Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: Fix Traefik TLS verification to front #390

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

fastlorenzo
Copy link
Collaborator

@fastlorenzo fastlorenzo commented Dec 27, 2024

This pull request introduces several changes fixing support for Traefik as an ingress controller and allowing the disabling of TLS verification between Traefik and the backend.

Documentation updates:

  • mailu/README.md: Added descriptions for new ingress settings, including ingress.type and ingress.traefik.insecureSkipVerify. [1] [2]

Configuration updates:

  • mailu/values.yaml: Introduced new parameters ingress.type and ingress.traefik.insecureSkipVerify to support Traefik and allow disabling TLS verification.

Template updates:

Fixes #368

@DrPsychick
Copy link

DrPsychick commented Dec 29, 2024

I tried this locally and it only worked when adding the following annotation to the mailu-front service. I removed all traefik annotations from the ingress and only added this one to the service.

    traefik.ingress.kubernetes.io/service.serverstransport: mailu-mailu@kubernetescrd

Also, helm warns about the serversTransport field:

W1229 15:25:16.280479   52728 warnings.go:70] unknown field "spec.ports[12].serversTransport"

@@ -18,6 +18,9 @@ metadata:
{{- if .Values.commonAnnotations }}
{{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
{{- end }}
{{- if and (eq .Values.ingress.type "traefik") .Values.ingress.enabled .Values.ingress.traefik.insecureSkipVerify }}
Copy link

@DrPsychick DrPsychick Dec 29, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is needed instead on the mailu-front service. Although it's also documented for Ingress: https://doc.traefik.io/traefik-hub/api-gateway/reference/routing/kubernetes/http/services/ref-svc-annotations

Also, the https/443 port on the mailu-front deployment should be enabled again, otherwise traefik refuses to link the ingress as the pod does not expose https

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[BUG] Ingress Template No Longer Works with Traefik
2 participants