Bug 2074591 - [GSS] [RFE] Add termination policy to ocs-storagecluster-cephobjectstore route
Summary: [GSS] [RFE] Add termination policy to ocs-storagecluster-cephobjectstore route
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat OpenShift Data Foundation
Classification: Red Hat Storage
Component: ocs-operator
Version: 4.9
Hardware: Unspecified
OS: Unspecified
unspecified
high
Target Milestone: ---
: ODF 4.9.7
Assignee: Jiffin
QA Contact: Martin Bukatovic
URL:
Whiteboard:
Depends On:
Blocks: 2079877
TreeView+ depends on / blocked
 
Reported: 2022-04-12 15:04 UTC by Sunil Kumar Acharya
Modified: 2023-08-09 17:00 UTC (History)
9 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Cause: In a closed environment, publicly accessible openshift routes were raising security concerns. When existing the route for RGW with SSL policy or delete, OCS-Operator was reconciling and resetting to default. Consequence: Security checks were failing for RGW openshift routes Fix: Provide an option to disable the route creation for RGW in the storage-cluster.yaml Result: The creation of an openshift route for RGW can be disabled
Clone Of:
Environment:
Last Closed: 2022-06-01 10:34:50 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github red-hat-storage ocs-operator pull 1646 0 None Closed Query regarding Mirroring Operator Catalogs 2022-05-25 05:09:53 UTC

Description Sunil Kumar Acharya 2022-04-12 15:04:26 UTC
This bug was initially created as a copy of Bug #2067079

I am copying this bug because: 



This bug was initially created as a copy of Bug #2063691

I am copying this bug because: 

Separating between MCG and RGW routes. 

Description of problem (please be detailed as possible and provide log
snippets):

- Add termination policy to  ocs-storagecluster-cephobjectstore route


Version of all relevant components (if applicable):

- All

Does this issue impact your ability to continue to work with the product
(please explain in detail what is the user impact)?

- Cu is getting compliant issues because of "EdgeTerminationPolicy" of these 
  routes.

Is there any workaround available to the best of your knowledge?

- The route can be patched with the following command but it gets reconciled.

oc patch route s3 -n openshift-storage --type merge -p '{"spec":{"tls":{"insecureEdgeTerminationPolicy":"Redirect","termination":"reencrypt"}}}'

- Thus we need to add this parameter in the Cephobjectstore CR so that it won't 
  be reconciled.

Rate from 1 - 5 the complexity of the scenario you performed that caused this
bug (1 - very simple, 5 - very complex)?


N/A

Can this issue reproducible?

N/A

Can this issue reproduce from the UI?

N/A

If this is a regression, please provide more details to justify this:

N/A

Steps to Reproduce:
N/A

Actual results:

- The termination policy to ocs-storagecluster-cephobjectstore route gets reconciled.


Expected results:

- Add termination policy toocs-storagecluster-cephobjectstore route without reconcilation.


Additional info:

In the next steps.


Note You need to log in before you can comment on or make changes to this bug.