Skip to content

Conversation

@rhmdnd
Copy link
Collaborator

@rhmdnd rhmdnd commented Nov 25, 2025

We have a results server that exposes a TLS 1.2 endpoint. This is fine
today, but pulling this from a more authoritative source, like the
OpenShift API server is better because then a user can configure it in a
single place and have the change propagate to the Compliance Operator
automatically.

This commit updates the operator to use the OpenShift API server TLS
configuration, instead of hard-coding it to TLS 1.2. If the operator
encounters issues fetching the API server configuration, it defaults
back to TLS 1.2.

Assisted-By: Claude

We have a results server that exposes a TLS 1.2 endpoint. This is fine
today, but pulling this from a more authoritative source, like the
OpenShift API server is better because then a user can configure it in a
single place and have the change propagate to the Compliance Operator
automatically.

This commit updates the operator to use the OpenShift API server TLS
configuration, instead of hard-coding it to TLS 1.2. If the operator
encounters issues fetching the API server configuration, it defaults
back to TLS 1.2.

Assisted-By: Claude
@openshift-ci openshift-ci bot requested review from xiaojiey and yuumasato November 25, 2025 23:18
@openshift-ci
Copy link

openshift-ci bot commented Nov 25, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: rhmdnd

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:1000-1ae198189003d84371baa5c07f39fd465ec7ae99

@openshift-ci
Copy link

openshift-ci bot commented Nov 26, 2025

@rhmdnd: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-serial 1ae1981 link true /test e2e-aws-serial

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@rhmdnd
Copy link
Collaborator Author

rhmdnd commented Dec 2, 2025

We'll need a way to test this in conjunction with the API server so that we know it's working as expected.

@@ -0,0 +1,168 @@
package utils
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Instead of building another utility by hand, we should strongly consider using the existing library-go utilities.

https://github.com/openshift/library-go/blob/master/pkg/operator/configobserver/apiserver/observe_tlssecurityprofile.go#L87

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants