Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Set proxy.https.hosts by default too #390

Merged
merged 1 commit into from
May 11, 2021
Merged

Conversation

yuvipanda
Copy link
Member

In some hubs, we currently just use a loadbalancer + autohttps
to get traffic into the cluster. This is simpler than getting
nginx-ingress + certmanager setup, although not entirely
sure if that's the right thing to do long term.

By putting the domains in proxy.https.hosts as well, we can
decide to use or not use autohttps on a per-hub basis, without
having to repeat the domains in multiple places. Staging and
prod hubs that have the exact same config but differ in
domains can be easily constructed thus.

In some hubs, we currently just use a loadbalancer + autohttps
to get traffic into the cluster. This is simpler than getting
nginx-ingress + certmanager setup, although not entirely
sure if that's the right thing to do long term.

By putting the domains in proxy.https.hosts as well, we can
decide to use or not use autohttps on a per-hub basis, without
having to repeat the domains in multiple places. Staging and
prod hubs that have the exact same config but differ in
domains can be easily constructed thus.
@damianavila
Copy link
Contributor

In some hubs, we currently just use a loadbalancer + autohttps
to get traffic into the cluster. This is simpler than getting
nginx-ingress + certmanager setup, although not entirely
sure if that's the right thing to do long term.

What about terminating SSL at the load balancer as another option, maybe?

By putting the domains in proxy.https.hosts as well, we can
decide to use or not use autohttps on a per-hub basis, without
having to repeat the domains in multiple places. Staging and
prod hubs that have the exact same config but differ in
domains can be easily constructed thus.

I like that! This is I am approving this one in a few seconds!

@yuvipanda
Copy link
Member Author

yuvipanda commented May 11, 2021

What about terminating SSL at the load balancer as another option, maybe?

Offloading to the AWS (or GCP) loadbalancer for SSL? IMO z2jh's autohttps setup is far less fiddly :D

@damianavila
Copy link
Contributor

Offloading to the AWS (or GCP) loadbalancer for SSL? IMO z2jh's autohttps setup is far less fiddly :D

Yep, but some people (and, maybe, some 2i2c future users) are not always happy with a letsencrypt certs and they want to use their own one 😉 . In those cases, the offloading worked pretty well in my experience.

@yuvipanda yuvipanda merged commit 3bbe000 into 2i2c-org:master May 11, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants