Bug 2219395 - [DR][4.14 clone] Pass-through CA certificates to Velero for k8s object protection to function
Summary: [DR][4.14 clone] Pass-through CA certificates to Velero for k8s object protec...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat OpenShift Data Foundation
Classification: Red Hat Storage
Component: odf-dr
Version: 4.14
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
: ODF 4.14.0
Assignee: Shyamsundar
QA Contact: Sidhant Agrawal
URL:
Whiteboard:
Depends On: 2218316
Blocks: 2218492
TreeView+ depends on / blocked
 
Reported: 2023-07-03 13:18 UTC by Karolin Seeger
Modified: 2023-11-08 18:53 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: No Doc Update
Doc Text:
Clone Of: 2218316
Environment:
Last Closed: 2023-11-08 18:52:10 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:6832 0 None None None 2023-11-08 18:53:09 UTC

Description Karolin Seeger 2023-07-03 13:18:45 UTC
+++ This bug was initially created as a clone of Bug #2218316 +++



Request:
--------
This BZ is raised to consider accepting the fix for 4.14.0 release

Background:
-----------
- With Fusion using the additional k8s object protection scheme with their 2.6 release, that is slated for a July 20th release, the following bug report is important for the fusion DR feature to function
- The core issue is that Velero/OADP does not trust additional certificates that are signed by non-global root CAs and hence need a certificate to be passed to their resources. This PR enables adding such certificates per S3 store to the ramen config for distribution to the managed clusters, for the k8s object protection workflow to leverage the same when creating Velero jobs

Issue details here: https://github.com/RamenDR/ramen/issues/921

Upstream PR here: https://github.com/RamenDR/ramen/pull/925

Notes for QE:
-------------
The code is exclusively triggered ONLY with additional kube object protection scheme, which is not configured for ODF based workflows via the UI. This hence does not require any additional tests as such.

The Ramen config map has an additional "optional" field, which would hence remain empty on upgrades once this PR is merged.

Questions for MCO:
------------------
@uchapaga or @vbadrina As the ramen config map has changed, does this need MCO to rebuild with the latest config map API changes: https://github.com/RamenDR/ramen/pull/925/files#diff-59e4c2e943590aec4970f817d91e1be589f19f99260a650d8b8cf020ee4b5ca2R77

--- Additional comment from Shyamsundar on 2023-06-28 18:09:07 UTC ---

Request:
--------
This BZ is raised to consider accepting the fix for 4.13.1 release

Background:
-----------
- With Fusion using the additional k8s object protection scheme with their 2.6 release, that is slated for a July 20th release, the following bug report is important for the fusion DR feature to function
- The core issue is that Velero/OADP does not trust additional certificates that are signed by non-global root CAs and hence need a certificate to be passed to their resources. This PR enables adding such certificates per S3 store to the ramen config for distribution to the managed clusters, for the k8s object protection workflow to leverage the same when creating Velero jobs

Issue details here: https://github.com/RamenDR/ramen/issues/921

Upstream PR here: https://github.com/RamenDR/ramen/pull/925

Notes for QE:
-------------
The code is exclusively triggered ONLY with additional kube object protection scheme, which is not configured for ODF based workflows via the UI. This hence does not require any additional tests as such.

The Ramen config map has an additional "optional" field, which would hence remain empty on upgrades once this PR is merged.

Questions for MCO:
------------------
@uchapaga or @vbadrina As the ramen config map has changed, does this need MCO to rebuild with the latest config map API changes: https://github.com/RamenDR/ramen/pull/925/files#diff-59e4c2e943590aec4970f817d91e1be589f19f99260a650d8b8cf020ee4b5ca2R77

--- Additional comment from RHEL Program Management on 2023-06-28 18:09:16 UTC ---

This bug having no release flag set previously, is now set with release flag 'odf‑4.14.0' to '?', and so is being proposed to be fixed at the ODF 4.14.0 release. Note that the 3 Acks (pm_ack, devel_ack, qa_ack), if any previously set while release flag was missing, have now been reset since the Acks are to be set against a release flag.

--- Additional comment from umanga on 2023-07-03 09:55:48 UTC ---

(In reply to Shyamsundar from comment #1)
> 
> Questions for MCO:
> ------------------
> @uchapaga or @vbadrina As the ramen config map has
> changed, does this need MCO to rebuild with the latest config map API
> changes:
> https://github.com/RamenDR/ramen/pull/925/files#diff-
> 59e4c2e943590aec4970f817d91e1be589f19f99260a650d8b8cf020ee4b5ca2R77
>
Yes, MCO needs to update it's dependency and rebuild.

Comment 4 krishnaram Karthick 2023-10-16 04:06:25 UTC
This bug is to be verified based on regression

Comment 11 errata-xmlrpc 2023-11-08 18:52:10 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: Red Hat OpenShift Data Foundation 4.14.0 security, enhancement & bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2023:6832


Note You need to log in before you can comment on or make changes to this bug.