-
Notifications
You must be signed in to change notification settings - Fork 10
Consider adding an admission control webhook sample deployment with '-include-unqualified' #32
Comments
Yeah, that's really a bug in I don't like recommending people run things in less secure configurations, but as we found out when we deployed our first admission control webhook, Kubernetes kinda forces them to. |
Good points. I looked into the It looks like you can specify either a I'll try with that today. I'm not so happy about Kudos for making this tool flexible enough to work with unqualified |
TL;DR - you correct, you have to have a TLS cert with a SAN entry for clientConfig:
service:
name: <name>
namespace: kube-system
path: "/mutate"
# vs
clientConfig:
url: https://<name>.kube-system.svc.cluster.local/mutate According to the API documentation
This matches the behavior kube-apiserver tries to lookup the name using non cluster aware DNS:
|
Specifically kube api server expects admission control webhooks to a have SAN entry for
<service-name>.kube-system.svc
Results in an issued cert with the necessary SAN entry for the "un-qualified"
<service-name>.kube-system.svc
:Without
-include-unqualified
kube-apiserver will reject the created certificate:The text was updated successfully, but these errors were encountered: