-
Notifications
You must be signed in to change notification settings - Fork 131
Open
Description
Problem
When using Liqo with networking.enabled=false and accessing remote clusters through an API proxy (e.g., Tailscale Kubernetes API proxy), virtual kubelets fail with TLS errors:
x509: certificate signed by unknown authority
The proxy terminates TLS using its own certificates, but Liqo's Identity controller embeds the cluster's CA in kubeconfig secrets (kubeconfig-resourceslice-*, kubeconfig-controlplane-*), causing certificate validation to fail.
Current Behavior
- Identity CRD stores
certificateAuthorityDatainspec.authParams - Controller-manager generates kubeconfig secrets with
certificate-authority-data - Even if manually patched with
insecure-skip-tls-verify: true, the controller immediately reconciles and reverts the change
Proposed Solution
Add an optional insecureSkipTLSVerify field to the Identity CRD's authParams:
spec:
authParams:
apiServerURL: https://proxy.example.com
insecureSkipTLSVerify: true # New fieldWhen set, the controller should:
- Generate kubeconfig with
insecure-skip-tls-verify: true - Omit
certificate-authority-datafrom the kubeconfig
Use Case
Multi-cluster setups using Tailscale, Cloudflare Tunnel, or similar API proxies where:
- Networking is handled externally (Liqo networking disabled)
- API servers are accessed via proxy hostnames
- Proxy uses its own TLS certificates (not the cluster CA)
Environment
- Liqo version: 1.0.1
- Kubernetes: Talos Linux clusters
- Network: Tailscale with API server proxy enabled
Metadata
Metadata
Assignees
Labels
No labels