-
Notifications
You must be signed in to change notification settings - Fork 2.8k
feat(cloudflare): change defaultCA from google to empty string #5453
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…tificateAuthority to not set the CertificateAuthority field in customHostnamesConfig
Welcome @henryjarend! |
Hi @henryjarend. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/ok-to-test |
Changing the default might be a breaking change for some users, don't you think? |
@vflaux so right now if the flag is omitted it'll default to google, however in the API itself if you omit that option it will let Cloudflare decide. I'll have to test if you add the flag but don't supply an option what that will result in. I wasn't sure of a better way to accomplish it but if you have any suggestions I'm all ears! |
Co-authored-by: Michel Loiseleur <[email protected]>
quickly testing this locally, if you pass in just the flag it will error saying |
This is a good one and we need it - the non-enterprise accounts got affected after adding I expect the PR to be safe, as the configuration parameter default/value change (from "google" to anything) should not update any existing custom hostnames and only get used when creating new custom hostnames. @henryjarend |
…ertificateAuthority
@mrozentsvayg thanks for the feedback. I talked with a colleague about using "none" vs "" and ended up landing on "" because it seemed strange to say that you weren't using a CA (ie none) vs not specifying a CA (ie ""). Happy to change this if you feel it would match more with the rest of the k8s ecosystem. I'm not sure I quite follow for the environment variable change. I did update the tests so that it expects no CA to be selected when that flag is omitted but it is possible to override it by passing in Thanks again for your time. |
Could be done either way, but consistently everywhere. As currently implemented - the
there are 3 related tests in |
works perfectly 👍 @henryjarend thanks a lot! |
/lgtm |
@mrozentsvayg: changing LGTM is restricted to collaborators In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mloiseleur The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Change the default Certificate Authority in custom hostnames config to be an empty string.
What does it do ?
Changing the default for CloudflareCustomHostnamesCertificateAuthority and adding an allowable empty string removes the configuration in the customHostnamesConfig which allows for custom hostnames to be used on more plan types than just enterprise.
Motivation
We don't have a cloudflare enterprise plan however we do have custom hostnames enabled and we'd like to be able to use the feature in external-dns without requiring a more expensive plan. This should close this issue
More