Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support k3s/k3d out of the box with rustls-tls #805

Closed
1 of 2 tasks
farcaller opened this issue Feb 5, 2022 · 1 comment
Closed
1 of 2 tasks

Support k3s/k3d out of the box with rustls-tls #805

farcaller opened this issue Feb 5, 2022 · 1 comment
Labels
client http issues with the client rustls rustls-tls related

Comments

@farcaller
Copy link
Contributor

farcaller commented Feb 5, 2022

Would you like to work on this feature?

yes

What problem are you trying to solve?

The default k3s config uses Sec1-enocoded ec private keys and points at https://127.0.0.1:6443

Describe the solution you'd like

kube-rs works with the default unmodified kubeconfig.

Describe alternatives you've considered

modifying the kubeconfig so it uses pkcs#8-wrapped private keys/localhost.

Documentation, Adoption, Migration Strategy

This is a tracking bug for features that need to be landed downstream for kube-client to work:

Target crate for feature

kube-client

@clux clux added client http issues with the client rustls rustls-tls related labels Feb 6, 2022
jaysonsantos added a commit to jaysonsantos/vector that referenced this issue Jun 8, 2022
… inside clusters with k3s

For more info check the issue kube-rs/kube#805
jaysonsantos added a commit to jaysonsantos/vector that referenced this issue Jun 8, 2022
This is to avoid breaking kubernetes_source inside clusters with k3s.
For more info check the issue kube-rs/kube#805
spencergilbert added a commit to vectordotdev/vector that referenced this issue Jun 8, 2022
* fix(kubernetes_logs): Compile kube-rs with openssl

This is to avoid breaking kubernetes_source inside clusters with k3s.
For more info check the issue kube-rs/kube#805

* +e2e ci

Signed-off-by: Spencer Gilbert <spencer.gilbert@datadoghq.com>

Co-authored-by: Spencer Gilbert <spencer.gilbert@datadoghq.com>
jszwedko pushed a commit to vectordotdev/vector that referenced this issue Jun 8, 2022
* fix(kubernetes_logs): Compile kube-rs with openssl

This is to avoid breaking kubernetes_source inside clusters with k3s.
For more info check the issue kube-rs/kube#805

* +e2e ci

Signed-off-by: Spencer Gilbert <spencer.gilbert@datadoghq.com>

Co-authored-by: Spencer Gilbert <spencer.gilbert@datadoghq.com>
jszwedko pushed a commit to vectordotdev/vector that referenced this issue Jun 9, 2022
* fix(kubernetes_logs): Compile kube-rs with openssl

This is to avoid breaking kubernetes_source inside clusters with k3s.
For more info check the issue kube-rs/kube#805

* +e2e ci

Signed-off-by: Spencer Gilbert <spencer.gilbert@datadoghq.com>

Co-authored-by: Spencer Gilbert <spencer.gilbert@datadoghq.com>
jszwedko pushed a commit to vectordotdev/vector that referenced this issue Jun 9, 2022
* fix(kubernetes_logs): Compile kube-rs with openssl

This is to avoid breaking kubernetes_source inside clusters with k3s.
For more info check the issue kube-rs/kube#805

* +e2e ci

Signed-off-by: Spencer Gilbert <spencer.gilbert@datadoghq.com>

Co-authored-by: Spencer Gilbert <spencer.gilbert@datadoghq.com>
@clux
Copy link
Member

clux commented Apr 3, 2023

The second part of this issue should now be resolved also thanks to the rustls-webpki fork which ultimately closed #153.
Thus, rustls should work out of the box with k3d from 0.81.0

@clux clux closed this as completed Apr 3, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
client http issues with the client rustls rustls-tls related
Projects
None yet
Development

No branches or pull requests

2 participants