-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Helm: The insecure webhook (if running on 8080) is exposed through hard coded ports #5071
Comments
/help |
@ivankatliarchuk: GuidelinesPlease ensure that the issue body includes answers to the following questions:
For more details on the requirements of such an issue, please see here and ensure that they are met. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
One can see in webhook documentation:
For the exposed port, used for metrics and probes, it says:
The default parameters in CLI follow those guidelines. It says on
AFAIK, the chart follows those guidelines: it's using the exposed port for metrics and probes. Does that address your concerns ? |
I can add a little experience context when using the current chart Deployment and Service templates. For the external-dns-provider-adgaurd webhook provider, the I modified the chart locally to remove the inclusion of ports 8080 or 8888 from the Service and made the Deployment template render all ports defined in the provider Helm Chart values. The only path I can currently think of to keep backward compatibility (let the Chart work as it does today) and allow for more customization (as my chart variant does) is to include one or more boolean flags that would tell the chart templates to use the current path or allow the chart values to override that implementation. If this is acceptable, I can update the chart code and submit a PR. |
What happened:
As far as I understand, there is no authentication mechanism when using webhooks.
If that is true, then I believe the webhook port should not be exposed in the cluster (and the webhook can then listen on
127.0.0.1
or::1
).While the helm-chart allows for adding additional containers (through
extraContainers
), ports are not configurable throughprovider.webhook
What you expected to happen:
How to reproduce it (as minimally and precisely as possible):
values.yaml
Anything else we need to know?:
I believe the solution to this to be:
Environment:
external-dns --version
):The text was updated successfully, but these errors were encountered: