Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: don't change the default policy to reencrypt if the TLS secret is already present #1401

Merged
merged 1 commit into from
Jun 6, 2024

Conversation

chetan-rns
Copy link
Collaborator

@chetan-rns chetan-rns commented Jun 5, 2024

What type of PR is this?

/kind bug

What does this PR do / why we need it:

#1363 changed the default termination policy from passthrough to reencrypt. However, there could be some users who have configured the old passthrough Route with a custom certificate before the upgrade. We don't want to overwrite their configuration once they upgrade the operator.

This PR introduces logic to update the Route to renencrypt only if the "argocd-server-tls` secret is not present.

Have you updated the necessary documentation?

  • Documentation update is required by this PR.
  • Documentation has been updated.

Which issue(s) this PR fixes:

Fixes #?

How to test changes / Special notes to the reviewer:

  1. Install/Run an older version of the operator that still has Passthrough as default.
  2. Verify that the Route is using the Passthrough policy. Configure a custom TLS secret "argocd-server-tls" using OpenSSL.
  3. Run the operator with the changes in this PR
  4. The route shouldn't be updated to reenecrypt.

…s present

Signed-off-by: Chetan Banavikalmutt <chetanrns1997@gmail.com>
@chetan-rns chetan-rns changed the title fix: don't change the default policy to reencrypt if the TLS secret if the TLS secret is already present fix: don't change the default policy to reencrypt if the TLS secret is already present Jun 5, 2024
@chetan-rns
Copy link
Collaborator Author

Copy link
Member

@jgwest jgwest left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks @chetan-rns!

@jgwest jgwest merged commit b7e6666 into argoproj-labs:master Jun 6, 2024
6 checks passed
anandf pushed a commit to anandf/argocd-operator that referenced this pull request Jun 6, 2024
…s present (argoproj-labs#1401)

Signed-off-by: Chetan Banavikalmutt <chetanrns1997@gmail.com>
Signed-off-by: Anand Francis Joseph <anjoseph@redhat.com>
anandf added a commit that referenced this pull request Jun 7, 2024
* fix: don't change the default policy to reencrypt if the TLS secret is present (#1401)

Signed-off-by: Chetan Banavikalmutt <chetanrns1997@gmail.com>
Signed-off-by: Anand Francis Joseph <anjoseph@redhat.com>

* Add SeccompProfile for PodSecurityStandards "restricted" to avoid Pod Security Violations on restricted namespaces (#1288)

* Add SeccompProfile for PSA restricted

It is necessary to set the seccompProfile to RuntimeDefault to meet the
PodSecurityStandards of restricted, which will be a common default in
clusters.
Otherwise the workloads will be evaluated as baseline and rejected, if
not set otherwise in the namespace metadata.

* fix: failing test

Signed-off-by: iam-veeramalla <abhishek.veeramalla@gmail.com>

---------

Signed-off-by: iam-veeramalla <abhishek.veeramalla@gmail.com>
Co-authored-by: iam-veeramalla <abhishek.veeramalla@gmail.com>
Signed-off-by: Anand Francis Joseph <anjoseph@redhat.com>

* Rebase master with 0.10.0 and 0.9.1 releases (#1403)

* argocd-operator v0.10.0 release (#1343)

* fix typo in metadata (#1354)

* update replaces version number for 0.10.0 to 0.9.1 (#1365)

* update make deploy manifests

* rebase with 0.9.1

* fix bundle manifest control plane

* make bundle

Signed-off-by: Anand Francis Joseph <anjoseph@redhat.com>

---------

Signed-off-by: Chetan Banavikalmutt <chetanrns1997@gmail.com>
Signed-off-by: Anand Francis Joseph <anjoseph@redhat.com>
Signed-off-by: iam-veeramalla <abhishek.veeramalla@gmail.com>
Co-authored-by: Chetan Banavikalmutt <chetanrns1997@gmail.com>
Co-authored-by: Krzysztof Ostrowski <krzysztof.ostrowski@posteo.de>
Co-authored-by: iam-veeramalla <abhishek.veeramalla@gmail.com>
Co-authored-by: Regina Scott <50851526+reginapizza@users.noreply.github.com>
anandf added a commit to anandf/argocd-operator that referenced this pull request Jun 7, 2024
* fix: don't change the default policy to reencrypt if the TLS secret is present (argoproj-labs#1401)

Signed-off-by: Chetan Banavikalmutt <chetanrns1997@gmail.com>
Signed-off-by: Anand Francis Joseph <anjoseph@redhat.com>

* Add SeccompProfile for PodSecurityStandards "restricted" to avoid Pod Security Violations on restricted namespaces (argoproj-labs#1288)

* Add SeccompProfile for PSA restricted

It is necessary to set the seccompProfile to RuntimeDefault to meet the
PodSecurityStandards of restricted, which will be a common default in
clusters.
Otherwise the workloads will be evaluated as baseline and rejected, if
not set otherwise in the namespace metadata.

* fix: failing test

Signed-off-by: iam-veeramalla <abhishek.veeramalla@gmail.com>

---------

Signed-off-by: iam-veeramalla <abhishek.veeramalla@gmail.com>
Co-authored-by: iam-veeramalla <abhishek.veeramalla@gmail.com>
Signed-off-by: Anand Francis Joseph <anjoseph@redhat.com>

* Rebase master with 0.10.0 and 0.9.1 releases (argoproj-labs#1403)

* argocd-operator v0.10.0 release (argoproj-labs#1343)

* fix typo in metadata (argoproj-labs#1354)

* update replaces version number for 0.10.0 to 0.9.1 (argoproj-labs#1365)

* update make deploy manifests

* rebase with 0.9.1

* fix bundle manifest control plane

* make bundle

Signed-off-by: Anand Francis Joseph <anjoseph@redhat.com>

---------

Signed-off-by: Chetan Banavikalmutt <chetanrns1997@gmail.com>
Signed-off-by: Anand Francis Joseph <anjoseph@redhat.com>
Signed-off-by: iam-veeramalla <abhishek.veeramalla@gmail.com>
Co-authored-by: Chetan Banavikalmutt <chetanrns1997@gmail.com>
Co-authored-by: Krzysztof Ostrowski <krzysztof.ostrowski@posteo.de>
Co-authored-by: iam-veeramalla <abhishek.veeramalla@gmail.com>
Co-authored-by: Regina Scott <50851526+reginapizza@users.noreply.github.com>
Signed-off-by: Anand Francis Joseph <anjoseph@redhat.com>
@svghadi svghadi added the backport-to-redesign Changes which need to be backported to operator-redesign branch label Jun 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport-to-redesign Changes which need to be backported to operator-redesign branch
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants