Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VPA: Remove TLS client cert lookup logic #1692

Merged
merged 1 commit into from
Feb 22, 2019
Merged

VPA: Remove TLS client cert lookup logic #1692

merged 1 commit into from
Feb 22, 2019

Conversation

realdimas
Copy link
Contributor

Actual verification was turned off from the initial commit and is still not enabled, so the whole construct does not add value.

Also depending on requestheader-client-ca-file by itself renders VPA incompatible with apiserver installations which does not use such certificate with VPA Admission Controller crash-looping with:
vpa-admission-controller-X-Y:admission-controller F0214 18:15:09.448204 9 config.go:60] cannot find the ca.crt in the configmap, configMap.Data is map[string]string{"client-ca-file":"...skipped..."}

In addition to the above it worth noting that requestheader-client-ca-file appears to be just a wrong place to look for possible apiserver client certificate (I don't think there is any).

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels Feb 14, 2019
@realdimas realdimas changed the title Remove TLS client cert lookup logic VPA: Remove TLS client cert lookup logic Feb 14, 2019
@mwielgus
Copy link
Contributor

cc: @schylek

@mwielgus
Copy link
Contributor

Doesn't compile. Please fix.

Actual verification is already turned off in the code and appears to be
just a no-op.

Moreover, VPA Admission Controller (acting as TLS Server) does not
request client (apiserver, acting as TLS Client) to present certificate.

This code is fragile, depends on apiserver having
requestheader-client-ca-file certificate generated and supplied, and
most importantly does not add any security or any other value.
@realdimas
Copy link
Contributor Author

@mwielgus, thanks, cleaned up unused imports.

@mwielgus
Copy link
Contributor

@tkulczynski - I believe you are the one who implemented this. Could you please take a look at the PR? Is this code needed?

@schylek
Copy link
Contributor

schylek commented Feb 15, 2019

cc: @jbartosik

@jbartosik
Copy link
Collaborator

I'll take a look later today.

@jbartosik
Copy link
Collaborator

/lgtm
looks like dead code to me

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 22, 2019
@bskiba
Copy link
Member

bskiba commented Feb 22, 2019

Thanks @jbartosik!
/approve

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: bskiba

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 22, 2019
@k8s-ci-robot k8s-ci-robot merged commit 18b33e8 into kubernetes:master Feb 22, 2019
@realdimas realdimas deleted the clean-up-client-cert-lookup-code-in-vpa-admission-controller branch February 22, 2019 18:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/vertical-pod-autoscaler cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants