-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for wildcard ssl certificates #3
Comments
My problem is basically these two lines and the fact that crt and key are expected under a specific path bound to the host config of the specific service. It would be enough to make this somehow configurable
|
Hi @knx-am, yes I think we can add a specific label for this. If this label is not present we can fallback to the original value "{{ service['virtual_host'] }}" |
That would be much appreciated. Thank you 🙏 |
Hi @garutilorenzo, |
Hi @garutilorenzo, |
Hi @knx-am, |
Thank you but I think it should be 6.1.0 and not 1.10.6. The current dev version is still failing on startup with the same error |
Here is the link to the release notes: |
Hi @knx-am, this project uses docker-py module, not docker. |
Ah ok It's indeed very confusing. |
Hi @garutilorenzo,
first of all thank you very much for publishing this project. It's simple and effective and worked out of the box. Just like good solutions should be 💪
Is there a chance you could add support for wildcard ssl certificates?
I'm using the ssl-termination mode and would like to dynamically make multiple services in my cluster reachable through https using a single wildcard certificate covering *.my-domain
Ideally, it would be great if I could crate the secrets for cert and key only once and attach them to the ingress service only once initially and make the ingress service use those secrets for all domains (or maybe as a fallback if no secrets are found which exactly match the domain name? or maybe allow the services to specify which existing cert and key they would like to use among existing ones?)
My problem right now is that if I add a new service to my cluster (happens dynamically on a regular basis) and make it register a new domain, I have to create new secrets for it (using the same cert and key I'm already using for other services) and mount those new secrets to the ingress service (making its compose config longer), update the ingress service etc.
Does this make sense?
The text was updated successfully, but these errors were encountered: