-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Correct optional/omitempty indicator on webhook cabundle #70138
Conversation
/lgtm |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: lavalamp, liggitt The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Thanks for fixing the bug @liggitt . Does this pass the bar for cherry picking in previous versions? |
I wouldn't think so, since the issue can be worked around by including this in your manifest:
|
I'm not sure, this change is pretty small and it does fix a bug, I'd
probably approve a CP? If it depends on other larger changes then I'd agree
it's not a good candidate for a CP.
…On Wed, Oct 24, 2018 at 7:00 AM Jordan Liggitt ***@***.***> wrote:
Does this pass the bar for cherry picking in previous versions?
I wouldn't think so, since the issue can be worked around by including
this in your manifest: caBundle: ""
—
You are receiving this because you were assigned.
Reply to this email directly, view it on GitHub
<#70138 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AAngllzqMb2lMK9Ml2dMptwXhfkIBjZ1ks5uoHJtgaJpZM4X2Nu1>
.
|
@liggitt Do I understand correctly that with this PR merged in, an empty If so, how to explain that I end up with errors like |
no. an empty caBundle means the apiserver should use the system trust roots to verify the webhook's serving certificate. |
|
Oh! You mean certificates in |
It seems pretty inconvenient to me that a webhook without |
Yeah, or your platform's equivalent
It could, depending on your deployment. If an API server is running in an image and is the only thing in the image, injecting a cluster CA could make sense.
The CSR API does not guarantee a single signer, and does not guarantee what audiences accept certs obtained via it. See #69836 for a list of items that need further clarification before graduating that API. |
Thanks a bunch for the quick answers, it's much more clear now. One last question: would it make sense to modify the API server so that it internally check webhooks certificates against its own CA, on top of its system trusted roots? |
the API server doesn't have a CA... controllers running outside the API server as clients sign the CSR API objects the API server is given CA bundles for the following things:
falling back to system roots for verification of webhook serving certificates is more reasonable than using any of those |
What type of PR is this?
/kind bug
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #69590
Does this PR introduce a user-facing change?: