Add --requestheader-allowed-names where necessary#214
Conversation
Adds --requestheader-allowed-names to RootShard, Shard and VirtualWorkspace deployments. k/k 1.35 requires --requestheader-allowed-names to be passed if --requestheader-client-ca-file and --client-ca-file point to the same cert. On-behalf-of: @SAP robert.vasek@sap.com Signed-off-by: Robert Vasek <robert.vasek@clyso.com>
|
Why did we not notice this through our canary tests? 🤔 |
|
LGTM label has been added. DetailsGit tree hash: 3841b9a76b1ef46c4a02274bad6811d84db1e312 |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: xrstf The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
@xrstf yeah we should definitely track this down, see what exactly happened for this bug to be here, and make sure this doesn't happen again. |
This is something we need to get to the bottom of before next release |
|
/cherry-pick release-0.7 |
|
@mjudeikis: new pull request created: #216 DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
For the record, this happened because the e2e tests in the operator are not perfectly replicating our contrib examples. In this case specifically, the custom self-signed CA that is used by the dekker examples is causing the issue (I suppose the operator creates in this case an unsuitable CABundle that triggers the issue). |
Adds --requestheader-allowed-names to RootShard, Shard and VirtualWorkspace deployments. k/k 1.35 requires --requestheader-allowed-names to be passed if --requestheader-client-ca-file and --client-ca-file point to the same cert. On-behalf-of: @SAP robert.vasek@sap.com Signed-off-by: Robert Vasek <robert.vasek@clyso.com>
Summary
Adds --requestheader-allowed-names to RootShard, Shard and VirtualWorkspace deployments.
k/k 1.35 requires --requestheader-allowed-names to be passed if --requestheader-client-ca-file and --client-ca-file point to the same cert, otherwise the apiserver exits with non-zero return code immediately.
What Type of PR Is This?
/kind bug
Related Issue(s)
Fixes kcp-dev/kcp#4032
Release Notes