Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

doc(kic) add GWAPI redirect instructions #6335

Merged
merged 8 commits into from
Oct 27, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
71 changes: 71 additions & 0 deletions app/_includes/md/kic/add-tls-conf.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,71 @@

{% include_cached /md/kic/add-certificate.md hostname=include.hostname kong_version=page.kong_version %}

1. Update your routing configuration to use this certificate.
{% capture the_code %}
{% navtabs codeblock %}
{% navtab Ingress %}
```bash
kubectl patch --type json ingress echo -p='[{
"op":"add",
"path":"/spec/tls",
"value":[{
"hosts":["kong.example"],
"secretName":"{{include.hostname}}"
}]
}]'
```
{% endnavtab %}
{% navtab Gateway APIs %}
```bash
kubectl patch --type=json gateway kong -p='[{
"op":"add",
"path":"/spec/listeners/-",
"value":{
"name":"proxy-ssl",
"port":443,
"protocol":"HTTPS",
"tls":{
"certificateRefs":[{
"group":"",
"kind":"Secret",
"name":"{{include.hostname}}"
}]
}
}
}]'

```
{% endnavtab %}
{% endnavtabs %}
{% endcapture %}
{{ the_code | indent }}

The results should look like this:

{% capture the_code %}
{% navtabs codeblock %}
{% navtab Ingress %}
```text
ingress.networking.k8s.io/echo patched
```
{% endnavtab %}
{% navtab Gateway APIs %}
```text
gateway.gateway.networking.k8s.io/kong patched
```
{% endnavtab %}
{% endnavtabs %}
{% endcapture %}
{{ the_code | indent }}

1. Send requests to verify if the configured certificate is served.

```bash
curl -ksv https://kong.example/echo --resolve kong.example:443:$PROXY_IP 2>&1 | grep -A1 "certificate:"
```
The results should look like this:
```text
* Server certificate:
* subject: CN=kong.example
```
255 changes: 156 additions & 99 deletions app/_src/kic-v2/guides/configuring-https-redirect.md
Original file line number Diff line number Diff line change
@@ -1,127 +1,184 @@
---
title: Configuring https redirect
title: Configuring HTTPS redirect
content_type: tutorial
---

Learn to configure the {{site.kic_product_name}} to redirect HTTP request to HTTPS so that all communication from the external world to your APIs and microservices is encrypted.
## Overview

{% include_cached /md/kic/prerequisites.md kong_version=page.kong_version disable_gateway_api=true%}
Learn to configure the {{site.kic_product_name}} to redirect HTTP requests to
HTTPS so that all communication from the external world to your APIs and
microservices is encrypted.

## Setup a Sample service
{% include_cached /md/kic/prerequisites.md kong_version=page.kong_version disable_gateway_api=false %}

1. Create an [httpbin](https://httpbin.org) service in the cluster and proxy it.
{% include_cached /md/kic/http-test-service.md kong_version=page.kong_version %}

```bash
kubectl apply -f https://raw.githubusercontent.com/Kong/kubernetes-ingress-controller/v{{site.data.kong_latest_KIC.version}}/deploy/manifests/httpbin.yaml
```
The results should look like this:
{% include_cached /md/kic/class.md kong_version=page.kong_version %}

```text
service/httpbin created
deployment.apps/httpbin created
```
1. Create an Ingress rule to proxy the `httpbin` service.
{% include_cached /md/kic/http-test-routing.md kong_version=page.kong_version %}

```bash
$ echo '
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: demo
annotations:
konghq.com/strip-path: "true"
spec:
ingressClassName: kong
rules:
- http:
paths:
- path: /test
pathType: ImplementationSpecific
backend:
service:
name: httpbin
port:
number: 80
' | kubectl apply -f -
```
The results should look like this:
```text
ingress.networking.k8s.io/demo created
```
1. Test the Ingress rule.
## Add TLS configuration

```bash
$ curl -i $PROXY_IP/test/status/200
```
The results should look like this:
```text
HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Content-Length: 0
Connection: keep-alive
Server: gunicorn/19.9.0
Date: Wed, 27 Sep 2023 10:37:46 GMT
Access-Control-Allow-Origin: *
Access-Control-Allow-Credentials: true
X-Kong-Upstream-Latency: 3
X-Kong-Proxy-Latency: 1
Via: kong/3.3.1
```
{% include_cached /md/kic/add-tls-conf.md hostname='kong.example' kong_version=page.kong_version %}

## Setup HTTPS redirect
## Configure an HTTPS redirect

To instruct Kong to redirect all HTTP requests matching this Ingress rule to
HTTPS, update its annotations.
Kong handles HTTPS redirects by automatically issuing redirects to requests
whose characteristics match an HTTPS-only route except for the protocol. For
example, with a Kong route such as this:

1. Limit the protocols of the Ingress rule to HTTPS only and issue a 308 redirect.
```json
{ "protocols": ["https"], "hosts": ["kong.example"],
"https_redirect_status_code": 301, "paths": ["/echo/"], "name": "example" }
```

A request for `http://kong.example/echo/green` receives a 301 response with
a `Location: https://kong.example/echo/green` header. Kubernetes resource
annotations instruct the controller to create a route with `protocols=[https]`
and `https_redirect_status_code` set to the code of your choice (the default if
unset is `426`).
1. Configure the protocols that are allowed in the `konghq.com/protocols` annotation.
{% capture the_code %}
{% navtabs codeblock %}
{% navtab Ingress %}

```bash
kubectl annotate ingress echo konghq.com/protocols=https
```
{% endnavtab %}
{% navtab Gateway APIs %}

```bash
kubectl annotate httproute echo konghq.com/protocols=https
```
{% endnavtab %}
{% endnavtabs %}
{% endcapture %}
{{ the_code | indent }}

```bash
$ kubectl patch ingress demo -p '{"metadata":{"annotations":{"konghq.com/protocols":"https","konghq.com/https-redirect-status-code":"308"}}}'
```
The results should look like this:
```text
ingress.networking.k8s.io/demo patched
```
1. Make a plain-text HTTP request to Kong and a redirect is issued.

