-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow configuration of TLS Version for Webhook servers #6511
Comments
/milestone v1.2 In order to fix this in CAPI (and in the other controllers) IMO there should be a change in controller runtime allowing to set the flags introduced in kubernetes-sigs/controller-runtime#1620 for the default webhook server, ideally via new flags added to the |
I think it would be good if we would implement the flag like this:
I think it would be good to have this flag consistent across providers and document it accordingly (like some others we already have for e.g. the metrics endpoint), otherwise it's bad for users. |
/triage accepted |
/help |
@fabriziopandini: GuidelinesPlease ensure that the issue body includes answers to the following questions:
For more details on the requirements of such an issue, please see here and ensure that they are met. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign |
Opened kubernetes-sigs/controller-runtime#2020 as per @fabriziopandini's first comment above. |
Waiting for a controller-runtime version to be available with the fix before creating a PR. |
I think this is a good place to also think about exposing the |
Just for reference: Requiring TLS >= 1.2 will not cause any issues for FIPS compliance. FIPS already requires 1.2 as the minimum version. The clearest reference I found is this second-hand AWS announcement. |
The current MinTLSVersion that the webhook servers (cabpk/capi/kcp) start with is 1.0. This is a potential security vulnerability.
With controller-runtime v0.9.x+(kubernetes-sigs/controller-runtime#1620), the controller-runtime Manager supports configuration of this via
MinTLSVersion
in the webhook.Server values. Leveraging this directly via CAPI's webhook servers isn't possible as this isn't configurable via env args or manager args.This should be extended to allow users to define the appropriate
MinTLSVersion
s that are secure for their environments/use cases.The text was updated successfully, but these errors were encountered: