Bug Report
What did you do?
I have followed the tutorial to the point where I have the webhooks for validating the cluster size. When attempting to apply the CR spec, the server replies with an internal error, stating that the certificate is signed by an unknown authority, and will not allow the application of said spec.
What did you expect to see?
It is expected that the operator will allow the CR spec to be applied, and create the demo memcached deployment.
What did you see instead? Under which circumstances?
X509: certificate signed by unknown authority
This is presented no matter what I do.
Environment
operator-sdk version: "v0.19.0", commit: "8e28aca60994c5cb1aec0251b85f0116cc4c9427"
version: "go1.13.10 linux/amd64"
- Kubernetes version information:
kubernetes version: "v1.18.2" - k3s
- Kubernetes cluster kind:
k3s 3 node
- Are you writing your operator in ansible, helm, or go?
go
Possible Solution
Additional context
The kustomize generated specs for the certificate creation took the variables as literals, so I had to manually change them to get the certificates to become valid for the operator internal URL at all.
Bug Report
What did you do?
I have followed the tutorial to the point where I have the webhooks for validating the cluster size. When attempting to apply the CR spec, the server replies with an internal error, stating that the certificate is signed by an unknown authority, and will not allow the application of said spec.
What did you expect to see?
It is expected that the operator will allow the CR spec to be applied, and create the demo memcached deployment.
What did you see instead? Under which circumstances?
X509: certificate signed by unknown authority
This is presented no matter what I do.
Environment
operator-sdk version: "v0.19.0", commit: "8e28aca60994c5cb1aec0251b85f0116cc4c9427"
version: "go1.13.10 linux/amd64"
kubernetes version: "v1.18.2" - k3s
k3s 3 node
go
Possible Solution
Additional context
The kustomize generated specs for the certificate creation took the variables as literals, so I had to manually change them to get the certificates to become valid for the operator internal URL at all.