Handle default certificate as listener SNI certificate#4708
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: VPC-byte The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Welcome @VPC-byte! |
|
Hi @VPC-byte. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Regular contributors should join the org to skip this step. Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
PR needs rebase. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What type of PR is this?
/kind bug
What this PR does / why we need it
When an HTTPS listener is configured with multiple ACM certificates, AWS treats the first listener certificate as the default certificate, but it does not always advertise that default certificate through SNI. This can make clients that depend on SNI matching fail unless users duplicate the default certificate in the extra certificate list manually.
This PR includes the listener default certificate in the desired extra/SNI certificate set, while deduplicating by certificate ARN so the existing duplicate-default workaround does not result in duplicate add requests.
Which issue(s) this PR fixes
Fixes #4090
Special notes for your reviewer
Opened as draft first because I commented on the issue asking whether maintainers prefer automatic reconciliation or an opt-in annotation. The current implementation follows the behavior requested in the issue and keeps duplicate handling idempotent.
Testing