-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ Replace kube-rbac-proxy with controller-runtime metrics authentication/authorization #1475
✨ Replace kube-rbac-proxy with controller-runtime metrics authentication/authorization #1475
Conversation
✅ Deploy Preview for olmv1 ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
4349f0e
to
48dc64a
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #1475 +/- ##
==========================================
- Coverage 74.65% 74.13% -0.52%
==========================================
Files 42 42
Lines 3271 3329 +58
==========================================
+ Hits 2442 2468 +26
- Misses 653 679 +26
- Partials 176 182 +6
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
48dc64a
to
3487ab3
Compare
/hold This doesn't seem like a change that should be made after we've released 1.0.0-rc1. Let's wait until after we cut 1.0.0. |
3487ab3
to
a7ace73
Compare
This comment was marked as resolved.
This comment was marked as resolved.
Let's prioritize a design for this. I do not want to add any risk to our 1.0.0 in the final week after we've already released an RC. |
/hold |
938fb19
to
7e22db8
Compare
aaf8ce9
to
e3b9df9
Compare
a5d0cbc
to
1488a45
Compare
1488a45
to
423bf5d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/hold for @trgeiger to take a look as well |
…ontroller-runtime feature Utilise Controller-Runtime's WithAuthenticationAndAuthorization feature to protect the metrics endpoint. This approach provides access control, similar to the functionality of kube-rbac-proxy. kube-rbac-proxy image from gcr.io/kubebuilder/kube-rbac-proxy is deprecated and should no longer be used More info: kubernetes-sigs/kubebuilder#3907
423bf5d
to
fccc728
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
/hold false |
/hold cancel |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
10f0f77
This commit removes the use of the kube-rbac-proxy image and replaces it with metrics authentication/authorization provided by controller-runtime. The kube-rbac-proxy image is deprecated and will no longer be maintained, which introduces risks to production environments. For more details, see: kubernetes-sigs/kubebuilder#3907
PR for catalogd: operator-framework/catalogd#460
Motivation: #1509
Tests done locally
To ensure backwards compatibility
Create the clusterrolebinding
Create the TOKEN
Use curl to validate
Call the metrics:
Now, to validate the call with the certificates
Create the POD with the secret