-
I'm trying to move from ArgoCD 5.x to 6.0.14. (No upgrade is needed, I am able to start clean.) We are using CertManager to issue certificates using letsencrypt. Our code is deployed using terraform but, as I noted that a number of things changed w/regard to the ingress, I tried to first get things working with a "generic" helm deployment with the attached values.zip. I've tried to configure using https://argo-cd.readthedocs.io/en/stable/operator-manual/ingress/#ssl-passthrough-with-cert-manager-and-lets-encrypt and also w/o the cert-manager.io/cluster-issuer annotation since server.certificate section in values.yaml does create the certificate and corresponding secret. I had no issues deploying the chart, I can see certificates get issued and the argocd-server-tls secret is created with what looks like good values. However, when I try to access the UI I get an error that the site isn't secure. I was able to port-forward and see the certificate but it is reporting invalid. Not sure if there are other settings I need in values.yaml to get a valid certificate. In the systems running v5 it appears to be using the tls info from argocd-secret which seems to be deprecated. Any thoughts as to what I should look at? Any help is appreciated - I've been banging my head against this for over a day. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 2 replies
-
Hi, |
Beta Was this translation helpful? Give feedback.
-
To close this out, my issue was due to some firewall blocking access to the root certs. |
Beta Was this translation helpful? Give feedback.
From what I can see in your browser (Certificate.pdf) you have correct cert from staging Let's Encrypt. If it's not trusted by your browser you might be missing CA chain on your laptop. In 5.x release users had a freedom to use whatever name for TLS secret they wanted. This could cause misconfiguration as
argocd-server-tls
is watched by UI server for TLS passthrough (reason behindtls: true
option with hardcoded secret name. Theargocd-secret
is fallback / legacy location where UI server generated self-signed certs if user didn't provide it's own (this location is not supported by Helm charts) but newer location isargocd-server-tls
that takes precedence.