{% capture the_code %}
{% navtabs codeblock %}
{% navtab Ingress %}
```text
ingress.networking.k8s.io/echo annotated
```
{% endnavtab %}
{% navtab Gateway APIs %}
```text
httproute.gateway.networking.k8s.io/echo annotated
```
{% endnavtab %}
{% endnavtabs %}
{% endcapture %}
{{ the_code | indent }}


1. Configure the status code used to redirect in the `konghq.com/https-redirect-status-code`` annotation.
{% capture the_code %}
{% navtabs codeblock %}
{% navtab Ingress %}

```bash
kubectl annotate ingress echo konghq.com/https-redirect-status-code="301"
```
{% endnavtab %}
{% navtab Gateway APIs %}

```bash
kubectl annotate httproute echo konghq.com/https-redirect-status-code="301"
```
{% endnavtab %}
{% endnavtabs %}
{% endcapture %}
{{ the_code | indent }}

The results should look like this:

{% capture the_code %}
{% navtabs codeblock %}
{% navtab Ingress %}
```text
ingress.networking.k8s.io/echo annotated
```
{% endnavtab %}
{% navtab Gateway APIs %}
```text
httproute.gateway.networking.k8s.io/echo annotated
```
{% endnavtab %}
{% endnavtabs %}
{% endcapture %}
{{ the_code | indent }}

> **Note**: The GatewayAPI _does not_ use a [HTTPRequestRedirectFilter](https://gateway-api.sigs.k8s.io/references/spec/#gateway.networking.k8s.io/v1.HTTPRequestRedirectFilter)
to configure the redirect. Using the filter to redirect HTTP to HTTPS requires
a separate HTTPRoute to handle redirected HTTPS traffic, which does not align
well with Kong's single route redirect model.

Work to support the standard filter-based configuration is ongoing. Until then,
the annotations allow you to configure HTTPS-only HTTPRoutes.

## Test the configuration

With the redirect configuration in place, HTTP requests now receive a
redirect rather than being proxied upstream:
1. Send a HTTP request.
```bash
$ curl $PROXY_IP/test/headers -I
curl -ksvo /dev/null -H 'Host: kong.example' http://$PROXY_IP/echo 2>&1 | grep -i http
```

The results should look like this:

```text
HTTP/1.1 308 Permanent Redirect
Date: Tue, 06 Aug 2019 18:04:38 GMT
Content-Type: text/html
Content-Length: 167
Connection: keep-alive
Location: https://192.0.2.0/test/headers
Server: kong/1.2.1
> GET /echo HTTP/1.1
< HTTP/1.1 301 Moved Permanently
< Location: https://kong.example/echo
```

The `Location` header contains the URL you need to use for an HTTPS
request. This URL varies depending on your installation method. You can also get the IP address of the load balancer for Kong and send a HTTPS request to test.


## Test the configuration
1. Send a curl request to follow redirects using the `-L` flag navigates
to the HTTPS URL and receive a proxied response from upstream.

1. Send a request to the `Location` URL.
```bash
$ curl -k https://$PROXY_IP/test/headers
curl -Lksv -H 'Host: kong.example' http://$PROXY_IP/echo 2>&1
```
The results should look like this:

The results should look like this (some output removed for brevity):

```text
{
"headers": {
"Accept": "*/*",
"Connection": "keep-alive",
"Host": "192.0.2.0",
"User-Agent": "curl/8.1.2",
"X-Forwarded-Host": "192.0.2.0"
}
}
> GET /echo HTTP/1.1
> Host: kong.example
>
< HTTP/1.1 301 Moved Permanently
< Location: https://kong.example/echo
< Server: kong/3.4.2

* Issue another request to this URL: 'https://kong.example/echo'

* Server certificate:
* subject: CN=kong.example

> GET /echo HTTP/2
> Host: kong.example
>
< HTTP/2 200
< via: kong/3.4.2
<
Welcome, you are connected to node kind-control-plane.
Running on Pod echo-74d47cc5d9-pq2mw.
In namespace default.
With IP address 10.244.0.7.
```

Kong correctly serves the request only on HTTPS protocol and redirects the user if the HTTP protocol is used. The `-k` flag in cURL skips certificate validation as the certificate served by Kong is a self-signed one. If you are serving this traffic through a domain that you control and have configured TLS properties for it, then the flag won't
be necessary.

If you have a domain that you control but don't have TLS/SSL certificates
for it, see [Using cert-manager with Kong](/kubernetes-ingress-controller/{{page.kong_version}}/guides/cert-manager) guide which can get TLS certificates setup for you automatically. And it's free, thanks to Let's Encrypt!
Kong correctly serves the request only on HTTPS protocol and redirects the user
if the HTTP protocol is used. The `-k` flag in cURL skips certificate
validation as the certificate served by Kong is a self-signed one. If you are
serving this traffic through a domain that you control and have configured TLS
properties for it, then the flag won't be necessary.

If you have a domain that you control but don't have TLS/SSL certificates for
it, see [Using cert-manager with
Kong](/kubernetes-ingress-controller/{{page.kong_version}}/guides/cert-manager)
guide which can get TLS certificates setup for you automatically. And it's
free, thanks to Let's Encrypt!
Loading