigned to this PR?

@ldez
Copy link

ldez commented Jun 29, 2018

/assign @dtomcej

@k8s-ci-robot
Copy link
Contributor

@ldez: GitHub didn't allow me to assign the following users: dtomcej.

Note that only kubernetes members and repo collaborators can be assigned.

In response to this:

/assign @dtomcej

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@dtomcej
Copy link
Collaborator

dtomcej commented Jun 29, 2018

I have been trying! but I'm not part of the proper org it seems...

@krancour
Copy link
Contributor

@dtomcej apart from being in the owner's file, you also need to be in the Kubernetes github org. I hadn't realized that you and other Traefik maintainers were not.

The process for requesting membership is here: https://github.com/kubernetes/community/blob/master/community-membership.md#requirements

You can use me as a sponsor. If you know anyone else who's already a member, as them as well.

@k8s-ci-robot k8s-ci-robot removed the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Jul 1, 2018
@k8s-ci-robot k8s-ci-robot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Jul 1, 2018
@k8s-ci-robot k8s-ci-robot added size/M Denotes a PR that changes 30-99 lines, ignoring generated files. and removed size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels Jul 1, 2018
@jseguillon
Copy link

Tested on my development kub8s -> Works like a charm 👏 👏 👏 👏

@jseguillon
Copy link

Hi @billimek & @krancour. Any chance to get this approved ?

@veeramarni
Copy link

@dtomcej wondering if you got a chance to approve this?

@dtomcej
Copy link
Collaborator

dtomcej commented Jul 12, 2018

/lgtm

@k8s-ci-robot
Copy link
Contributor

@dtomcej: changing LGTM is restricted to assignees, and only kubernetes/charts repo collaborators may be assigned issues.

In response to this:

/lgtm

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

enabled: false
# List of sets of main and (optional) SANs to generate for
# for wildcard certificates see https://docs.traefik.io/configuration/acme/#wildcard-domains
domainsList:
Copy link
Contributor

@grugnog grugnog Jul 12, 2018

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the examples in this section should be commented out - this is the norm for examples and avoids you accidentally attempting to request certs for example domains.

Copy link
Collaborator Author

@billimek billimek Jul 13, 2018

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Finally some feedback, thank you @grugnog!

Changes pushed.

@unguiculus
Copy link
Member

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Jul 15, 2018
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: billimek, dtomcej, unguiculus

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jul 15, 2018
@k8s-ci-robot k8s-ci-robot merged commit ebe24f6 into helm:master Jul 15, 2018
NicolasT added a commit to scality/charts that referenced this pull request Jul 15, 2018
…labels

* kubernetes/master: (411 commits)
  [stable/efs-provisioner] Chart for efs-provisioner, a Kubernetes external-storage provisioner (helm#3233)
  [stable/filebeat] filebeat fixes (helm#6332)
  [stable/stolon] Add support for priorityClasses (helm#6607)
  [stable/external-dns] Add support for priorityClasses (helm#6606)
  [stable/minio] Add support for priorityClasses (helm#6604)
  [stable/cluster-autoscaler] Add support for priorityClasses (helm#6603)
  [stable/oauth2-proxy] Add support for priorityClasses (helm#6586)
  [stable/elasticsearch-exporter] add support for priorityClasses (helm#6584)
  [stable/traefik] adding support for traefik wildcard certificates (helm#6015)
  gcloud-sqlproxy: add tolerations and affinity to the Deployment (helm#6495)
  Review readme (helm#6399)
  [stable/mongodb-replicaset] Prometheus Metrics export (helm#6282)
  [stable/artifactory-ha] Typo fix: livessProbed->livenessProbed (helm#6462)
  [stable/artifactory] livessProbed->livenessProbed (helm#6461)
  [incubator/kube-spot-termination-notice-handler] Add Support for Tolerations (helm#5813)
  [stable/kanister-operator] RBAC changes and kanister profile creation (helm#6280)
  fix redis-ha NOTE.txt, stable/redis-ha don't create master-0 pod (helm#6131)
  [stable/concourse] add support for custom envvars for the web containers (helm#6441)
  upgrade to latest prometheus release 2.3.2 and alertmanager 0.15.1 (helm#6623)
  cert-manager: fast-forward to upstream 777ce6f4 (helm#6625)
  ...
@@ -122,8 +122,9 @@ The following table lists the configurable parameters of the Traefik chart and t
| `acme.staging` | Whether to get certs from Let's Encrypt's staging environment | `true` |
| `acme.logging` | Display debug log messages from the ACME client library | `false` |
| `acme.domains.enabled` | Enable certificate creation by default for specific domain | `false` |
| `acme.domains.main` | Main domain name of the generated certificate | `*.example.com` |
| `acme.domains.sans` | List of alternative subject name to give to the certificate | `[]` |
| `acme.domains.domainList` | List of domains & (optional) subject names | `[]` |

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@billimek Does it suppose to be acme.domains.domainsList? Missing s in the Readme

@billimek billimek deleted the wildcard branch September 16, 2018 18:43
Jnig pushed a commit to Jnig/charts that referenced this pull request Nov 13, 2018
…lm#6015)

* adding support for traefik wildcard certificates

* adding support for multiple sets of domains

* making values sans example more readable

* bumping version of Chart

* commenting domain examples from values.yml

Signed-off-by: Jakob Niggel <info@jakobniggel.de>
gsemet pushed a commit to gsemet/charts that referenced this pull request Nov 13, 2018
…lm#6015)

* adding support for traefik wildcard certificates

* adding support for multiple sets of domains

* making values sans example more readable

* bumping version of Chart

* commenting domain examples from values.yml
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm Indicates that a PR is ready to be merged. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[stable/traefik] ACME wildcard certificate support
9 participants