-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Do not risk exposing unauthenticated webhook port on container #4691
Do not risk exposing unauthenticated webhook port on container #4691
Conversation
Hi @kimsondrup. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
6f78028
to
0c65d72
Compare
0c65d72
to
313b362
Compare
/ok-to-test |
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In addition to the inline question, shouldn't the webhook be providing both a /livez
and a /readyz
endpoint instead of a /healthz
endpoint to follow the K98s idiomatic pattern?
@mloiseleur there seems to be a large number of webhook changes coming in to the Helm chart, I thought this had all been heavily tested outside of the chart before the PR to add it? I was also under the impression that it had been tested locally before it was added?
I don't think it matters much at the current moment as the base external-dns serves only a /healthz probe. You might want to create an additional PR to bring us within this pattern @stevehipwell . It also wouldn't cause much of a problem to add these probes as it is a simple addition. I already have it implemented on the external-dns-unifi-webhook, but at a quick glance a couple webhook providers are only supplying the /healthz probe. |
313b362
to
ae02543
Compare
Since External DNS webhook only receive traffic from metrics scraping on the pod IP and its webhook API on localhost an separate endpoints for readiness probe will not add much value if any at all. As @kashalls said, I think this should be in another PR. |
/lgtm |
@mloiseleur could you please approve this? |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Raffo, stevehipwell The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
I don't know if it was intentional or not, but this does break existing setups utilizing the webhook provider (since the port name changed). |
Anything under major version v1.0.0 is considered an always breaking version. |
Not to be pedantic, but the chart version is 1.15.0. |
My bad, I saw the release was v0.15.0. |
Description
The current doc for the webhook provider expect the k8s probe to call localhost but the normal Kubernetes behavior is to call the pods IP so the current doc doesn't work.
Some implementers work around this by expecting users to override the
livenessProbe
andreadinessProbe
(see example external-dns-ionos-webhook) but this might as well be upstreamedChecklist