š I noticed a difference in behavior between this provider and the hashicorp/kubernetes provider when it comes to cluster ca certs.
I have a k8s cluster with cert-manager running with letsencrypt as the root of trust. My environment has the ISRG Root X1 certificate available locally.
Here is an example of me creating a namespace with the kubernetes provider without specifying the cluster_ca_certificate which works as expected.
But if I do the same thing with the kubectl provider it doesn't use the system CA cert and get an x509: certificate signed by unknown authority error when I run terraform apply.
Am I right in suspecting the kubectl provider doesn't look through system CA certs? If so, I'd appreciate that this feature gets added so that cluster_ca_certificate doesn't need to get set manually.
š I noticed a difference in behavior between this provider and the
hashicorp/kubernetes
provider when it comes to cluster ca certs.I have a k8s cluster with cert-manager running with letsencrypt as the root of trust. My environment has the ISRG Root X1 certificate available locally.
Here is an example of me creating a namespace with the kubernetes provider without specifying the
cluster_ca_certificate
which works as expected.But if I do the same thing with the kubectl provider it doesn't use the system CA cert and get an
x509: certificate signed by unknown authority
error when I runterraform apply
.It looks like the kubectl provider doesn't look for system certs because I can specify it manually and have it work.
Am I right in suspecting the kubectl provider doesn't look through system CA certs? If so, I'd appreciate that this feature gets added so that
cluster_ca_certificate
doesn't need to get set manually.