Bug 1955270 - ACM Operator should support using the default route TLS
Summary: ACM Operator should support using the default route TLS
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Advanced Cluster Management for Kubernetes
Classification: Red Hat
Component: GRC & Policy
Version: rhacm-2.2.z
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: rhacm-2.2.4
Assignee: Gus Parvin
QA Contact: Derek Ho
Mikela Dockery
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-04-29 19:17 UTC by Paul Czarkowski
Modified: 2021-06-16 19:29 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-06-16 19:28:23 UTC
Target Upstream Version:
Embargoed:
ming: rhacm-2.2.z+


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github open-cluster-management backlog issues 12098 0 None None None 2021-04-30 13:57:03 UTC
Red Hat Product Errata RHSA-2021:2461 0 None None None 2021-06-16 19:29:04 UTC

Description Paul Czarkowski 2021-04-29 19:17:20 UTC
When I deploy ACM in a OSD cluster I expect the Multi Cluster Hub to use the wildcard dns/certificate in the cluster instead of having a self signed certificate.

I can get this working by patching the mch resource after the install by running the following to change the route to use reencrypt termination and providing the CA that is created for MCH.  MCH should do this out of the box to support our enterprise customers who insist on genuine certificates.

```
CA=$(oc -n open-cluster-management get secret multicloud-ca-cert \
    -o jsonpath='{.data.ca\.crt}' | base64 --decode | awk 'NF {sub(/\r/, ""); printf "%s\\n",$0;}')


oc patch multiclusterhubs multiclusterhub -n open-cluster-management --type=merge \
  -p=echo "{\"spec\":{\"tls\":{\"insecureEdgeTerminationPolicy\":\"Redirect\",\"termination\":\"reencrypt\",\"destinationCACertificate\":\"${CA}\"}}}"

```

Comment 1 Nathan Weatherly 2021-04-30 13:46:42 UTC
Gus has info related to this-- reassigning

Comment 2 Gus Parvin 2021-04-30 14:50:57 UTC
Hello Paul, Thanks for bringing this up.  This is being addressed in a future release so the behavior you are describing will be what you see.  The route will use the OCP default ingress cert and be configured as reencrypt by default.

The patch you are describing does not work from what I can tell because the tls property does not exist for the multiclusterhubs resource.  Can you double check what you are doing since it looks like that procedure is not valid?  Thanks!

Comment 12 errata-xmlrpc 2021-06-16 19:28:23 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: Red Hat Advanced Cluster Management 2.2.4 security and bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:2461


Note You need to log in before you can comment on or make changes to this bug.