Skip to content

Commit

Permalink
Merge pull request #1845 from Miciah/OCPBUGS-31666-route-fix-insecure…
Browse files Browse the repository at this point in the history
…EdgeTerminationPolicy-default

OCPBUGS-31666: route: Fix insecureEdgeTerminationPolicy default
  • Loading branch information
openshift-merge-bot[bot] committed Apr 25, 2024
2 parents cb0966a + b9885cc commit 8203151
Show file tree
Hide file tree
Showing 11 changed files with 51 additions and 31 deletions.
2 changes: 1 addition & 1 deletion openapi/generated_openapi/zz_generated.openapi.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion openapi/openapi.json
Expand Up @@ -34626,7 +34626,7 @@
"$ref": "#/definitions/com.github.openshift.api.route.v1.LocalObjectReference"
},
"insecureEdgeTerminationPolicy": {
"description": "insecureEdgeTerminationPolicy indicates the desired behavior for insecure connections to a route. While each router may make its own decisions on which ports to expose, this is normally port 80.\n\n* Allow - traffic is sent to the server on the insecure port (edge/reencrypt terminations only) (default). * None - no traffic is allowed on the insecure port. * Redirect - clients are redirected to the secure port.",
"description": "insecureEdgeTerminationPolicy indicates the desired behavior for insecure connections to a route. While each router may make its own decisions on which ports to expose, this is normally port 80.\n\nIf a route does not specify insecureEdgeTerminationPolicy, then the default behavior is \"None\".\n\n* Allow - traffic is sent to the server on the insecure port (edge/reencrypt terminations only).\n\n* None - no traffic is allowed on the insecure port (default).\n\n* Redirect - clients are redirected to the secure port.",
"type": "string"
},
"key": {
Expand Down
8 changes: 6 additions & 2 deletions route/v1/generated.proto

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

8 changes: 6 additions & 2 deletions route/v1/types.go
Expand Up @@ -447,8 +447,12 @@ type TLSConfig struct {
// insecureEdgeTerminationPolicy indicates the desired behavior for insecure connections to a route. While
// each router may make its own decisions on which ports to expose, this is normally port 80.
//
// * Allow - traffic is sent to the server on the insecure port (edge/reencrypt terminations only) (default).
// * None - no traffic is allowed on the insecure port.
// If a route does not specify insecureEdgeTerminationPolicy, then the default behavior is "None".
//
// * Allow - traffic is sent to the server on the insecure port (edge/reencrypt terminations only).
//
// * None - no traffic is allowed on the insecure port (default).
//
// * Redirect - clients are redirected to the secure port.
//
// +kubebuilder:validation:Enum=Allow;None;Redirect;""
Expand Down
Expand Up @@ -519,10 +519,12 @@ spec:
description: "insecureEdgeTerminationPolicy indicates the desired
behavior for insecure connections to a route. While each router
may make its own decisions on which ports to expose, this is
normally port 80. \n * Allow - traffic is sent to the server
on the insecure port (edge/reencrypt terminations only) (default).
* None - no traffic is allowed on the insecure port. * Redirect
- clients are redirected to the secure port."
normally port 80. \n If a route does not specify insecureEdgeTerminationPolicy,
then the default behavior is \"None\". \n * Allow - traffic
is sent to the server on the insecure port (edge/reencrypt terminations
only). \n * None - no traffic is allowed on the insecure port
(default). \n * Redirect - clients are redirected to the secure
port."
enum:
- Allow
- None
Expand Down
10 changes: 6 additions & 4 deletions route/v1/zz_generated.crd-manifests/routes-Default.crd.yaml
Expand Up @@ -507,10 +507,12 @@ spec:
description: "insecureEdgeTerminationPolicy indicates the desired
behavior for insecure connections to a route. While each router
may make its own decisions on which ports to expose, this is
normally port 80. \n * Allow - traffic is sent to the server
on the insecure port (edge/reencrypt terminations only) (default).
* None - no traffic is allowed on the insecure port. * Redirect
- clients are redirected to the secure port."
normally port 80. \n If a route does not specify insecureEdgeTerminationPolicy,
then the default behavior is \"None\". \n * Allow - traffic
is sent to the server on the insecure port (edge/reencrypt terminations
only). \n * None - no traffic is allowed on the insecure port
(default). \n * Redirect - clients are redirected to the secure
port."
enum:
- Allow
- None
Expand Down
Expand Up @@ -519,10 +519,12 @@ spec:
description: "insecureEdgeTerminationPolicy indicates the desired
behavior for insecure connections to a route. While each router
may make its own decisions on which ports to expose, this is
normally port 80. \n * Allow - traffic is sent to the server
on the insecure port (edge/reencrypt terminations only) (default).
* None - no traffic is allowed on the insecure port. * Redirect
- clients are redirected to the secure port."
normally port 80. \n If a route does not specify insecureEdgeTerminationPolicy,
then the default behavior is \"None\". \n * Allow - traffic
is sent to the server on the insecure port (edge/reencrypt terminations
only). \n * None - no traffic is allowed on the insecure port
(default). \n * Redirect - clients are redirected to the secure
port."
enum:
- Allow
- None
Expand Down
Expand Up @@ -519,10 +519,12 @@ spec:
description: "insecureEdgeTerminationPolicy indicates the desired
behavior for insecure connections to a route. While each router
may make its own decisions on which ports to expose, this is
normally port 80. \n * Allow - traffic is sent to the server
on the insecure port (edge/reencrypt terminations only) (default).
* None - no traffic is allowed on the insecure port. * Redirect
- clients are redirected to the secure port."
normally port 80. \n If a route does not specify insecureEdgeTerminationPolicy,
then the default behavior is \"None\". \n * Allow - traffic
is sent to the server on the insecure port (edge/reencrypt terminations
only). \n * None - no traffic is allowed on the insecure port
(default). \n * Redirect - clients are redirected to the secure
port."
enum:
- Allow
- None
Expand Down
Expand Up @@ -448,10 +448,12 @@ spec:
description: "insecureEdgeTerminationPolicy indicates the desired
behavior for insecure connections to a route. While each router
may make its own decisions on which ports to expose, this is
normally port 80. \n * Allow - traffic is sent to the server
on the insecure port (edge/reencrypt terminations only) (default).
* None - no traffic is allowed on the insecure port. * Redirect
- clients are redirected to the secure port."
normally port 80. \n If a route does not specify insecureEdgeTerminationPolicy,
then the default behavior is \"None\". \n * Allow - traffic
is sent to the server on the insecure port (edge/reencrypt terminations
only). \n * None - no traffic is allowed on the insecure port
(default). \n * Redirect - clients are redirected to the secure
port."
enum:
- Allow
- None
Expand Down
Expand Up @@ -460,10 +460,12 @@ spec:
description: "insecureEdgeTerminationPolicy indicates the desired
behavior for insecure connections to a route. While each router
may make its own decisions on which ports to expose, this is
normally port 80. \n * Allow - traffic is sent to the server
on the insecure port (edge/reencrypt terminations only) (default).
* None - no traffic is allowed on the insecure port. * Redirect
- clients are redirected to the secure port."
normally port 80. \n If a route does not specify insecureEdgeTerminationPolicy,
then the default behavior is \"None\". \n * Allow - traffic
is sent to the server on the insecure port (edge/reencrypt terminations
only). \n * None - no traffic is allowed on the insecure port
(default). \n * Redirect - clients are redirected to the secure
port."
enum:
- Allow
- None
Expand Down
2 changes: 1 addition & 1 deletion route/v1/zz_generated.swagger_doc_generated.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

0 comments on commit 8203151

Please sign in to comment.