Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow specifying certificate by name #572

Closed
wants to merge 1 commit into from

Conversation

dverbeir
Copy link

Using the 'service.beta.kubernetes.io/do-loadbalancer-certificate-name' service annotation, the certificate for an HTTPS load balancer can bow be specified by name. The corresponding certificate ID is then retrieved using the DO API at load balancer creation/update time and is used from then on.

So far, the certificate had to be specified using the '.../do-loadbalancer-certificate-id' annotation and this was automatically updated to reflect an ID change resulting from a certificate renewal. However if, after such a renewal, the service was re-created without re-fecthing the latest certificate ID, the service remained stuck waiting for its external IP.

This is for example very useful when deploying with a CD system such as Flux, where the deployment specification comes from a source repository. In that case, one would not expect having to update the source repository as a result of an automatic certificate renewal.

With this change, the source repository can specify the certificate by name so it won't have to be updated after the certificate is renewed. And a redeployment of the service will automatically fetch the current ID of the referenced certificate.

Using the 'service.beta.kubernetes.io/do-loadbalancer-certificate-name'
service annotation, the certificate for an HTTPS load balancer can bow
be specified by name. The corresponding certificate ID is then retrieved
using the DO API at load balancer creation/update time and is used from
then on.

So far, the certificate had to be specified using the
'.../do-loadbalancer-certificate-id' annotation and this was automatically
updated to reflect an ID change resulting from a certificate renewal.
However if, after such a renewal, the service was re-created without
re-fecthing the latest certificate ID, the service remained stuck
waiting for its external IP.

This is for example very useful when deploying with a CD system such as
Flux, where the deployment specification comes from a source repository.
In that case, one would not expect having to update the source
repository as a result of an automatic certificate renewal.

With this change, the source repository can specify the certificate by
name so it won't have to be updated after the certificate is renewed.
And a redeployment of the service will automatically fetch the current
ID of the referenced certificate.

Signed-off-by: David Verbeiren <david.verbeiren@tessares.net>
@timoreimann
Copy link
Collaborator

Apologies for not getting to your PR in time, @dverbeir -- we pretty much dropped the ball on this one. :(

On the upside, the feature was now implemented via #722 and is going to get shipped to all supported clusters in the near term.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants