You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Problem: The configuration for the `site` directory didn't have a
standard name and wasn't getting picked up by markdownlint-cli. The
Makefile was also referencing .markdownlint.yaml that doesn't exist.
Also the configuration for .pre-commit-config.yaml was invalid and the
autoupdate wasn't working correctly.
Solution: Change the name of the configuration to a standard one that
can be used automatically be the tool.
Update pre-commit config and Makefile and run the linter to fix the
existing problems.
Copy file name to clipboardExpand all lines: site/content/how-to/traffic-management/integrating-cert-manager.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -33,8 +33,8 @@ At a high level, the process looks like this:
33
33
1. We create a gateway resource for our domain (cafe.example.com) and configure cert-manager integration using an annotation.
34
34
1. This starts the certificate issuance process – cert-manager contacts Let’s Encrypt to obtain a certificate, and Let’s Encrypt starts the ACME challenge. As part of this challenge, cert-manager creates a temporary HTTPRoute resource which directs the traffic through NGINX Gateway Fabric to verify we control the domain name in the certificate request.
35
35
1. Once the domain has been verified, the certificate is issued. Cert-manager stores the keypair in a Kubernetes secret that is referenced by the gateway resource. As a result, NGINX is configured to terminate HTTPS traffic from clients using this signed keypair.
36
-
1. We deploy our application and our HTTPRoute which defines our routing rules. The routing rules defined configure NGINX to direct requests to https://cafe.example.com/coffee to our coffee-app application, and to use the HTTPS listener defined in our gateway resource.
37
-
1. When the client connects to https://cafe.example.com/coffee, the request is routed to the coffee-app application and the communication is secured using the signed keypair contained in the cafe-secret secret.
36
+
1. We deploy our application and our HTTPRoute which defines our routing rules. The routing rules defined configure NGINX to direct requests to `https://cafe.example.com/coffee` to our coffee-app application, and to use the HTTPS listener defined in our gateway resource.
37
+
1. When the client connects to `https://cafe.example.com/coffee`, the request is routed to the coffee-app application and the communication is secured using the signed keypair contained in the cafe-secret secret.
38
38
1. The certificate will be automatically renewed when it is close to expiry, the secret will be updated using the new certificate, and NGINX Gateway Fabric will dynamically update the keypair on the filesystem used by NGINX for HTTPS termination once the secret is updated.
39
39
40
40
## Securing Traffic
@@ -205,7 +205,7 @@ spec:
205
205
206
206
## Testing
207
207
208
-
To test everything has worked correctly, we can use curl to the navigate to our endpoint, for example, https://cafe.example.com/coffee. To verify using curl, we can use the `-v` option to increase verbosity and inspect the presented certificate.
208
+
To test everything has worked correctly, we can use curl to the navigate to our endpoint, for example, `https://cafe.example.com/coffee`. To verify using curl, we can use the `-v` option to increase verbosity and inspect the presented certificate.
0 commit comments