-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[tlse] tls for ManilaAPI pod configuration #212
[tlse] tls for ManilaAPI pod configuration #212
Conversation
Build failed (check pipeline). Post https://review.rdoproject.org/zuul/buildset/28f2cca960ee425dbc9f0ec968359b4c ❌ openstack-k8s-operators-content-provider FAILURE in 8m 14s |
bb41e5b
to
8cd8a39
Compare
c4f37a2
to
cda2809
Compare
57e0012
to
843ec84
Compare
Build failed (check pipeline). Post https://review.rdoproject.org/zuul/buildset/98e14a2cad31445a9de819cca60573af ❌ openstack-k8s-operators-content-provider FAILURE in 8m 02s |
Build failed (check pipeline). Post https://review.rdoproject.org/zuul/buildset/751b060f9ed343f7bd7f223b7298086f ❌ openstack-k8s-operators-content-provider FAILURE in 7m 59s |
Build failed (check pipeline). Post https://review.rdoproject.org/zuul/buildset/28566864fb9941f9bcd3f767d693d652 ❌ openstack-k8s-operators-content-provider FAILURE in 8m 47s |
01a4605
to
3864f7f
Compare
/retest
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks good to me, just could extend the tests as we did in other operators as mentioned inline
Creates certs for k8s service of the service operator when spec.tls.endpoint.internal.enabled: true For a service like nova which talks to multiple service internal endpoints, this has to be set for each of them for, like: ~~~ customServiceConfig: | [keystone_authtoken] insecure = true [placement] insecure = true [neutron] insecure = true [glance] insecure = true [cinder] insecure = true ~~~ Depends-On: openstack-k8s-operators/lib-common#428 Depends-On: openstack-k8s-operators#620 Depends-On: openstack-k8s-operators/manila-operator#212 Signed-off-by: Veronika Fisarova <[email protected]>
/test manila-operator-build-deploy-kuttl |
looks good to me. @fmount if you are happy with it, we could merge it |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Deydra71, fmount The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Public/Internal service cert secrets and the CA bundle secret can be passed to configure httpd virtual hosts for tls termination. The certs get direct mounted to the appropriate place in etc/pki/tls/certs/%s.crt|key and a CA bundle to /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem . Job deployments for bootstrap/cron get the CA bundle added if configured. Depends-On: openstack-k8s-operators/lib-common#428 Signed-off-by: Veronika Fisarova <[email protected]>
New changes are detected. LGTM label has been removed. |
/test manila-operator-build-deploy-tempest |
91c953f
into
openstack-k8s-operators:main
Creates certs for k8s service of the service operator when spec.tls.endpoint.internal.enabled: true For a service like nova which talks to multiple service internal endpoints, this has to be set for each of them for, like: ~~~ customServiceConfig: | [keystone_authtoken] insecure = true [placement] insecure = true [neutron] insecure = true [glance] insecure = true [cinder] insecure = true ~~~ Depends-On: openstack-k8s-operators/lib-common#428 Depends-On: openstack-k8s-operators#620 Depends-On: openstack-k8s-operators/manila-operator#212 Signed-off-by: Veronika Fisarova <[email protected]>
Creates certs for k8s service of the service operator when spec.tls.endpoint.internal.enabled: true For a service like nova which talks to multiple service internal endpoints, this has to be set for each of them for, like: ~~~ customServiceConfig: | [keystone_authtoken] insecure = true [placement] insecure = true [neutron] insecure = true [glance] insecure = true [cinder] insecure = true ~~~ Depends-On: openstack-k8s-operators/lib-common#428 Depends-On: openstack-k8s-operators#620 Depends-On: openstack-k8s-operators/manila-operator#212 Signed-off-by: Veronika Fisarova <[email protected]>
Creates certs for k8s service of the service operator when spec.tls.endpoint.internal.enabled: true For a service like nova which talks to multiple service internal endpoints, this has to be set for each of them for, like: ~~~ customServiceConfig: | [keystone_authtoken] insecure = true [placement] insecure = true [neutron] insecure = true [glance] insecure = true [cinder] insecure = true ~~~ Depends-On: openstack-k8s-operators/lib-common#428 Depends-On: openstack-k8s-operators#620 Depends-On: openstack-k8s-operators/manila-operator#212 Signed-off-by: Veronika Fisarova <[email protected]>
Public/Internal service cert secrets and the CA bundle secret can be passed to configure httpd virtual hosts for tls termination. The certs get direct mounted to the appropriate place in etc/pki/tls/certs/%s.crt|key and a CA bundle to /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem . Job deployments for bootstrap/cron get the CA bundle added if configured.
Depends-On: openstack-k8s-operators/lib-common#428
Jira: OSPRH-3883