-
Notifications
You must be signed in to change notification settings - Fork 325
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
use SSL_CERT_DIR environment variable for snapshot agent #1190
Conversation
@@ -195,6 +199,16 @@ spec: | |||
readOnly: true | |||
{{- end }} | |||
{{- end }} | |||
{{- if .Values.global.acls.manageSystemACLs }} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is just moved a bit down.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good. 🎉 changelog?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good!
This PR changes the way that we used to echo a custom ca-cert to the system which is used for system level operations (like interacting with s3 storage classes). Previously we wrote directly to
/etc/ssl
however in OpenShift there is no root access to do this write. Instead we will write the file to an emptyDir volume that we have access to, and add its path to the container as an environment variable that overridesSSL_CERT_DIR
Changes proposed in this PR:
client.snapshotAgent.caCert
is specified.global.tls.enabled=false
becauseclient.snapshotAgent.caCert
is a caCert for the system, not for Consul.How I've tested this PR:
Following the guidance in this comment : Support custom CA cert for snapshot agent consul-helm#481 (comment)
I ran the following:
and then copied the CA cert to the deployments command.
I ran the following server code locally on my laptop using
go run server.go
I ran
ngrok
locally on my laptop:This output like this:
I then built a container using the following dockerfile:
and app:
And then deployed the app to Kind k8s cluster:
And then checked the logs from the client pod:
How I expect reviewers to test this PR:
bats tests and acceptance pass.
Checklist: