Compare commits

...

1 Commits

Author SHA1 Message Date
afd
141ea26931 Support multiple http-proxy entries in a single deployment
All checks were successful
Lint Checks / Run linter (push) Successful in 15s
Previously get_ingress() only used the first http-proxy entry,
silently ignoring additional hostnames. Now iterates over all
entries, creating an Ingress rule and TLS config per hostname.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-10 00:38:41 -05:00
2 changed files with 61 additions and 55 deletions

View File

@ -144,66 +144,70 @@ class ClusterInfo:
return nodeports return nodeports
def get_ingress( def get_ingress(
self, use_tls=False, certificate=None, cluster_issuer="letsencrypt-prod" self, use_tls=False, certificates=None, cluster_issuer="letsencrypt-prod"
): ):
# No ingress for a deployment that has no http-proxy defined, for now # No ingress for a deployment that has no http-proxy defined, for now
http_proxy_info_list = self.spec.get_http_proxy() http_proxy_info_list = self.spec.get_http_proxy()
ingress = None ingress = None
if http_proxy_info_list: if http_proxy_info_list:
# TODO: handle multiple definitions
http_proxy_info = http_proxy_info_list[0]
if opts.o.debug:
print(f"http-proxy: {http_proxy_info}")
# TODO: good enough parsing for webapp deployment for now
host_name = http_proxy_info["host-name"]
rules = [] rules = []
tls = ( tls = [] if use_tls else None
[
client.V1IngressTLS( for http_proxy_info in http_proxy_info_list:
hosts=certificate["spec"]["dnsNames"]
if certificate
else [host_name],
secret_name=certificate["spec"]["secretName"]
if certificate
else f"{self.app_name}-tls",
)
]
if use_tls
else None
)
paths = []
for route in http_proxy_info["routes"]:
path = route["path"]
proxy_to = route["proxy-to"]
if opts.o.debug: if opts.o.debug:
print(f"proxy config: {path} -> {proxy_to}") print(f"http-proxy: {http_proxy_info}")
# proxy_to has the form <service>:<port> host_name = http_proxy_info["host-name"]
proxy_to_port = int(proxy_to.split(":")[1]) certificate = (certificates or {}).get(host_name)
paths.append(
client.V1HTTPIngressPath( if use_tls:
path_type="Prefix", tls.append(
path=path, client.V1IngressTLS(
backend=client.V1IngressBackend( hosts=certificate["spec"]["dnsNames"]
service=client.V1IngressServiceBackend( if certificate
# TODO: this looks wrong else [host_name],
name=f"{self.app_name}-service", secret_name=certificate["spec"]["secretName"]
# TODO: pull port number from the service if certificate
port=client.V1ServiceBackendPort(number=proxy_to_port), else f"{self.app_name}-{host_name}-tls",
) )
), )
paths = []
for route in http_proxy_info["routes"]:
path = route["path"]
proxy_to = route["proxy-to"]
if opts.o.debug:
print(f"proxy config: {path} -> {proxy_to}")
# proxy_to has the form <service>:<port>
proxy_to_port = int(proxy_to.split(":")[1])
paths.append(
client.V1HTTPIngressPath(
path_type="Prefix",
path=path,
backend=client.V1IngressBackend(
service=client.V1IngressServiceBackend(
# TODO: this looks wrong
name=f"{self.app_name}-service",
# TODO: pull port number from the service
port=client.V1ServiceBackendPort(
number=proxy_to_port
),
)
),
)
)
rules.append(
client.V1IngressRule(
host=host_name,
http=client.V1HTTPIngressRuleValue(paths=paths),
) )
) )
rules.append(
client.V1IngressRule(
host=host_name, http=client.V1HTTPIngressRuleValue(paths=paths)
)
)
spec = client.V1IngressSpec(tls=tls, rules=rules) spec = client.V1IngressSpec(tls=tls, rules=rules)
ingress_annotations = { ingress_annotations = {
"kubernetes.io/ingress.class": "caddy", "kubernetes.io/ingress.class": "caddy",
} }
if not certificate: if not certificates:
ingress_annotations["cert-manager.io/cluster-issuer"] = cluster_issuer ingress_annotations["cert-manager.io/cluster-issuer"] = cluster_issuer
ingress = client.V1Ingress( ingress = client.V1Ingress(

View File

@ -321,17 +321,19 @@ class K8sDeployer(Deployer):
http_proxy_info = self.cluster_info.spec.get_http_proxy() http_proxy_info = self.cluster_info.spec.get_http_proxy()
# Note: we don't support tls for kind (enabling tls causes errors) # Note: we don't support tls for kind (enabling tls causes errors)
use_tls = http_proxy_info and not self.is_kind() use_tls = http_proxy_info and not self.is_kind()
certificate = ( certificates = None
self._find_certificate_for_host_name(http_proxy_info[0]["host-name"]) if use_tls:
if use_tls certificates = {}
else None for proxy in http_proxy_info:
) host_name = proxy["host-name"]
if opts.o.debug: cert = self._find_certificate_for_host_name(host_name)
if certificate: if cert:
print(f"Using existing certificate: {certificate}") certificates[host_name] = cert
if opts.o.debug:
print(f"Using existing certificate for {host_name}: {cert}")
ingress = self.cluster_info.get_ingress( ingress = self.cluster_info.get_ingress(
use_tls=use_tls, certificate=certificate use_tls=use_tls, certificates=certificates
) )
if ingress: if ingress:
if opts.o.debug: if opts.o.debug: