You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In #226, custom authentication was added, with CA/SSL-cert/SSL-pkey accepted both as path and data — similar to how it is stored in the ~/.kube/config.
However, data fields were ignored and not handled in any way.
This PR should fix this.
Types of Changes
Bug fix (non-breaking change which fixes an issue)
As I already wrote in the other PR tests would be good. Also I'm suspicious of the temporary file handling. You're not cleaning them up, so I guess they leak and you eventually run out of memory/disk space, right?
I have now fixed it to also purge it — just not atexit, but on the garbage collection of an API session, which probably prevents the leakages for long-running operators. I.e., the files are kept as long as they are actually used, not as long as the operator runs.
And there are now few tests. But they do not cover everything — I didn't find how to extract a parsed client certificate or even its existence from an SSLContext object. It is more or less testable with CAs.
The text was updated successfully, but these errors were encountered:
Description
In #226, custom authentication was added, with CA/SSL-cert/SSL-pkey accepted both as path and data — similar to how it is stored in the
~/.kube/config
.However, data fields were ignored and not handled in any way.
This PR should fix this.
Types of Changes
As I already wrote in the other PR tests would be good. Also I'm suspicious of the temporary file handling. You're not cleaning them up, so I guess they leak and you eventually run out of memory/disk space, right?
dneuhaeuser-zalando Indeed, they will be leaking. I've taken that from the pykube-ng's code. Kubernetes client does the same (1, 2), just cleans the files at exit. SO, the approach is as secure, as anything else in this field.
I have now fixed it to also purge it — just not
atexit
, but on the garbage collection of an API session, which probably prevents the leakages for long-running operators. I.e., the files are kept as long as they are actually used, not as long as the operator runs.And there are now few tests. But they do not cover everything — I didn't find how to extract a parsed client certificate or even its existence from an SSLContext object. It is more or less testable with CAs.
The text was updated successfully, but these errors were encountered: