-
Notifications
You must be signed in to change notification settings - Fork 804
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deprecate kube-lego and document cert-manager usage #755
Changes from 2 commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -31,25 +31,7 @@ on HTTPS security see the certificates section of [this blog post](https://blog. | |
|
||
### Set up automatic HTTPS | ||
|
||
JupyterHub uses [Let's Encrypt](https://letsencrypt.org/) to automatically create | ||
HTTPS certificates for your deployment. This will cause your HTTPS certificate | ||
to automatically renew every few months. To enable this, make the following | ||
changes to your `config.yaml` file: | ||
|
||
1. Specify the two bits of information that we need to automatically provision | ||
HTTPS certificates - your domain name & a contact email address. | ||
|
||
```yaml | ||
proxy: | ||
https: | ||
hosts: | ||
- <your-domain-name> | ||
letsencrypt: | ||
contactEmail: <your-email-address> | ||
``` | ||
|
||
2. Apply the config changes by running `helm upgrade ...` | ||
3. Wait for about a minute, now your hub should be HTTPS enabled! | ||
Refer to the Advanced Topics section for Automatic HTTPS with cert-manager and [Let's Encrypt](https://letsencrypt.org/). | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I want to make sure that enabling letsencrypt remains the simplest and first recommended way to enable HTTPS. It shouldn't be moved to advanced topics. This https-enabling config that faces the users should ideally stay the same and the kube-lego->certmanager transition should be hidden from the user as much as possible. What's the impediment to doing this now? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Addressing this is mandatory and in my eyes what needs to be done before we can merge this. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Happy to add the simple command back to the security section. |
||
|
||
### Set up manual HTTPS | ||
|
||
|
This file was deleted.
This file was deleted.
This file was deleted.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you add the command that people should run with this yaml? Can't we integrate this into the z2jh chart?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can I think - we can declare it as a dependency.
I've done that for the z2jh-chart itself and built on top of it.
For reference: https://github.com/consideRatio/z2jh-extended/blob/master/z2jh-extended/requirements.yaml
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It is very likely the users already run or will run cert-manager cluster-wide, if using it. having it as a hard dependency and the issuer managed by us seems to complicate things.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@betatim just added the full command