-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Consume policy-server-root-ca Secret in auditScanner Cronjob #265
Conversation
This is done with a volumeMount. The `policy-server-root-ca` is created by the kubewarden-controller deployment, but only when there is a policy-server. This means that the first installation of kubearden-controller chart will deploy an audit-scanner cronjob that will continously fail, until there's a policy-server instantiated. This doesn't need to be this way, we can change the kubewarden-controller reconcile loop so it creates the ca secret without needing a policy-server first. Signed-off-by: Víctor Cuadrado Juan <[email protected]>
e2e tests fail expectedly, as they aren't consuming the yet unmerged changes needed for audit-scanner. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This mounts the contents of the entire secret into the Pod, that includes also the private key used by the CA, which is dangerous.
Please, project only the policy-server-root-ca.policy-server-root-ca-pem
into the pod.
This describes how to do that.
Signed-off-by: Víctor Cuadrado Juan <[email protected]>
Consumed the root-ca via the new |
Signed-off-by: Víctor Cuadrado Juan <[email protected]>
Tested to be working with |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for having done the changes I requested. LGTM
Description
Partial implementation of kubewarden/audit-scanner#64
Needs an audit-scanner image with kubewarden/audit-scanner#75
This is done with a volumeMount. The
policy-server-root-ca
is created by the kubewarden-controller deployment, but only when there is a policy-server. This means that the first installation of kubewarden-controller chart will deploy an audit-scanner cronjob that will continously fail, until there's a policy-server instantiated (normally when one installs the kubewarden-default chart).This doesn't need to be this way, we can change the kubewarden-controller reconcile loop so it creates the ca secret without needing a policy-server first.
Test
Tested locally, needs kubewarden/audit-scanner#75
Additional Information
Tradeoff
Potential improvement