-
Notifications
You must be signed in to change notification settings - Fork 202
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Mount CA bundles in Tekton components as well #648
Mount CA bundles in Tekton components as well #648
Conversation
The following is the coverage report on the affected files.
|
3640c35
to
76b1431
Compare
The following is the coverage report on the affected files.
|
76b1431
to
8a95b19
Compare
The following is the coverage report on the affected files.
|
/retest |
8a95b19
to
be51c09
Compare
The following is the coverage report on the affected files.
|
be51c09
to
0fef2a0
Compare
Prior to this commit, the CA bundles were: - mounted inside containers - exposed via VolumeMounts and SSL_CERT_DIR only in TaskRun pods via `pkg/reconciler/proxy/proxy.go` but were not exposed in Tekton components controllers like pipelines, triggers and chains via `pkg/reconciler/openshift/common/cabundle.go`. This meant that these Tekton components could not talk to internal OpenShift services or to hosts for which users added certificates to the cluster via CA bundles. One case where this is a problem is when the Chains controller wants to pull images from the internal OpenShift registry to sign and then push the signatures, attestations back to it since it does not have access to the Service CA Bundle. This commit abstracts away the exposure of certificates via Volumes, VolumeMounts and SSL_CERT_DIR in `pkg/reconciler/common/certificates.go` and makes this behavior the same for both TaskRuns and controllers which want to mount these certificates.
0fef2a0
to
d538041
Compare
The following is the coverage report on the affected files.
|
LGTM :) |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: vdemeester The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/lgtm |
Changes
Prior to this commit, the CA bundles were:
only in TaskRun pods via
pkg/reconciler/proxy/proxy.go
but were notexposed in Tekton components controllers like pipelines, triggers and
chains via
pkg/reconciler/openshift/common/cabundle.go
.This meant that these Tekton components could not talk to internal
OpenShift services or to hosts for which users added certificates to the
cluster via CA bundles.
One case where this is a problem is when the Chains controller wants to
pull images from the internal OpenShift registry to sign and then push
the signatures, attestations back to it since it does not have access to
the Service CA Bundle.
This commit abstracts away the exposure of certificates via Volumes,
VolumeMounts and SSL_CERT_DIR in
pkg/reconciler/common/certificates.go
and makes this behavior the same for both TaskRuns and controllers which
want to mount these certificates.
Submitter Checklist
These are the criteria that every PR should meet, please check them off as you
review them:
See the contribution guide for more details.