Uploaded image for project: 'Distributed Tracing'
  1. Distributed Tracing
  2. TRACING-5948

Force HTTPS for object storage when using AWS token-based authentication.

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • Tempo
    • None
    • Quality / Stability / Reliability
    • False
    • Hide

      None

      Show
      None
    • False

      Description:

      Update the object storage configuration logic to always use HTTPS (insecure: false) when AWS token-based authentication is enabled, regardless of whether custom TLS certificates are provided.

      Background:

      Cloud provider federated authentication mechanisms for AWS require HTTPS connections to function. Currently, the operator sets `insecure: true` (HTTP) for S3 storage when `storage.tls.enabled` is not explicitly set, which breaks token-based authentication.

      The code conflates two separate concepts:

      1. {}Custom TLS certificates{} (optional, for non-standard CAs)

      2. {}HTTP vs HTTPS protocol{} (HTTPS mandatory for token auth)

      Acceptance Criteria

      • [ ] S3 storage uses HTTPS (`insecure: false`) when `credentialMode` is `token` or `token-cco`
      • [ ] Static credential mode behavior unchanged (respects `storage.tls.enabled` setting)
      • [ ] Unit tests added/updated to verify the logic
      • [ ] E2E tests pass without requiring `storage.tls.enabled: true` workaround

       

              Unassigned Unassigned
              rhn-support-ikanse Ishwar Kanse
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: