Run validation on secrets if it is used for plugin config to prevent dataplane stuck #5190
Closed
2 tasks done
Labels
area/admission
area/feature
New feature or request
area/ingress-controller
release/highlight
This part of the release is worth bragging about.
Milestone
Is there an existing issue for this?
Problem Statement
FTI-5314, Also part of #2195
When a secret is used as configuration of
KongPlugin
orKongClusterPlugin
(inConfigFrom
orConfigPatches
), we need to check if it will generate invalid configuration of kong plugin after the secret is applied when the secret is created or updated. This could prevent from generating invalid configuration of plugin when translating to kong state and then make the dataplane lock up.Proposed Solution
Additional information
No response
Acceptance Criteria
Secret
that will generate invalid kong plugin configuration will get rejected on the webhook.The text was updated successfully, but these errors were encountered: