-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PodSecurity webhook makefile, image, and manifests #105923
PodSecurity webhook makefile, image, and manifests #105923
Conversation
@liggitt: This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
staging/src/k8s.io/pod-security-admission/webhook/manifests/deployment.yaml
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/pod-security-admission/webhook/manifests/secret.yaml
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/pod-security-admission/webhook/manifests/validatingwebhookconfiguration.yaml
Outdated
Show resolved
Hide resolved
b3698de
to
f309aed
Compare
addressed comments (and also renamed manifest files so they order correctly: namespace → configmap/serviceaccount rbac objects → deployment → service → webhook) |
f309aed
to
bf50d6c
Compare
/lgtm |
84db1f6
to
e1d11e0
Compare
since CI failed, I went ahead and pushed the additional fixups I was working on |
-t $(IMAGE):$(TAG) . | ||
@echo Done! | ||
|
||
# Creates a CA and serving certificate valid for webhook.pod-security-webhook.svc |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we add some sort of disclaimer here about how we don't recommend this approach for production use?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I mean... there's nothing necessarily wrong with the certs produced by this, but they'd need to wrap this in a process to periodically refresh them
staging/src/k8s.io/pod-security-admission/webhook/manifests/20-configmap.yaml
Outdated
Show resolved
Hide resolved
Change-Id: I719e7ce1efce9014e24903f0ad203a52a207f892
e1d11e0
to
09e9ba9
Compare
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: liggitt, tallclair The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What type of PR is this?
/kind feature
What this PR does / why we need it:
Builds on #105362 to address #105362 (comment)
make certs
target to generate the serving certificateWhich issue(s) this PR fixes:
Resolves #103559
Special notes for your reviewer:
Does this PR introduce a user-facing change?
/assign @tallclair
/cc @sejr