Skip to content

KEP-6038: HTTPS (TLS) for kube-proxy admin endpoints#6041

Open
yashsingh74 wants to merge 1 commit intokubernetes:masterfrom
yashsingh74:kep-6038-kube-proxy
Open

KEP-6038: HTTPS (TLS) for kube-proxy admin endpoints#6041
yashsingh74 wants to merge 1 commit intokubernetes:masterfrom
yashsingh74:kep-6038-kube-proxy

Conversation

@yashsingh74
Copy link
Copy Markdown
Member

  • One-line PR description: HTTPS (TLS) for kube-proxy admin endpoints
  • Other comments:

Signed-off-by: yashsingh74 <yashsingh1774@gmail.com>
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: yashsingh74
Once this PR has been reviewed and has the lgtm label, please assign bowei for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot requested a review from danwinship April 29, 2026 09:28
@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory labels Apr 29, 2026
@k8s-ci-robot k8s-ci-robot added sig/network Categorizes an issue or PR as relevant to SIG Network. size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Apr 29, 2026
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

@yashsingh74: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
pull-enhancements-verify 53a049a link true /test pull-enhancements-verify

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Comment on lines +108 to +132
Extend **`KubeProxyConfiguration`** (`pkg/proxy/apis/config`, all served versions, defaults, validation, conversion) with nested structures similar in spirit to other components’ secure serving options, for example:

```yaml
apiVersion: kubeproxy.config.k8s.io/v1alpha1
kind: KubeProxyConfiguration
metricsBindAddress: 0.0.0.0:10249
healthzBindAddress: 0.0.0.0:10256
# New fields (illustrative names — finalize in API review)
metricsServerTLS:
enable: true
certFile: /var/lib/kube-proxy/pki/metrics.crt
keyFile: /var/lib/kube-proxy/pki/metrics.key
# optional: clientCAFile for mTLS
healthzServerTLS:
enable: true
certFile: /var/lib/kube-proxy/pki/healthz.crt
keyFile: /var/lib/kube-proxy/pki/healthz.key
```

**Fields to consider** (exact names subject to API review):

- `enable` (bool): when false, HTTP (current behavior).
- `certFile`, `keyFile` (strings): PEM paths; required when `enable` is true.
- Optional: `clientCAFile` for client verification; `cipherSuites`, `minVersion`, `curvePreferences` aligned with existing Kubernetes flags elsewhere.
- Optional future: `certDirectory` / auto-generated self-signed certs for development only (mirrors some binaries); **not** required for MVP if it complicates security posture.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you please do the exercise of analying current kube-scheduler, kube-controller-manager and kubelet and base your proposal on that so we are consistent?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/kep Categorizes KEP tracking issues and PRs modifying the KEP directory sig/network Categorizes an issue or PR as relevant to SIG Network. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants