Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Identity minimum set of resources that need to be intercepted in Mutating webhook #1380

Closed
devdattakulkarni opened this issue Dec 6, 2024 · 0 comments · Fixed by #1393
Closed

Comments

@devdattakulkarni
Copy link
Contributor

The set of resources and HTTP methods that KubePlus intercepts as part of its mutating webhook are defined here:
https://github.com/cloud-ark/kubeplus/blob/master/deploy/mutatingwebhook.yaml

We should revisit this list and make sure we are not intercepting more resources than are necessary. For example, now that we have deprecated Pod-level policies (#1367), there is no reason to intercept Pod resource.

Do we need to intercept CREATE calls for resources in the following api groups:
"apps", "extensions", "", "apiextensions.k8s.io",?

devdattakulkarni added a commit that referenced this issue Jan 31, 2025
Updated MutatingWebhookConfiguration to intercept only required resources

Fixes: #1380
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant