-
Notifications
You must be signed in to change notification settings - Fork 472
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Discuss domain match vs. wildcard match for listener hostnames #206
Comments
Couple things to clarify:
I do like the simplicity of Domain to describe and understand. |
A single level.
We could also introduce these sorts of matches with separate Wildcard or Regex match types (might be proxy-dependent implementations). |
James, in our conversation, I think you mentioned this to support subdomains as well. This is certainly a feature that users want.
I've seen people do this with headers and paths but (I daresay) never with host. |
If you have more than 1 level of wildcard, how do you select the right server certificate (since that is only allowed to match a single level)? |
I think our minds are on different tracks because of bad naming. |
On 9 Jun 2020, at 12:32 pm, Harry ***@***.***> wrote:
If you have more than 1 level of wildcard, how do you select the right server certificate (since that is only allowed to match a single level)?
I think our minds are on different tracks because of bad naming.
What I meant was (and maybe @bowei too) was that is it possible to do *.subdomain.example.com or not?
Yes. This would match “foo.subdomain.example.com” and “bar.subdomain.example.com”, but not “foo.bar.subdomain.example.com”.
|
A while ago I implemented a best match certificate function in our Kube-ingress-aws-controller and so I would like to ask how you would resolve multiple cert matches. Q2) Do you think these questions would have a defined answer and if so what would be the answers? My answers would be for Q2: newest wins, because of certificate rotation |
The Listener docs specify that these should be matched from most to least specific. https://github.com/kubernetes-sigs/service-apis/blob/master/apis/v1alpha1/gateway_types.go#L74-L80
AFAIK this isn't addressed anywhere in the API, so it's implementation-specific. |
Thanks for the answers! |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Fixed with #416 |
@hbagdi: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
In #193, we define a "Domain" match type to match a set of hostnames to a single domain name. The semantics of matching the "example.com" domain are the same as matching a TLS wildcard of "*.example.com" (i.e. a single leftmost domain label is wild).
In #193 there was some discussion that "wildcard" terminology was easier to understand. So we could consider changing this:
to this:
The text was updated successfully, but these errors were encountered: