Merge pull request #179 from rikatz/defaultssl
Allows the usage of Default SSL Cert
This commit is contained in:
commit
53f1336e58
2 changed files with 31 additions and 3 deletions
|
@ -203,7 +203,11 @@ http {
|
||||||
server_name {{ $server.Hostname }};
|
server_name {{ $server.Hostname }};
|
||||||
listen [::]:80{{ if $cfg.UseProxyProtocol }} proxy_protocol{{ end }}{{ if eq $index 0 }} ipv6only=off{{end}}{{ if eq $server.Hostname "_"}} default_server reuseport backlog={{ $backlogSize }}{{end}};
|
listen [::]:80{{ if $cfg.UseProxyProtocol }} proxy_protocol{{ end }}{{ if eq $index 0 }} ipv6only=off{{end}}{{ if eq $server.Hostname "_"}} default_server reuseport backlog={{ $backlogSize }}{{end}};
|
||||||
{{/* Listen on 442 because port 443 is used in the stream section */}}
|
{{/* Listen on 442 because port 443 is used in the stream section */}}
|
||||||
{{ if not (empty $server.SSLCertificate) }}listen 442 {{ if $cfg.UseProxyProtocol }}proxy_protocol{{ end }} ssl {{ if $cfg.UseHTTP2 }}http2{{ end }};
|
{{ if not (empty $server.SSLCertificate) }}listen 442 {{ if $cfg.UseProxyProtocol }}proxy_protocol{{ end }} {{ if eq $server.Hostname "_"}} default_server reuseport backlog={{ $backlogSize }}{{end}} ssl {{ if $cfg.UseHTTP2 }}http2{{ end }};
|
||||||
|
{{/* comment PEM sha is required to detect changes in the generated configuration and force a reload */}}
|
||||||
|
# PEM sha: {{ $server.SSLPemChecksum }}
|
||||||
|
ssl_certificate {{ $server.SSLCertificate }};
|
||||||
|
|
||||||
{{/* comment PEM sha is required to detect changes in the generated configuration and force a reload */}}
|
{{/* comment PEM sha is required to detect changes in the generated configuration and force a reload */}}
|
||||||
# PEM sha: {{ $server.SSLPemChecksum }}
|
# PEM sha: {{ $server.SSLPemChecksum }}
|
||||||
ssl_certificate {{ $server.SSLCertificate }};
|
ssl_certificate {{ $server.SSLCertificate }};
|
||||||
|
|
|
@ -47,6 +47,7 @@ import (
|
||||||
"k8s.io/ingress/core/pkg/ingress/resolver"
|
"k8s.io/ingress/core/pkg/ingress/resolver"
|
||||||
"k8s.io/ingress/core/pkg/ingress/status"
|
"k8s.io/ingress/core/pkg/ingress/status"
|
||||||
"k8s.io/ingress/core/pkg/k8s"
|
"k8s.io/ingress/core/pkg/k8s"
|
||||||
|
ssl "k8s.io/ingress/core/pkg/net/ssl"
|
||||||
local_strings "k8s.io/ingress/core/pkg/strings"
|
local_strings "k8s.io/ingress/core/pkg/strings"
|
||||||
"k8s.io/ingress/core/pkg/task"
|
"k8s.io/ingress/core/pkg/task"
|
||||||
)
|
)
|
||||||
|
@ -827,9 +828,30 @@ func (ic *GenericController) createServers(data []interface{}, upstreams map[str
|
||||||
|
|
||||||
dun := ic.getDefaultUpstream().Name
|
dun := ic.getDefaultUpstream().Name
|
||||||
|
|
||||||
|
// This adds the Default Certificate to Default Backend and also for vhosts missing the secret
|
||||||
|
var defaultPemFileName, defaultPemSHA string
|
||||||
|
defaultCertificate, err := ic.getPemCertificate(ic.cfg.DefaultSSLCertificate)
|
||||||
|
// If no default Certificate was supplied, tries to generate a new dumb one
|
||||||
|
if err != nil {
|
||||||
|
var cert *ingress.SSLCert
|
||||||
|
defCert, defKey := ssl.GetFakeSSLCert()
|
||||||
|
cert, err = ssl.AddOrUpdateCertAndKey("system-snake-oil-certificate", defCert, defKey, []byte{})
|
||||||
|
if err != nil {
|
||||||
|
glog.Fatalf("Error generating self signed certificate: %v", err)
|
||||||
|
} else {
|
||||||
|
defaultPemFileName = cert.PemFileName
|
||||||
|
defaultPemSHA = cert.PemSHA
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
defaultPemFileName = defaultCertificate.PemFileName
|
||||||
|
defaultPemSHA = defaultCertificate.PemSHA
|
||||||
|
}
|
||||||
|
|
||||||
// default server
|
// default server
|
||||||
servers[defServerName] = &ingress.Server{
|
servers[defServerName] = &ingress.Server{
|
||||||
Hostname: defServerName,
|
Hostname: defServerName,
|
||||||
|
SSLCertificate: defaultPemFileName,
|
||||||
|
SSLPemChecksum: defaultPemSHA,
|
||||||
Locations: []*ingress.Location{
|
Locations: []*ingress.Location{
|
||||||
{
|
{
|
||||||
Path: rootLocation,
|
Path: rootLocation,
|
||||||
|
@ -899,7 +921,9 @@ func (ic *GenericController) createServers(data []interface{}, upstreams map[str
|
||||||
servers[host].SSLPemChecksum = cert.PemSHA
|
servers[host].SSLPemChecksum = cert.PemSHA
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
glog.Warningf("secret %v does not exists", key)
|
|
||||||
|
servers[host].SSLCertificate = defaultPemFileName
|
||||||
|
servers[host].SSLPemChecksum = defaultPemSHA
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue