This repository was archived by the owner on Feb 6, 2025. It is now read-only.
Skip rotate dex/gangway cert if signer unknown #879
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Waiting PR #858 got merged and re-test, now it's ready for review.
Why is this PR needed?
User might manually replace dex+gangway server certificate signed by their trusted CA certificate, no letting skuba controls the certificate rotation.
User could replace the server certificate at:
oidc-dex-cert
andoidc-gangway-cert
secret resourceThis PR address after deployment issue. One the PR kustomize #858 got merged, it needs to double-check the behavior is the same for the before deployment case, and also update doc-caasp PR.
Fixes SUSE/doc-caasp#619
Reminder: Add the "fixes bsc#XXXX" to the title of the commit so that it will
appear in the changelog.
What does this PR do?
Check the dex+gangway server certificate is signed by our CA file (
/etc/kubernetes/pki/ca.crt
) during cluster bootstrap and node upgrade:Anything else a reviewer needs to know?
N/A
Info for QA
Please test two cases:
1.15.2
to1.16.2
, the server certificate should be rotated and signed by the CA certificate (/etc/kuberntes/pki/ca.crt
).1.15.2
to1.16.2
, the server certificate should keep the same. (Follows the below test steps)Related info
N/A
Status BEFORE applying the patch
1.15.2
oidc-dex-cert.yaml
oidc-gangway-cert.yaml
1.16.2
, the dex+gangway certificate would be resigned by the CA (/etc/kubernetes/pki/ca.crt
) [3]Status AFTER applying the patch
1.15.2
1.16.2
, the dex+gangway certificate should not be resigned by the CA (/etc/kubernetes/pki/ca.crt
), keep it the same as the user manually replace certificateDocs
SUSE/doc-caasp#625
Merge restrictions
(Please do not edit this)
We are in v4-maintenance phase, so we will restrict what can be merged to prevent unexpected surprises:
Signed-off-by: JenTing Hsiao jenting.hsiao@suse.com