-
Notifications
You must be signed in to change notification settings - Fork 391
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Why does BinderHub Helm chart force the use of kube-lego? #676
Comments
Opened a PR above to solve this issue. |
BinderHub doesn't force the use of kube-lego, but it provides shortcuts to more easily enable https with letsencrypt by setting a single flag, rather than requiring lots of custom configuration. |
@minrk That's almost the case. The entire template doesn't force {{- if and .Values.ingress.https.enabled (eq .Values.ingress.https.type "kube-lego") }}
tls:
- secretName: kubelego-tls-binder-{{ .Release.Name }}
hosts:
{{- range $host := .Values.ingress.hosts }}
- {{ $host }}
{{- end }}
{{- end }} The way I read it, TLS is only activated if |
Greetings,
I'm curious why the
ingress.yaml
template was only written for the usage ofkube-lego
? The belowingress.yaml
template is taken from versionbinderhub-0.1.0-230bbde
of the BinderHub Helm chart:I understand the desire to have things "just work" out of the box, but this seems inconvenient for anyone who either uses their own TLS certificate, or is using cert-manager (like we are) with a cluster-wide wildcard certificate. The kube-lego project will not be maintained in the near future, and mentions cert-manager as a replacement; the README.md for the kube-lego project even mentions this:
Any reasons for a very opinionated ingress template?
The text was updated successfully, but these errors were encountered: