Check Kubernetes cluster endpoint for defining the ssl_ca_cert #5143
+107
−1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This is a follow up in the Kubernetes service implementation for running untrusted jobs.
The current implementation was working for dev environment because the K8s cluster is set there with default configurations.
During the rollout for the external project, the cluster needed to be created with security rules, and one of them is having a private ip, and set the DNS to resolve both internal and external ips.
As the endpoint for this cluster is a name (defined by the dns) and not a ip, we shouldn't set the ssl certificate, as the authentication will be managed by the DNS.
This PR updates the load credentials function to check the cluster endpoint and only set the ssl cert if the endpoint is a ip.