You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Over time, validating and mutating webhooks have been a source of several types of bugs for GMP:
Zero-node problems: When the operator is not scheduled because no nodes are available, webhooks fail and reject GMP Custom Resources.
Startup races: If a user installs GMP and PodMonitorings (for instance) at the same time, the webhook server may not yet be available, and the PodMonitoring will be rejected.
Instability problems: Any time the operator experiences downtime, CRDs validated/mutated by webhooks will be rejected.
Security concerns: Theoretically, if the operator is compromised, the webhook server could allow the attacker a vector to expand the attack.
Webhook server certificates: The operator currently has to generate and configure TLS certificates for the webhook server, which impacts several areas.
Over time, validating and mutating webhooks have been a source of several types of bugs for GMP:
Broadly, the approach to remediate all of these issues is removal of webhooks and the webhook server, to be replaced with built-in Kubernetes validation using OpenAPI schemas and Common Expression Language (CEL).
Affected Custom Resources:
Related work to date includes:
The text was updated successfully, but these errors were encountered: