Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Check if we can configure explicit certificates for argocd-operator kube-rbac-proxy #130

Open
simu opened this issue Nov 17, 2023 · 0 comments

Comments

@simu
Copy link
Member

simu commented Nov 17, 2023

kube-rbac-proxy v0.15.0 logs a deprecation warning during startup:

Insecure listen address will be removed.
Using --insecure-listen-address won't be possible!

The ability to run kube-rbac-proxy without TLS certificates will be removed.
Not using --tls-cert-file and --tls-private-key-file won't be possible!

For more information, please go to https://github.com/brancz/kube-rbac-proxy/issues/187

We should investigate whether we can configure the argocd-operator kube-rbac-proxy to use explicitly configured certificates. We most likely can't use cert-manager in component-argocd, since that would create a circular dependency which would break bootstrapping.

On OpenShift 4, we could use service serving certificates (cf. https://docs.openshift.com/container-platform/4.13/security/certificates/service-serving-certificate.html, but we don't have a similar solution for non-OCP4 (and the HackDay PoC currently depends on cert-manager, cf. https://github.com/projectsyn/k8s-service-ca-controller)

See also brancz/kube-rbac-proxy#187

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant