-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(appProtocol): ensure appProtocol can be valid without invalidating probes #276
Conversation
86a9180
to
72eb74d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this PR. The changes make sense to me.
However, I think they could potentially break for example custom ingresses that select the service port by name, is this correct?
It's basically not an issue to release a new major, but we should add a migration path to the README.md. Do you think there are other things that could break @rawkode?
I'm currently working on getting Zitadel to work with the Gateway API, backed by traefik. I exactly need this change. My problem is, that traefik complains, that it cannot handle the |
My workaround for Flux:
|
It's a break for anyone that isn't using the Ingress object provisioned by the chart, yes. As a safer resolution, we could roll a new variable for |
Let's do that. It would also nicely align with the k8s terminology. |
6bf2116
to
0fb3dd5
Compare
0fb3dd5
to
0263657
Compare
Ready for you @eliobischof |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks fixing this @rawkode 🙏
If you'd like to have a small gift, please send us a mail to [email protected]
This change broke my environments using gateway-api. Service export \ import attach to the service which configures the Load Balancers in GKE. The error was "Client sent an HTTP request to an HTTPS server." I am investigating how to fix using gateway-api MultiClusterIngress and will report back my findings. |
The chart doesn't support the Gateway API, so that's a little strange. Can you share your additional manifest? Happy to help debug. |
It appears all I had to do to fix my issue was to change .Values.zitadel.service.protocol to .Values.zitadel.service.appProtocol. Because appProtocol was not specified, it was changing the manifest to "appProtocol: kubernetes.io/h2c" which caused the break. Using appProtocol in values now properly set appProtocol: http2 in the service manifest like before. Old:
New:
|
The appProtocol and the named ports for probes are very different things. The PR that added this together was didn't consider the valid values for appProtocol and how these aren't valid names for ports.
As per the Kubernetes documentation, the appProtocol:
Definition of Ready