Bug 2074591

Summary: [GSS] [RFE] Add termination policy to ocs-storagecluster-cephobjectstore route
Product: [Red Hat Storage] Red Hat OpenShift Data Foundation Reporter: Sunil Kumar Acharya <sheggodu>
Component: ocs-operatorAssignee: Jiffin <jthottan>
Status: CLOSED CURRENTRELEASE QA Contact: Martin Bukatovic <mbukatov>
Severity: high Docs Contact:
Priority: unspecified    
Version: 4.9CC: jthottan, kramdoss, madam, mmuench, muagarwa, ocs-bugs, odf-bz-bot, rcyriac, sostapov
Target Milestone: ---Keywords: FutureFeature
Target Release: ODF 4.9.7   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Cause: In a closed environment, publicly accessible openshift routes were raising security concerns. When existing the route for RGW with SSL policy or delete, OCS-Operator was reconciling and resetting to default. Consequence: Security checks were failing for RGW openshift routes Fix: Provide an option to disable the route creation for RGW in the storage-cluster.yaml Result: The creation of an openshift route for RGW can be disabled
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-06-01 10:34:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2079877    

Description Sunil Kumar Acharya 2022-04-12 15:04:26 UTC
This bug was initially created as a copy of Bug #2067079

I am copying this bug because: 



This bug was initially created as a copy of Bug #2063691

I am copying this bug because: 

Separating between MCG and RGW routes. 

Description of problem (please be detailed as possible and provide log
snippets):

- Add termination policy to  ocs-storagecluster-cephobjectstore route


Version of all relevant components (if applicable):

- All

Does this issue impact your ability to continue to work with the product
(please explain in detail what is the user impact)?

- Cu is getting compliant issues because of "EdgeTerminationPolicy" of these 
  routes.

Is there any workaround available to the best of your knowledge?

- The route can be patched with the following command but it gets reconciled.

oc patch route s3 -n openshift-storage --type merge -p '{"spec":{"tls":{"insecureEdgeTerminationPolicy":"Redirect","termination":"reencrypt"}}}'

- Thus we need to add this parameter in the Cephobjectstore CR so that it won't 
  be reconciled.

Rate from 1 - 5 the complexity of the scenario you performed that caused this
bug (1 - very simple, 5 - very complex)?


N/A

Can this issue reproducible?

N/A

Can this issue reproduce from the UI?

N/A

If this is a regression, please provide more details to justify this:

N/A

Steps to Reproduce:
N/A

Actual results:

- The termination policy to ocs-storagecluster-cephobjectstore route gets reconciled.


Expected results:

- Add termination policy toocs-storagecluster-cephobjectstore route without reconcilation.


Additional info:

In the next steps.