Skip to content

Support wildcard default cert by making TLS secretName not required like k8ix #426

Closed
@FossPrime

Description

@FossPrime

Describe the bug
Specifying a host but not a secret will cause your ingress to be rejected
ejected: Error retrieving secret for Ingress production-custom-deploy: resource name may not be empty and the https version to output a 404 error.

This is counter to the best wildcard certificate solution in kubernetes/ingress-nginx. Which lets you configure TLS, but leave out the certificate, instead defaulting to your default certificate. In our cases, a wildcard certificate.
kubernetes/ingress-nginx#2170 (comment)

To Reproduce
Steps to reproduce the behavior:

  1. Configure kubernetes-ingress
  2. Configure an ingress with tls, but leave out secretName
  3. See error

Expected behavior
The default certificate defined in the controller should be used and the rest of the ingress config obayed. This is not easy to workaround as ingress' are often namespaced and wildcard certificates are usually out of reach

Your environment

  • Version of the Ingress Controller - 1.3.2
  • Version of Kubernetes 1.10
  • Kubernetes platform GCP
  • Using NGINX

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementPull requests for new features/feature enhancementsproposalAn issue that proposes a feature request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions