Uploaded image for project: 'OpenShift Kueue'
  1. OpenShift Kueue
  2. OCPKUEUE-461

Generate TLS configuration in operand ConfigMap

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • None
    • None
    • None

      Write resolved TLS profile settings (minTLSVersion, cipherSuites) to the Kueue controller_manager_config.yaml ConfigMap.

      Files to modify:

      • pkg/operator/target_config_reconciler.go - Add TLS config to ConfigMap generation
      • bindata/assets/kueue-operator/controller_manager_config.yaml (if template-based)

      Implementation approach:
      1. Resolve TLS profile using pkg/tls helpers (CRD > APIServer > default)
      2. Convert to Kueue Configuration format (minTLSVersion, cipherSuites)
      3. Add TLS settings to the controller_manager_config.yaml ConfigMap
      4. Ensure ConfigMap changes trigger deployment rollout

      Example ConfigMap content:

      controller_manager_config.yaml: |
        webhook:     port: 9443
          minTLSVersion: "1.2"
          cipherSuites:       - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
            - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
        metrics:     bindAddress: :8443
          minTLSVersion: "1.2"
          cipherSuites:       - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
      

      Acceptance Criteria:

      • ConfigMap includes TLS settings from resolved profile
      • ConfigMap is updated when TLS profile changes
      • Format matches upstream Kueue Configuration API

      Depends on:

              harpatil@redhat.com Harshal Patil
              harpatil@redhat.com Harshal Patil
              None
              None
              None
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: