-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Incomplete helm chart #129
Comments
I am not sure how to reproduce the missing permissions w.r.t the The |
Sorry for the late reply, I re-tried it from my side from scratch and indeed the As for the missing /validate-token access role, I can provide a PR for it. I have an additional question related to the webhook kubeconfig part, I was wondering what is your recommended way to manage the client certificate for the hook. One can make use of cert-manager as it's already supported by the chart and thus I was wondering if a |
Sure, I guess this will be a nice addition.
IMO it strongly depends on the setup. Ideally the OWA is deployed in the same cluster it works for so and can use its own serviceaccount in order to also authenticate and authorize itself against that cluster. In the charts we have a support for token projection Line 146 in 180d838
If that is not the case and OWA is deployed outside the cluster then different auth options are possible. Basically everything that can be used to auth against a
I think this is only valid for the case in which OWA is deployed in the cluster it works for? If that is the case then I would recommend using the service account token volume projected + the respective kubeconfig (I found a comment from some time ago that includes a similar kubeconfig)). My knowledge of cert manager is limited so this is my guess. |
Going through all of this, I am still missing something. If I have understood things correctly, the most simple of deployment with the chart is using the following:
Is it correct ? Using the above triggers an error due missing PEM data. If using: the webhook seems to start properly however what I currently fail to do is to write the webhook configuration file that will be used by the kube-apiserver. I am running Kubernetes version is 1.27.2 through Docker Desktop
From your comment as well as the So my next questions are:
|
No, If
This should work but then you have to provide the Then the |
That's were I think I might be missing something with regard to the service account variant. I tried to deploy the hook using it however, I did not find the correct way to configure things to work properly with it. How would the hook configuration that must be passed to I agree that |
There are a lot of deployment variants and is difficult for me to determine what exactly is the issue with your setup. As I mentioned
should work and the only thing left to do is to supply the
There is a basic support for integrating with |
I just realized that what I wrote was misleading, sorry. There's no new code involved except a small change in the chart. What I meant was that I added the option to create a client certificate as part of the deployment when cert-manager is enabled. The certificate, key and CA can then be retrieved and used for the authentication. I'll prepare a patch with the corresponding documentation. |
What happened:
The webhook fails to operate when using the helm chart to deploy it.
What you expected to happen:
To have a fully functional webhook.
How to reproduce it (as minimally and precisely as possible):
Anything else we need to know:
Based on the helm chart and the content of the
config/samples
folder, it seems that the chart is incomplete with regard to the roles and bindings created. The role and binding to create SubjectAccessReviews is missing as well as a role to allow access the/validate-token
non resource URL.Environment:
macOS with Docker Desktop cluster
Linux with kubeadm based cluster
The text was updated successfully, but these errors were encountered: