-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Gatekeeper setup: insecureTLSSkipVerify: true
to work with current state alpha
and http
#25
Conversation
Signed-off-by: Mathieu Benoit <[email protected]>
Signed-off-by: Mathieu Benoit <[email protected]>
If we can amend README.md sooner, would help as one of my colleague was stuck for hours to understand why it wasn't working at first |
Hello @mathieu-benoit / @dlorenc , In my case, though I am able to install cosign-gatekeeper-provider (with gatekeeper version 3.10 ), I could see in my logs of it (using
It ideally should not create any deployment for any of the unsigned images but in my case, while creation it's not throwing any error but still creating a deployment objects (with no pods) - is it normal?
|
Hi @NiniiGit, sorry if it was misleading, but I didn't go that far with my tests. This PR is just fixing the Gatekeeper setup part, I just clarified a little bit the description of that PR in order to avoid any confusion. With that said, I just tested the deployment part and like you, I'm seeing the 2 types of errors in the logs:
And this error happens for both signed or unsigned containers. As for the creation of
|
insecureTLSSkipVerify: true
to work with current state alpha
and http
insecureTLSSkipVerify: true
to work with current state alpha
and http
Thanks @mathieu-benoit for all the detailed insights and replies! Let me retry the same sequence as you have (to observe behaviour again on my EKS cluster). Meanwhile IMO (yet to test), I think till this issue gets fixed, instead of gatekeeper version v3.10.0, maybe should try version v3.8.0 for gatekeepr+Cosign for image signature validation; as Gatekeeper has hardened the security posture from 3.9 for external data, feature
|
Meanwhile, I can confirm that with opa-gatekeeper version v3.10.0, I am also getting the same behaviour as what Mathieu mentioned above for both valid and error.yaml based resources
|
Thanks! |
Signed-off-by: Mathieu Benoit [email protected]
Proposing to have the current state of this repo working with
alpha
andhttp
by adding theinsecureTLSSkipVerify: true
parameter.Here are the errors fixed with that:
latest
as we speak), getting this error: Support Gatekeeper v3.11 External Data Beta API #20.Also adding an explicit note and instruction to install Gatekeeper 3.10 to have this project working until #20 is fixed and implemented. Otherwise, nobody can use this project with Gatekeeper 3.11. So this PR is temporary workaround of the Gatekeeper setup.
Important note: even after this setup, there is another issue related to #16 when trying to deploy both scenarios: signed or unsigned containers. But that's not related to what this PR is trying to fix/propose here.