Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(argo-cd): Fix static value secret name for argocd-server ingress tls secretName #2660

Open
wants to merge 3 commits into
base: main
Choose a base branch
from

Conversation

btwseeu78
Copy link

@btwseeu78 btwseeu78 commented Apr 23, 2024

Checklist:

  • I have bumped the chart version according to versioning
  • I have updated the documentation according to documentation
  • I have updated the chart changelog with all the changes that come with this pull request according to changelog.
  • Any new values are backwards compatible and/or have sensible default.
  • I have signed off all my commits as required by DCO.
  • My build is green (troubleshooting builds).

…blized.

The secret can not be a static value and it absolutely does not make sens eto use extyra

Signed-off-by: Arpan Chatterjee <[email protected]>
@btwseeu78 btwseeu78 changed the title fix(argo-cd): Fix static value secret name for argocd-server ingress pls secretName fix(argo-cd): Fix static value secret name for argocd-server ingress tls secretName Apr 23, 2024
@pdrastil
Copy link
Member

Hi @btwseeu78 thanks for the PR. Hardcoding TLS secret name was intentional for TLS termination in Argo CD server. Also all certificates in chart are using this name to support this scenario. Can I ask why do you need different name?

See here: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#tls-certificates-used-by-argocd-server

@btwseeu78
Copy link
Author

Ok so let me explain the use case first, we use external secrets operator to pull certificates for diff clusters, then kubed is used to sync across namespaces. All our certificates are shared with multiple namespaces and a specific format to easily differentiate between what certificates for what hosts.Argocd tls means we need to just create another object to store the secrets,though we already have that with a diff name.
Also now we are doing it with extra-tls which does not feel right though it solves the issue.

Also what's the harm having it parameterised with a default values.
Also it's personal but I'm not ok to put ca data in values file and create the secret.

@zmx
Copy link

zmx commented Jun 5, 2024

We have the same use case as btwseeu78

@mkilchhofer
Copy link
Member

@mkilchhofer
Copy link
Member

@pdrastil In my opinion it totally makes sense to have this configurable. Depending on the method used on the Ingress (e.g. SSL passthrough or not), operator docs uses different names for the secret:
https://argo-cd.readthedocs.io/en/stable/operator-manual/ingress/

So it is possible to use one TLS config for Argo CD's namespace-internal or in-cluster communication and use another TLS config on the Ingress.

Signed-off-by: Marco Maurer (-Kilchhofer) <[email protected]>
@github-actions github-actions bot added the size/S label Jun 5, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants