-
Notifications
You must be signed in to change notification settings - Fork 791
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS seems to be broken on applications when using boot #5310
Comments
@ccojocar is there a workaround? |
There are a few workarounds:
I would recommend option 1 and let the users to take the responsibility to secure their applications deployed with Jenkins X until we have a fix on our side and everything works automatically. |
I'll also extend the environment configuration in the jx-requirements file such that it will allow to define custom ingress configuration per environment, and then we can generate the cert-manager resources from templates per environment. |
Disable the installation of the cert-manager, external-dns and acme charts when they are disable in the jx-requirements.yml file. Signed-off-by: Cosmin Cojocar <cosmin.cojocar@gmx.ch>
I think option 3 is best, but we'd need to progress on operating the staging and production environments to use boot. We'd also need to provide an ingress template for the preview, staging and production environments. For the interim we should go with option 1 and quickly follow up with option 3. |
Will that work for previews and devpods? I'm currently using
which seems to work quite well and catch anything with a broken/missing cert. I wasn't able to get it stable and working for previews and devpods when I was trying replicator a while back. |
@rawlingsj I tried that approach manually and found that certificates were not being finalised because there was no Issuer in the namespace. I added an Issuer and have now hit |
Tried recreating the certificates manually, but get the same error. |
@tdcox @rawlingsj same here on my application's Ingress: |
I ended up getting this working, but I had to manually copy the keys over. For some reason, Secret replication is not functioning on my cluster. I ended up adding my own CM Issuers in both Staging and Production. Currently, these are just based on
Because I am using CloudDNS on GCP, I also ended up needing to also replicate (manually) the
Last of all, it’s good to ramp up on Cert Manager. In addition to following the CertManager namespace with kail. This post was super handy, as a lot over important debugging information is only available if you You can actually find error messages in each of these, like so: |
Looks like |
After jx boot with tls enabled in jx-requirements.txt, I am seeing since days, certificate is not even ready on dev |
@ccojocar is that done? We need that urgently as currently blocked because domain and sub domain are with different providers. Jenkins X without security is not viable option for many companies. |
@srehmanproov You can check with @daveconde or @deanesmith on slack. I don't think is done. |
thanks @ccojocar |
Has anyone gotten a chance to confirm that jenkins-x-charts/jxboot-resources#32 fixes this issue? |
Issues go stale after 90d of inactivity. |
Stale issues rot after 30d of inactivity. |
This configure could be add to nginx-ingress:
controller:
extraArgs:
default-ssl-certificate: jx/tls-${your_domain_name}-p |
Rotten issues close after 30d of inactivity. |
@jenkins-x-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the jenkins-x/lighthouse repository. |
Summary
create spring
orcreate quickstart
and deploy it with Jenkins XThe application ingress resource seems to still have the expose controller annotations:
No cert-manger issuer seems to be installed in the stating namespace. The cert-manger fails with the following error when trying to acquire the certificate for newly deployed application:
Steps to reproduce the behavior
Expected behavior
A valid certificate should be acquired for an application deployed in the staging or production environments.
Actual behavior
Jx version
The output of
jx version
is:Jenkins type
Kubernetes cluster
Operating system / Environment
The text was updated successfully, but these errors were encountered: