Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Custom CA support #461

Merged
merged 2 commits into from
Apr 12, 2024
Merged

Custom CA support #461

merged 2 commits into from
Apr 12, 2024

Conversation

mbaldessari
Copy link
Contributor

  • Add support for custom CAs
  • Update tests

This feature relies on the VP operator version >= 0.0.44 in order to
work.

The way to enable this is to add a feature flag called 'initcontainers'
in the VP operator. Once this is enabled, we will detect this and take
over the all ArgoCD instances' definition and add initContainers which
will inject the CAs contained in the trusted-bundle-ca configmap and
also the openshift internal CA.

Testing protocol:

  1. (Operator 0.0.44) MCG deployment with experimentalCapabilities set
     to '' and using a github main upstream (i.e. without this PR)

  2. (Operator 0.0.44) MCG deployment with experimentalCapabilities set
     to 'initcontainers' and using a github diconnected common upstream
     (requiring a custom CA) (i.e. with this PR)

  3. (Operator 0.0.44) MCG deployment with experimentalCapabilities set
     to '' and using a github diconnected common upstream. (same as 1.2)
     and then set the initcontainer capability on the hub. Checked that
     the .global.experimentalCapabilities property replicated from hub to
     spoke and the initcontainers have been generated correctly

  3.1 (Operator 0.0.44) Change the repo from github to an internal one
      that does need the custom ca to work

  4. (Operator 0.0.43) Test an old operator with a newer common that
      contains this very branch

Note: Once we will make initcontainers a default feature of the operator
we will remove the ifs added in this PR and just make it the defaut
behaviour.
Copy link
Contributor

@mhjacks mhjacks left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is clearly an important capability and the changes here make sense. What I'd like to see is a test for specifying both this feature and a custom repo plugin at the same time to see what happens. If it works, great - if not, we should note that it doesn't. I suspect the usage of the features will intersect, since the main use of the plugins is to add support for PolicyGen and the things that want PolicyGen seem to be predominantly internal.

acm/templates/policies/ocp-gitops-policy.yaml Show resolved Hide resolved
Copy link
Contributor

@claudiol claudiol left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Overall these changes are needed for customers that require their own CA applied to their OpenShift clusters. As it's marked "experimental" we can ask one of our customers, or partners, to test in their environment and iterate through the issues encountered if any.

@claudiol claudiol linked an issue Apr 12, 2024 that may be closed by this pull request
@mhjacks mhjacks merged commit 056c315 into validatedpatterns:main Apr 12, 2024
5 checks passed
mbaldessari pushed a commit that referenced this pull request Apr 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

What is the proper way to inject a Corporate CA into a Pattern?
3 participants