Uploaded image for project: 'OpenShift GitOps'
  1. OpenShift GitOps
  2. GITOPS-5517

Deprecate use of tls.certificate & tls.key server fields in ArgoCD CR

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Done
    • Icon: Major Major
    • None
    • None
    • Operator
    • None
    • 3
    • GitOps Crimson - Sprint 3263, GitOps Crimson - Sprint 3264, GitOps Crimson - Sprint 3265

      Story (Required)

      As a Argo CD admin if I configure tls certs for Argo CD server route by directly embedding tls data into ArgoCD CR, I should get warning messages about deprecation in logs. 

      Background (Required)

      Directly embedding tls data into ArgoCD CR is deprecated in favor of new way to configure tls data using secrets

      Approach (Required)

      Some references

       

      Test instructions: https://github.com/argoproj-labs/argocd-operator/pull/1547

      Acceptance Criteria (Mandatory)

      - Whenever deprecated fields  _.spec.server.route.tls.certificate or .spec.server.route.tls.key are used, user should be notified via warning messages about deprecation and the new method to configure tls data._

      INVEST Checklist

      Dependencies identified

      Blockers noted and expected delivery timelines set

      Design is implementable

      Acceptance criteria agreed upon

      Story estimated

      Legend

      Unknown

      Verified

      Unsatisfied

      Done Checklist

      • Code is completed, reviewed, documented and checked in
      • Unit and integration test automation have been delivered and running cleanly in continuous integration/staging/canary environment
      • Continuous Delivery pipeline(s) is able to proceed with new code included
      • Customer facing documentation, API docs etc. are produced/updated, reviewed and published
      • Acceptance criteria are met

              rh-ee-ansingh Anand Singh
              rh-ee-sghadi Siddhesh Ghadi
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: