You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To create a secure route, specify the TLS termination of the route in a JSON
49
50
file.
50
51
51
-
.An Unsecure Route
52
+
.An Unsecured Route
52
53
====
53
54
54
55
----
@@ -96,7 +97,7 @@ file.
96
97
----
97
98
====
98
99
99
-
.An Unsecure Route with a Path:
100
+
.An Unsecured Route with a Path:
100
101
====
101
102
102
103
----
@@ -119,10 +120,16 @@ file.
119
120
120
121
====
121
122
122
-
Unsecure routes are likely faster to set up, as they are the default configuration, but secure routes offer greater security for information to remain private.
123
+
Unsecured routes are can be faster to set up, as they are the default
124
+
configuration, but secure routes offer greater security for information to
125
+
remain private.
123
126
124
-
== Path Based Routes
125
-
Path based routes specify a path component that can be compared against a URL. This implies that the traffic for the route is HTTP based. Routers should match routes based on the most specific path to the least. However, this depends on your implementation. The following table shows example routes and their accessibility:
127
+
== Path-Based Routes
128
+
Path-based routes specify a path component that can be compared against a URL,
129
+
implying that the traffic for the route is HTTP based. Routers should match
130
+
routes based on the most specific path to the least. However, this depends on
131
+
your implementation. The following table shows example routes and their
132
+
accessibility:
126
133
127
134
////
128
135
* For a route with \_www.example.com/test_:
@@ -155,23 +162,24 @@ Path based routes specify a path component that can be compared against a URL. T
155
162
|===
156
163
157
164
== Securing Routes
158
-
You can create a secure route to your pods by specifying the TLS termination of
159
-
the route and, optionally, providing certificates.
165
+
Create a secure route to your pods by specifying the TLS termination of the
166
+
route and, optionally, providing certificates.
160
167
161
-
NOTE: Currently, TLS termination in OpenShift Beta relies on SNI for serving
168
+
[NOTE]
169
+
Currently, TLS termination in OpenShift Beta relies on SNI for serving
162
170
custom certificates. Any non-SNI traffic received on port 443 has TLS
163
171
termination with a generic certificate. In the future, the ability to create
164
172
custom front ends within the router will allow all traffic to serve custom
165
173
certificates.
166
174
167
-
By default, OpenShift routes are unsecure, but can be set to any of the
175
+
By default, OpenShift routes are unsecured, but can be set to any of the
168
176
following three types of secure TLS termination.
169
177
170
178
[[edge-termination]]
171
179
*Edge Termination*
172
180
173
181
With edge termination, TLS termination occurs prior to traffic reaching its
174
-
destination. TLS certificates are served by the frontend of the router.
182
+
destination. TLS certificates are served by the front-end of the router.
175
183
176
184
You can configure edge termination on your route by specifying the following:
0 commit comments