-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DFBUGS-825: object: also use system certs for validating RGW cert #773
DFBUGS-825: object: also use system certs for validating RGW cert #773
Conversation
/retest |
@BlaineEXE: This pull request references [Jira Issue DFBUGS-825](https://issues.redhat.com//browse/DFBUGS-825), which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/jira refresh |
@agarwal-mudit: This pull request references [Jira Issue DFBUGS-825](https://issues.redhat.com//browse/DFBUGS-825), which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/jira refresh |
@agarwal-mudit: This pull request references [Jira Issue DFBUGS-825](https://issues.redhat.com//browse/DFBUGS-825), which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
@openshift-ci-robot: GitHub didn't allow me to request PR reviews from the following users: nehaberry. Note that only red-hat-storage members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
When generating the HTTP client used for RGW admin ops, use both system certs as well as the user-given cert. As a real world example, admins may use ACME to rotate Letsencrypt certs every 2 months. For an external CephObjectStore, the cert used by Rook and RGW may not be rotated at the same time. This can cause the Rook operator to fail CephObjectStore reconciliation until both certs agree. When Rook also relies on system certs in the container, Rook's reconciliation will not have reconciliation failures because Letsencrypt's well-known and trusted root certificates can be loaded from the system to validate the RGW's newly-rotated cert. Signed-off-by: Blaine Gardner <[email protected]> (cherry picked from commit 7bb72a0) # Conflicts: # Documentation/CRDs/Cluster/external-cluster/provider-export.md (cherry picked from commit 92267b5)
4b5b09e
to
ec869be
Compare
New changes are detected. LGTM label has been removed. |
/lgtm |
@BlaineEXE: you cannot LGTM your own PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
[APPROVALNOTIFIER] This PR is APPROVED Approval requirements bypassed by manually added approval. This pull-request has been approved by: BlaineEXE The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
3a1d26c
into
red-hat-storage:release-4.17
@BlaineEXE: [Jira Issue DFBUGS-825](https://issues.redhat.com//browse/DFBUGS-825): All pull requests linked via external trackers have merged: [Jira Issue DFBUGS-825](https://issues.redhat.com//browse/DFBUGS-825) has been moved to the MODIFIED state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
Backport of rook#14911 (rook#14835) to release-4.17
When generating the HTTP client used for RGW admin ops, use both system certs as well as the user-given cert.
As a real world example, admins may use ACME to rotate Letsencrypt certs every 2 months. For an external CephObjectStore, the cert used by Rook and RGW may not be rotated at the same time. This can cause the Rook operator to fail CephObjectStore reconciliation until both certs agree.
When Rook also relies on system certs in the container, Rook's reconciliation will not have reconciliation failures because Letsencrypt's well-known and trusted root certificates can be loaded from the system to validate the RGW's newly-rotated cert.
Signed-off-by: Blaine Gardner [email protected]
(cherry picked from commit 7bb72a0)
(cherry picked from commit 92267b5)
Checklist: