Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Identity minimum set of resources that need to be intercepted in Mutating webhook #1380

Open
devdattakulkarni opened this issue Dec 6, 2024 · 0 comments

Comments

@devdattakulkarni
Copy link
Contributor

The set of resources and HTTP methods that KubePlus intercepts as part of its mutating webhook are defined here:
https://github.com/cloud-ark/kubeplus/blob/master/deploy/mutatingwebhook.yaml

We should revisit this list and make sure we are not intercepting more resources than are necessary. For example, now that we have deprecated Pod-level policies (#1367), there is no reason to intercept Pod resource.

Do we need to intercept CREATE calls for resources in the following api groups:
"apps", "extensions", "", "apiextensions.k8s.io",?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant