Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add OpenShift beta support #319

Merged
merged 28 commits into from
Jun 3, 2020
Merged

Add OpenShift beta support #319

merged 28 commits into from
Jun 3, 2020

Conversation

jasonodonnell
Copy link
Contributor

@jasonodonnell jasonodonnell commented Jun 3, 2020

This adds beta support for OpenShift Container Platform and is a fork of #289.

Added in this PR is:

  • global.openshift value to make the helm chart compatible with OpenShift 4.x
  • Added an emptydir volume to /home/vault so Vault CLI can cache tokens for bootstrapping (permission issues on OpenShift where /home/vault isn't owned by arbitrary UID)
  • Environment variable for Vault K8s to enable OpenShift support (if enabled)
  • OpenShift route support (currently set to passthrough to allow Vault to handle TLS)
  • Networking policies for OpenShift

This PR differed from #289 by removing auto-tls generation offered by OpenShift. This feature will need additional work and should be a separate PR to avoid complications with setup of integrated storage (Raft).

Both Vault OSS and Vault Enterprise are supported using this feature.

@jasonodonnell jasonodonnell requested review from kalafut and tvoran June 3, 2020 00:51
templates/server-route.yaml Outdated Show resolved Hide resolved
Copy link
Member

@tvoran tvoran left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, and my simple manual test worked, just one non-blocking question.

@jasonodonnell jasonodonnell merged commit 853cb06 into master Jun 3, 2020
@jasonodonnell jasonodonnell deleted the openshift branch June 3, 2020 02:10
radudd added a commit to radudd/vault-helm that referenced this pull request Jun 5, 2020
* Initial commit

* Added openshift flag

* added self signed certificate for service annotation

* added OpenShift flag

* Added OpenShift flag

* cleanup

* Cleanup

* Further cleanup

* Further cleanup

* reverted security context on injector

* Extra corrections

* cleanup

* Removed Raft config for OpenShift, removed generated certs for ha and standby services

* Add openshift flag to global block, route disabled by default, condition for injector in network policy

* Added Unit tests for OpenShift

* Fixed unit test for HA statefulset for OpenShift

* Removed debug log level from stateful set

* Added port 8201 to networkpolicy

* Updated injector image

* Add openshift beta support

* Add openshift beta support

* Remove comments from configs

* Remove vault-k8s note from values

* Change route to use active service when HA

Co-Authored-by: Radu Domnu <39598837+radudd@users.noreply.github.com>
radudd added a commit to radudd/vault-helm that referenced this pull request Jun 5, 2020
* Initial commit

* Added openshift flag

* added self signed certificate for service annotation

* added OpenShift flag

* Added OpenShift flag

* cleanup

* Cleanup

* Further cleanup

* Further cleanup

* reverted security context on injector

* Extra corrections

* cleanup

* Removed Raft config for OpenShift, removed generated certs for ha and standby services

* Add openshift flag to global block, route disabled by default, condition for injector in network policy

* Added Unit tests for OpenShift

* Fixed unit test for HA statefulset for OpenShift

* Removed debug log level from stateful set

* Added port 8201 to networkpolicy

* Updated injector image

* Add openshift beta support

* Add openshift beta support

* Remove comments from configs

* Remove vault-k8s note from values

* Change route to use active service when HA

Co-authored-by: Radu Domnu <39598837+radudd@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants