[WIP] CMP-4310 added dynamic TLS settings#3190
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: vickeybrown The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
|
|
Welcome @vickeybrown! |
|
Hi @vickeybrown. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Regular contributors should join the org to skip this step. Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## main #3190 +/- ##
===========================================
- Coverage 45.50% 24.74% -20.77%
===========================================
Files 79 128 +49
Lines 7782 17962 +10180
===========================================
+ Hits 3541 4444 +903
- Misses 4099 13223 +9124
- Partials 142 295 +153 🚀 New features to boost your workflow:
|
4f1b3fb to
af431c6
Compare
What type of PR is this?
/kind feature
What this PR does / why we need it:
This PR adds support for dynamic TLS configuration from the OpenShift cluster
API server, making the security-profiles-operator respect cluster-wide TLS
policies instead of using hardcoded settings.
Key changes:
OpenShift APIServer resource at startup
cluster TLS settings
when TLS configuration changes, allowing Kubernetes to restart the pod with
updated settings
This aligns the security-profiles-operator with OpenShift's cluster-wide
security policies and enables centralized TLS management.
Which issue(s) this PR fixes:
Fixes CMP-4310
Does this PR have test?
N/A
Special notes for your reviewer:
get,list, andwatchpermissions onconfig.openshift.io/apiserversresources (RBAC changes included indeploy/base/role.yaml)graceful shutdown expecting Kubernetes to restart the pod with the new
configuration
Does this PR introduce a user-facing change?