-
Notifications
You must be signed in to change notification settings - Fork 769
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
validate ConstraintTemplate via admission #3760
Comments
@grosser could you share how to reproduce this exactly? |
edit any existing ConstraintTemplate to have invalid rego |
@grosser We used to have |
having to use some external tool is a bit cumbersome, especially if that tool is not version-locked with gatekeeper releases, so I have to install the correct version of the tool and trust it does exactly what gatekeeper does I like the idea of a controller validating their crds so that an invalid crd can't be deployed |
|
I'll take another look, thx. Still prefer in-cluster validation even if that's just a fail-safe or very crude (did not parse -> denied), |
@grosser were you able to look at gator and satisfy the use case you are looking for? |
not yet, but I think it should work |
Yeah, I dont think we have this in road map. I am interested on what other think. @open-policy-agent/gatekeeper-maintainers PTAL. |
Describe the solution you'd like
the validation webhook should block invalid ConstraintTemplate
because otherwise a deploy via for example
kubectl apply
will succeed but the reconcile will fail foreverAnything else you would like to add:
I have this config for my validation webhook, so afaik ConstraintTemplate is covered
when editing a ConstraintTemplate to be invalid kubernetes does not complain,
but the reconciler fails
Environment:
kubectl version
): 1.30.1The text was updated successfully, but these errors were encountered: