Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(RELEASE-1191): use prod umb in stage configmaps #206

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

johnbieren
Copy link
Contributor

Based on https://github.com/hacbs-release/app-interface-deployments/blob/main/internal-services/catalog/sign-image-pipeline.yaml#L62, it seems the UMB_ and SSL_ variables relate to the UMB authentication, so I removed the staging values from those in the configmaps that were using the stage umb url

@@ -13,9 +13,9 @@ data:
SIG_KEY_ID: "4096R/37036783 SHA-256"
SIG_KEY_NAME: "redhate2etesting"
SSL_CERT_FILE_NAME: "hacbs-signing-pipeline.pem"
SSL_CERT_SECRET_NAME: "hacbs-signing-pipeline-staging-certs"
SSL_CERT_SECRET_NAME: "hacbs-signing-pipeline-certs"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I do not think these certs work with PYXIS_URL: "https://pyxis.stage.engineering.redhat.com"

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This line https://github.com/hacbs-release/app-interface-deployments/blob/main/internal-services/catalog/sign-image-pipeline.yaml#L62 says that the SSL_CERT_SECRET_NAME is for umb, that is why I guess it should be updated. So this is actually for pyxis? Happy to update if I guessed wrong

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mmalina you don't know the answer to this do you?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm, it's weird, but AFAICS, the same key+cert is used for both umb and pyxis? If that's the case, then you will need to modify the secrets to contain separate key+cert values for umb and pyxis, because umb will always be prod, but pyxis will be prod vs stage.

Here's why I think the same one is used for both:

The set-env task is here: https://gitlab.cee.redhat.com/signing/hacbs-signing-pipeline/-/blob/main/ansible/roles/hacbs-signing-pipeline/templates/openshift/templates/signing-pipeline-stage-template.yml?ref_type=heads

It returns:

  • ssl_cert_secret_name
  • ssl_key_file_name
  • ssl_cert_file_name

All of them taken from the secret passed to the pipeline.

request-signature uses these to set two env vars: UMB_CERT_PATH, UMB_KEY_PATH

upload-signature uses these to set two env vars: PYXIS_CERT_PATH, PYXIS_KEY_PATH

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I pinged Ales Raszka to take a look. He should be back next week (Monday is public holiday in CZ, so on Tuesday).

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey, @mmalina is right. The pipeline uses a single cert for both Pyxis and UMB authentication. If you have multiple certs you will need update the pipeline to server your needs. Other alternative is to request a Pyxis and UMB permission for a single service account represented by the one cert.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mmalina is there a ticket for switching to use our copy of the pipeline (maybe it is already done)? It seems like this would be blocked on that then

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Here's the Jira: https://issues.redhat.com/browse/RELEASE-1207

But we had an open question about whether or not to also have our own copy of the tasks, not just the pipeline. I think this is a good enough reason to also have a copy of the tasks so that we can modify them to support different credentials for pyxis and umb. I am adding a comment there.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Update: The request-signature and upload-signature actually each need just one secret each (to access umb and pyxis, respectively). So we would only need to modify the set-env task.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks!

Copy link
Contributor

@scoheb scoheb left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@johnbieren
Copy link
Contributor Author

Keep in mind for RELEASE-1192, we also have these https://gitlab.cee.redhat.com/releng/konflux-release-data/-/tree/main/tenants-config/cluster/stone-prod-p02/managed/rhtap-releng-tenant/cm?ref_type=heads

Thanks, did not know about those. I will update those the same way I do these once it is decided how these should be updated

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants