Closed
Description
I successfully have cert-manager running following all the resources defined here:
https://github.com/kubernetes-sigs/windows-gmsa/blob/master/charts/gmsa/templates/issuer.yaml
The mutating & validating webhooks are referencing the proper CA as outlined in the templates as well.
Proper value for the secretName as well.
The logs for the gmsaWebhook continue to show:
│ 2024/10/01 04:28:21 http: TLS handshake error from 10.x.x.x:45168: remote error: tls: bad certificate
Completely stumped as to what is missed here.
I've port forwarded gmsaWebhook Pod and tested out SSL and get the errors:
depth=0 CN=gmsa-webhook.gmsa-webhook.svc
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 CN=gmsa-webhook.gmsa-webhook.svc
verify error:num=21:unable to verify the first certificate
verify return:1
depth=0 CN=gmsa-webhook.gmsa-webhook.svc
verify return:1
ENVIRONMENT:
Image: 'registry.k8s.io/gmsa-webhook/k8s-gmsa-webhook'
Tag: 'v0.8.0'
Latest Chart Template versions.
For further context, we have a working implementation when using the gmsa-webhook-cert.sh
instead of cert-manager.
Metadata
Metadata
Assignees
Labels
No labels