Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[tlse] memcached tls setup #704

Merged
merged 4 commits into from
Mar 13, 2024

Conversation

stuggi
Copy link
Contributor

@stuggi stuggi commented Mar 11, 2024

If spec.TLS.PodLevel.Enabled is true, setup memcached for TLS usage.

Jira: OSPRH-5283

stuggi added 3 commits March 11, 2024 17:45
If spec.TLS.PodLevel.Enabled is true, setup memcached for TLS
usage.

Jira: OSPRH-5283
With the rework of the tls struct the method is not really useful.
@openshift-ci openshift-ci bot requested review from abays and dprince March 11, 2024 16:53
@stuggi stuggi requested review from olliewalsh, dciabrin and Deydra71 and removed request for dprince and abays March 11, 2024 16:53
op, err := controllerutil.CreateOrPatch(ctx, helper.GetClient(), memcached, func() error {
spec.DeepCopyInto(&memcached.Spec)

if tlsCert != "" {
memcached.Spec.TLS.CaBundleSecretName = tls.CABundleSecret
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should it always set the CA bundle?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes probably, although I don't think memcached does any outgoing connection. but its in sync with the other services

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link

Build failed (check pipeline). Post recheck (without leading slash)
to rerun all jobs. Make sure the failure cause has been resolved before
you rerun jobs.

https://review.rdoproject.org/zuul/buildset/7538e1b73162462e9a3069b8dd1e0c6a

✔️ openstack-k8s-operators-content-provider SUCCESS in 3h 07m 43s
✔️ podified-multinode-edpm-deployment-crc SUCCESS in 1h 07m 22s
✔️ cifmw-crc-podified-edpm-baremetal SUCCESS in 1h 11m 14s
cifmw-data-plane-adoption-osp-17-to-extracted-crc FAILURE in 2h 08m 51s
✔️ openstack-operator-tempest-multinode SUCCESS in 1h 28m 31s

@stuggi
Copy link
Contributor Author

stuggi commented Mar 12, 2024

/test images

2 similar comments
@stuggi
Copy link
Contributor Author

stuggi commented Mar 12, 2024

/test images

@stuggi
Copy link
Contributor Author

stuggi commented Mar 12, 2024

/test images

@stuggi
Copy link
Contributor Author

stuggi commented Mar 12, 2024

/test openstack-operator-build-deploy-kuttl

Copy link
Contributor

@olliewalsh olliewalsh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

Copy link
Contributor

openshift-ci bot commented Mar 13, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: olliewalsh, stuggi

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-merge-bot openshift-merge-bot bot merged commit 58d39d5 into openstack-k8s-operators:main Mar 13, 2024
7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants