Thanks to visit codestin.com
Credit goes to github.com

Skip to content
This repository was archived by the owner on Oct 3, 2020. It is now read-only.

Conversation

mikesplain
Copy link

First of all, thanks for the awesome app. This made my life much easier this week, managing 5 clusters. To simplify testing and early deployment, I'd like to be able to disable cert verification against the master. Clearly not something we'd want to suggest everyone do but it's much easier for me to generate a service account token and point it at a cluster, then passing around a CA as well.

I was debating between:

VERIFY_CERT=os.getenv('VERIFY_CERT','')
or
verify=os.getenv('SKIP_CERT_VERIFICATION',cluster.ssl_ca_cert)

So if you have a preference, let me know!

There are use cases where cert verifcation might not be used; when using only a token to access a cluster, I get a SSLError since the cert if self signed.  This adds a flag to turn off verification.
@hjacobs
Copy link
Owner

hjacobs commented May 3, 2017

First of all thanks for the nice words and the PR! 😄

Regarding the PR: I would move the logic into the cluster discovery as you might have different clusters, some with proper cert and some not; also the kubeconfig supports the insecure-skip-tls-verify: true setting which we should consider. The Python client already supports/reads the flag (implemented in kubernetes-client/python#107) so we only have to attach it to the generic Cluster object and use it in the request function. Your environment variable could still be used for the non-kubeconfig static discoverer.

@mikesplain
Copy link
Author

Ahh nice didn't notice that. I'll take a look. Thanks!

@hjacobs
Copy link
Owner

hjacobs commented Mar 6, 2019

Will be obsolete with #209

@hjacobs hjacobs closed this Mar 6, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants