-
-
Notifications
You must be signed in to change notification settings - Fork 324
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support k3s/k3d out of the box with rustls-tls #805
Comments
jaysonsantos
added a commit
to jaysonsantos/vector
that referenced
this issue
Jun 8, 2022
… inside clusters with k3s For more info check the issue kube-rs/kube#805
jaysonsantos
added a commit
to jaysonsantos/vector
that referenced
this issue
Jun 8, 2022
This is to avoid breaking kubernetes_source inside clusters with k3s. For more info check the issue kube-rs/kube#805
spencergilbert
added a commit
to vectordotdev/vector
that referenced
this issue
Jun 8, 2022
* fix(kubernetes_logs): Compile kube-rs with openssl This is to avoid breaking kubernetes_source inside clusters with k3s. For more info check the issue kube-rs/kube#805 * +e2e ci Signed-off-by: Spencer Gilbert <[email protected]> Co-authored-by: Spencer Gilbert <[email protected]>
jszwedko
pushed a commit
to vectordotdev/vector
that referenced
this issue
Jun 8, 2022
* fix(kubernetes_logs): Compile kube-rs with openssl This is to avoid breaking kubernetes_source inside clusters with k3s. For more info check the issue kube-rs/kube#805 * +e2e ci Signed-off-by: Spencer Gilbert <[email protected]> Co-authored-by: Spencer Gilbert <[email protected]>
jszwedko
pushed a commit
to vectordotdev/vector
that referenced
this issue
Jun 9, 2022
* fix(kubernetes_logs): Compile kube-rs with openssl This is to avoid breaking kubernetes_source inside clusters with k3s. For more info check the issue kube-rs/kube#805 * +e2e ci Signed-off-by: Spencer Gilbert <[email protected]> Co-authored-by: Spencer Gilbert <[email protected]>
jszwedko
pushed a commit
to vectordotdev/vector
that referenced
this issue
Jun 9, 2022
* fix(kubernetes_logs): Compile kube-rs with openssl This is to avoid breaking kubernetes_source inside clusters with k3s. For more info check the issue kube-rs/kube#805 * +e2e ci Signed-off-by: Spencer Gilbert <[email protected]> Co-authored-by: Spencer Gilbert <[email protected]>
The second part of this issue should now be resolved also thanks to the rustls-webpki fork which ultimately closed #153. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Would you like to work on this feature?
yes
What problem are you trying to solve?
The default k3s config uses Sec1-enocoded ec private keys and points at https://127.0.0.1:6443
Describe the solution you'd like
kube-rs works with the default unmodified kubeconfig.
Describe alternatives you've considered
modifying the kubeconfig so it uses pkcs#8-wrapped private keys/localhost.
Documentation, Adoption, Migration Strategy
This is a tracking bug for features that need to be landed downstream for kube-client to work:
verify_is_valid_for
to iPAddress SAN briansmith/webpki#54Target crate for feature
kube-client
The text was updated successfully, but these errors were encountered: