-
Notifications
You must be signed in to change notification settings - Fork 133
feat: per-port protocol and certificates #985
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #985 +/- ##
==========================================
- Coverage 71.27% 68.25% -3.02%
==========================================
Files 22 22
Lines 3046 3141 +95
==========================================
- Hits 2171 2144 -27
- Misses 706 831 +125
+ Partials 169 166 -3
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
Hey, First of all, thank you very much for your contribution! Per-port specific configuration for load balancers is currently part of a broader discussion. This issue summarizes the situation quite well. As mentioned there, I’ll review the options for per-port configuration and draft a proposal to ensure a consistent experience. If the team agrees with the direction, we can move forward with the implementation, and I’ll revisit your PR at that point. The failing e2e tests on forks are expected. Best regards, |
|
I'm
Hey Lukas Thanks, and I'm happy to help with implementation. For the time being I've switched to proxy protocol which fits my use-case well (forwarding IP headers would be nice, but my Ingress supports this kind of termination). I've thought about this some more and if I were to move forward on this I'd probably rewrite this to maintain the same annotation names as upstream, but with an added port at the end of the name, eg. |
This will not work unfortunately, as there is only one slash allowed in the annotation to separate |
I think my main issue with my current approach is that it's fairly convoluted. We could use a different separation character for the port, since ultimately the actual separation character does not really matter. I think that's still a cleaner solution than encoding a map in annotations, even if the Kubernetes annotation spec specifically allows for structured data in annotations. I still think it should be human-readable. |
|
This PR has been marked as stale because it has not had recent activity. The bot will close the PR if no further action occurs. |
This PR implements #984
This change introduces two annotations:
load-balancer.hetzner.cloud/protocol-portsallows specifying a mapping of ports to their respective protocolload-balancer.hetzner.cloud/http-certificates-portsallows specifying a mapping of ports to one or more certificatesThis PR is in a draft state as the certificates part currently returns a 422 from the Hetzner API. I have an open ticket with the loadbalancer team about this. I can replicate this behaviour through the UI.