1. 04 Jun, 2020 1 commit
    • Geoff Simmons's avatar
      Bugfix: only act on delete TLS Secret if it's relevant to viking. · 2bf40a90
      Geoff Simmons authored
      For that, the Secret must be named as the TLS Secret by an Ingress
      in the same namespace that identifies out ingress.class.
      
      This means that the controller doesn't need to try delete an element
      from any PEM Secret (to remove the certificate from the haproxy
      Secret volume).
      2bf40a90
  2. 03 Jun, 2020 9 commits
  3. 02 Jun, 2020 2 commits
  4. 28 May, 2020 15 commits
  5. 22 May, 2020 2 commits
  6. 21 May, 2020 1 commit
  7. 20 May, 2020 2 commits
  8. 19 May, 2020 1 commit
    • Geoff Simmons's avatar
      Redefine the labels used to identify relevant Secrets. · 18abf575
      Geoff Simmons authored
      Use the label key viking.uplex.de/secret. The controller only reads
      Secrets with this label, and with the field type:kubernetes.io/tls
      (the latter are Secrets specified for Ingress).
      
      Three values are permitted for the label:
      
      admin: credentials for remote admin of Varnish and haproxy (Varnish
      shared secret and Basic Auth password for the dataplane API).
      
      pem: initially empty Secret into which the controller writes pem
      files (concatenated crt and key), projected into a volume from
      which haproxy reads at load time. Currently only with the hard-
      wired name "tls-cert", so that RBAC update privileges can be
      limited to this Secret.
      
      auth: credentials for Basic and Proxy Auth, as configured via
      the VarnishConfig custom resource.
      18abf575
  9. 18 May, 2020 1 commit
  10. 15 May, 2020 6 commits