Skip to content

Commit ee031b5

Browse files
Merge pull request #156 from xenit-eu/split-default-backend
split default backend and default path and rename blocked solr path to blocked paths
2 parents 5e9544a + fe12131 commit ee031b5

File tree

5 files changed

+34
-23
lines changed

5 files changed

+34
-23
lines changed

CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,10 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
66
chronology things are added/fixed/changed and - where possible - links to the PRs involved.
77

88
### Changes
9+
[v0.7.0]
10+
* rename blocked solr path to blocked paths
11+
* split default backend and default path
12+
913
[v0.6.9]
1014
* solve inconsistency with mq.serviceAnnotations
1115

README.md

Lines changed: 20 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -249,7 +249,6 @@ For more information take a look at
249249
* Default:
250250
```
251251
kubernetes.io/ingress.class: "nginx"
252-
cert-manager.io/cluster-issuer: "letsencrypt-production"
253252
```
254253
* Description: Annotations for ingress
255254
@@ -272,34 +271,44 @@ For more information take a look at
272271

273272
* Description: used to add more path to ingress under the same host name for new services
274273

275-
#### `ingress.defaultBackend.service`
274+
#### `ingress.defaultPath.service`
276275

277276
* Required: true
278277
* Default: nginx-default-service
279278
* Description: the default service name that ingress will point to
280279

281-
#### `ingress.defaultBackend.port`
280+
#### `ingress.defaultPath.port`
282281

283282
* Required: true
284283
* Default: 30000
285284
* Description: the default service port that ingress will point to
286285

287-
#### `ingress.defaultBackend.mapToRootOnly`
286+
#### `ingress.defaultBackend.service`
287+
288288
* Required: false
289-
* Default: true
290-
* Description: This setting (active by default) will disable the defaultBackend from the actual ingress rules and ONLY use the
291-
above defaultBackend settings to be mapped to the root `/` ingress rule.
292-
Setting this value to `false` will activate defaultBackend ingress setting. This will create a default, hostname independent, catch-all rule.
293-
This might be required if, for example on AWS, when an Internal loadbalancer is used that does not adhere to the hostname specific rules.
289+
* Default: None
290+
* Description: Setting this value will activate defaultBackend ingress setting. This will create a default, hostname
291+
independent, catch-all rule.
292+
This might be required if, for example on AWS, when an Internal loadbalancer is used that does not adhere to the
293+
hostname specific rules.
294+
295+
#### `ingress.defaultBackend.port`
296+
297+
* Required: false
298+
* Default: None
299+
* Description: Setting this value will activate defaultBackend ingress setting. This will create a default, hostname
300+
independent, catch-all rule.
301+
This might be required if, for example on AWS, when an Internal loadbalancer is used that does not adhere to the
302+
hostname specific rules.
294303

295-
#### `ingress.blockAcsSolrApi.enabled`
304+
#### `ingress.blockedPaths.enabled`
296305

297306
* Required: false
298307
* Default: `true`
299308
* Description: Enable 403 handler for alfresco api solr endpoints
300309

301310

302-
#### `ingress.blockAcsSolrApi.paths`
311+
#### `ingress.blockedPaths.paths`
303312

304313
* Required: false
305314
* Default:

xenit-alfresco/templates/ingress/alfresco-ingress.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ spec:
2020
# Provide a unique secret to store the SSL credentials
2121
secretName: tls-alfresco-{{ .Release.Name }}-secret
2222
{{- end }}
23-
{{- if not .Values.ingress.defaultBackend.mapToRootOnly }}
23+
{{- if .Values.ingress.defaultBackend }}
2424
defaultBackend:
2525
service:
2626
name: {{ .Values.ingress.defaultBackend.service }}
@@ -31,14 +31,14 @@ spec:
3131
- host: {{ required "A host where your alfresco services can be reached on must be specified in values.ingress.host" .Values.ingress.host }}
3232
http:
3333
paths:
34-
{{- if .Values.ingress.defaultBackend }}
34+
{{- if .Values.ingress.defaultPath }}
3535
- path: /
3636
pathType: Prefix
3737
backend:
3838
service:
39-
name: {{ .Values.ingress.defaultBackend.service }}
39+
name: {{ .Values.ingress.defaultPath.service }}
4040
port:
41-
number: {{ .Values.ingress.defaultBackend.port }}
41+
number: {{ .Values.ingress.defaultPath.port }}
4242
{{- end }}
4343
{{- if .Values.acs.ingress.enabled }}
4444
- path: /alfresco
@@ -76,8 +76,8 @@ spec:
7676
port:
7777
number: 30500
7878
{{- end }}
79-
{{- if .Values.ingress.blockAcsSolrApi.enabled }}
80-
{{- range .Values.ingress.blockAcsSolrApi.paths }}
79+
{{- if .Values.ingress.blockedPaths.enabled }}
80+
{{- range .Values.ingress.blockedPaths.paths }}
8181
- path: {{ . }}
8282
pathType: Prefix
8383
backend:

xenit-alfresco/templates/ingress/nginx-default-config.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ data:
2323
access_log off;
2424
return 200 '{"status":"UP"}';
2525
}
26-
{{- if .Values.ingress.blockAcsSolrApi.enabled -}}
27-
{{- range $.Values.ingress.blockAcsSolrApi.paths }}
26+
{{- if .Values.ingress.blockedPaths.enabled -}}
27+
{{- range $.Values.ingress.blockedPaths.paths }}
2828
location {{ . }} {
2929
return 403 'Forbidden';
3030
}

xenit-alfresco/values.yaml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,12 +22,10 @@ ingress:
2222
protocol: 'https'
2323
ingressAnnotations:
2424
kubernetes.io/ingress.class: "nginx"
25-
cert-manager.io/cluster-issuer: "letsencrypt-production"
26-
defaultBackend:
27-
mapToRootOnly: true
25+
defaultPath:
2826
service: nginx-default-service
2927
port: 30403
30-
blockAcsSolrApi:
28+
blockedPaths:
3129
enabled: true
3230
paths:
3331
- /alfresco/s/api/solr

0 commit comments

Comments
 (0)