-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(argo-cd): Use ingress crt for dex when enabled #2172
Conversation
Fixes: argoproj#2171 Signed-off-by: Elad Shmitanka <[email protected]>
Signed-off-by: Elad Shmitanka <[email protected]>
3747e04
to
84d6908
Compare
I'm not quite sure why the chart testing fails, would love to some help, seems unrelated to my change :) |
It's failing at exactly the point you've changed, so I'd argue it's related to your change :) templates/argocd-server/deployment.yaml: unable to parse YAML: error converting YAML to JSON: yaml: line 336: mapping values are not allowed in this context |
ok, so it's line 336 after rendering, because the chart itself change is in line 426 :) |
Signed-off-by: Elad Shmitanka <[email protected]>
I am not sure if this is needed. Dex is controlled by a binary which is copied into the dex container. I thought that this utility does generate some TLS config between argo-cd-server and dex. And dex is exposed via a reverse proxy component inside argo-cd-server
Also we should be aware of the reload "issue":
|
It actually is |
Important to mention, this does not create a certificate for DEX, rather, if we create an ingress to ArgoCD server, with a certificate, map it. |
I think I've found a better solution |
Signed-off-by: Elad Shmitanka <[email protected]>
Current implementation inspired by argoproj/argo-cd#7572 (comment) I also hope it makes the incentive clearer :) |
I can still not follow your issue.
For outgoing traffic from dex to the upstream IdP, traffic flows directly:
Did you test your proposal (eg. with server:
volumeMounts:
- mountPath: /etc/ssl/certs/ingress-ca-certificates.crt
name: ingress-ca-certificate
subPath: ca.crt
volumes:
- name: ingress-ca-certificate
secret:
secretName: my-secret
optional: true
items:
- key: ca.crt
path: ca.crt |
I have tested it
The last part fails because argo-server communicates with the dex via external call all the way with the ingress and not internally, so when the ingress is using self signed CA, the call fails. As you've mentioned, this can be also achieved by passing the values you've provided, the PR as it is just makes it easier on the user I will try to reproduce and get back to you on it |
This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Fixes: #2171
Checklist: