-
Notifications
You must be signed in to change notification settings - Fork 303
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: ssl-redirect on gce controller #51
Comments
From @hatemosphere on August 24, 2017 15:17 i would not expect it to work it any time soon. here is feature request for https redirection and it's almost 2 years old https://issuetracker.google.com/issues/35904733 |
From @tonglil on September 14, 2017 1:55 Another workaround is to run a proxy between GCLB and your app that checks the Or you can implement this in your app. This is a pretty commonly implemented header by most load balancers/cdns to identify client->proxy/lb connections. It will look like this:
In either case (workaround or some GCP solution), the request has already transmitted the data in plaintext over the internet so if that initial request had any sensitive data, it could already be sniffed. If you don't want that, you can use this GCE Ingress annotation to disable requests to port 80 completely:
|
Any updates on this? |
Best to track the the issue linked by hatemosphere: https://issuetracker.google.com/issues/35904733. Nothing can be done in this controller until it's supported upstream. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
For interested parties, please also look at https://googlecloudplatform.uservoice.com/forums/302616-load-balancing/suggestions/31951531-allow-http-to-redirect-to-https-automatically. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Amazing this is not implemented yet, it is a basic required functionality in a load balancer 2018. Even more amazing since Google is trying to push the web in the secure direction : https://www.theverge.com/2018/2/8/16991254/chrome-not-secure-marked-http-encryption-ssl |
Totally agree. It is ridiculous. Is there anything one could do to make this happen? Any open source project which could unblock this? It's the most wanted feature by an order of magnitude and nothing has been happening for ages. |
Using nginx ingress controller seems to be the best work around at the moment. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/reopen haven't heard that this is fixed... |
@dargmuesli: you can't re-open an issue/PR unless you authored it or you are assigned to it. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
it's not rotten, it's still important to do |
@bowei seems like you need to take action here |
@bowei please can you reopen this ticket, it seems no one else can and it's important to some of us |
Since the Google Issue Tracker issue is now dead I think it's a good time remind everyone that Chrome has now declared all HTTP websites as "not secure". https://www.eff.org/deeplinks/2018/07/google-chrome-now-marks-http-sites-not-secure I propose that the prioritization of this issue be bumped accordingly to avoid causing pain and confusion to end users who don't understand what "not secure" actually means in this context. |
Hi sorry, this issue should be frozen, sorry about it falling into the rotten status. |
This would certainly be a nice feature, given how common a pattern it is... but I must say it's not exactly difficult to accomplish other ways. If you have few backends, you can simply read the If your backends are unable to do this (or you'd rather have a cleaner separation of responsibilities), you can create one ingress that terminates HTTPS and forwards requests to your production backends; and another that listens on HTTP and simply returns a 301. Isn't this the idiomatic solution within a microservice architecture (which is what k8s promotes in the first place)? I wouldn't be surprised if this feature was never addressed, given the available solutions... but I think it would be helpful if the documentation were updated with a recommended solution, so this would look less like a glaring omission. |
I wonder if it was booked by this https://cloud.google.com/kubernetes-engine/docs/how-to/container-native-load-balancing and now maybe, finally it will be addressed |
The one thing I would love to see here (given that we are currently using kube mci — for multi-region load balancing on GKE which in turn relies on GCE-Ingress) is better documentation on how to run nGinx Ingress internally behind a GCE-Ingress. I haven't found anything on this other than people say it's possible. That said obviously (in my case) having 301s in GCE-Ingress would solve the entire issue meaning I don't need to worry about other services (and ingresses) behind GCE-Ingress. |
Any news on this from Google? At least a roadmap or some indication this is being worked on would be nice :) |
This would be a very nice feature to have built in. Another option is to also use Istio, but again it feels like a workaround for something that shouldn't even be a problem. |
We are in 2019, will we see this feature soon or should I come back in 2020? |
As ingress-gce exposes the underlying GCLB functionality, as commented before, please vote for the feature in GCLB: https://googlecloudplatform.uservoice.com/forums/302616-load-balancing/suggestions/31951531-allow-http-to-redirect-to-https-automatically |
This is an essential feature. I don't understand, why this isn't prioritised for so long. |
Yes, we need this update. |
This is a bit of a problem and support ( or solution ) for this must be added. tx |
Need that feature too It would be nice to have it. Thanks |
I poured hours into learning gke controller and then stumbled upon this issue - the technology is unusable without the feature. |
Why is this so hard for a web company to prioritize and implement? |
For anyone, who is looking for working solution to the redirect problem, this is a simplified conf file imported to the
|
In my company we use this But the question is not how to workaround the problem. |
Disappointing that google doesn't look at this as a critical feature, even the worst LB has this feature. |
Disappointing. HTTPS redirection and adding HTTPS support is so difficult in GKE. That's why AWS is leading the market. |
@ashish-oyo That is too true |
Google is working on it, expect alpha in 2019Q4 :) (see uservoice links) |
I followed @mike-marcacci 's suggestion and it works quite nicely. I can still leverage the nice features of GKE Ingress while redirecting http. The following code is terraform, hence the syntax. This is the mains service, where I force http.
This is a simple redirect service I wrote up my self that returns 301.
|
one of the only features that the everyday man needs in his ingress controller and fucking GOOGLE doesn't have it?! |
May be in 2021 :( Seriously Google, would love to find out why this essential feature hasn't been implemented in the ingress controller. Take some inspiration from AWS |
@SeriousAnt if you read this: They are already on closed alpha for load balancing. Maybe this feature became general available this year and maybe as you said in 2021 will be Alpha for GKE. By the way It would be nice to know how i can join for the Alpha load balancer. |
I think this can be closed in favour of #1075. Or the other way around. |
Closing in favor of #1075. |
From @smeruelo on August 18, 2017 15:1
Is there any plan to support
ingress.kubernetes.io/ssl-redirect
annotation on gce controller?If not, what's the recommended workaround for this? Examining headers is not always possible, since backend application is often out of our control.
Copied from original issue: kubernetes/ingress-nginx#1180
The text was updated successfully, but these errors were encountered: