-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Default TLS for BentoDeployment model servers #116
base: main
Are you sure you want to change the base?
Conversation
Thank you! You have done a great job! |
cool, lmk if you want to change anything, this is an important feature for us |
How about adding a relevant e2e test? |
okay I will see what I can do when I find the time, where do I put this, somewhere here I suppose? |
Hey just finished with the tests, I tested everything locally. Because of your triage job I have no way of testing it your GH action setup, but I can vouch that "it works on my machine" 😄 with the image I built locally. Hope you find it to your liking.
TIA for your time reviewing this ❤️ |
You are amazing, this PR is too professional! |
/run-e2e Update: You can check the progress here |
hmmm, it's still running on the old test setup though, you need to set it up to use the new github actions |
Can you work on a separate PR for .github/workflows? The current mechanism is that only .github/workflows under the main branch can be used to execute github actions |
CI related PR has been merged. |
3051336
to
bd452ba
Compare
add ingress tls options to configmap refactor, allow auto vs static modes adapt helm chart to changes renamt to secret name add validations fix helm validation parametrize tls mode in quick installation script test installation with ingress validate ingress/tls behaviour add ingress test action default installtion tls mode should be none use my image make kind ingress compatible need an example where ingress is enabled polish test code rename example with ingress fix template condition commit before we delete it delete env vars for local testing make sure configmap is refreshed add gh action for all three modes for 1-26 we need the kind cluster config too fix lynt issues fix lint Signed-off-by: David van der Spek <[email protected]>
@yetone This PR has been rebased on main so it should be possible to run the e2e test now. |
/run-e2e |
Signed-off-by: David van der Spek <[email protected]>
/run-e2e |
@yetone It looks like the e2e is erroring on waiting for the |
Could it be that the current e2e test is a bit flaky? |
@davidspek You may need to change the configuration of the kind cluster so that it installs loadbalancer. |
/run-e2e |
/run-e2e |
Sorry @yetone I was away on vacation the past few weeks. Had you already tried updating the kind config to add the load balancer before rerunning the E2E tests? Or is there something we should do on our end? |
Similar to #123 |
Closes #87
This feature allows the yatai-deployment controller to add TLS config to the ingress of a Bento deployment through added parameters to the
network
ConfigMap.Previously this was only possible by adding the ingress TLS config to the BentoDeployment CRD, which limited the usability of the UI.
(Cert-manager dedicated ingress annotations could be added through the
network
ConfigMap, but the ingress TLS config with host and secretName had to be set manually in the CRD.)Changes
ingress-tls-mode
field tonetwork
ConfigMapingress-static-tls-secret
field tonetwork
ConfigMapingress-tls-mode
fieldSetup can be validated using this image
rauerhans/yatai-deployment:1.1.12
in the
yatai-deployment
deployment and playing by adding the new fields to thenetwork
ConfigMap.Functionality
Depending on the new
ingress-tls-mode
field in thenetwork
ConfigMap, the controller will add the TLS config (hosts
is reused,secretName
is inferred, based on setting) to the ingress of the Bento deployment.none
, the controller will not add any TLS config to the ingress, as previously.static
, the controller will reference to a wildcard certificate to the ingress of the Bento deployment.auto
, reuse the name of the BentoDeployment CRD for the name of the TLS secret. This is useful in a scenario where the user wants to use cert-manager to generate a certificate for the ingress of the Bento deployment, so in addition you would have the appropriate annotations in thenetwork
ConfigMap, see below.Mode: None
As previously, only way to add TLS is through the field in the deployment CRD.
Mode: Static
The controller will create a wildcard certificate for each deployment.
Mode: Auto
Use default annotations to add TLS to ingress through cert-manager.
Results in a concrete TLS secret for each Bento deployment.