Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support accessing to TLS enabled backends #45

Merged

Conversation

amoralej
Copy link
Contributor

@amoralej amoralej commented Jan 17, 2025

Adds TLS configuration to interact with backend services including memcached, mariadb and other openstack services.

Prometheus will be added in a followup PR.

Depends-On: openstack-k8s-operators/ci-framework#2658

Copy link

Build failed (check pipeline). Post recheck (without leading slash)
to rerun all jobs. Make sure the failure cause has been resolved before
you rerun jobs.

https://softwarefactory-project.io/zuul/t/rdoproject.org/buildset/6bef1476d14742ed9326434f7bf696d7

✔️ noop SUCCESS in 0s
✔️ openstack-meta-content-provider SUCCESS in 1h 34m 26s
✔️ watcher-operator-validation SUCCESS in 1h 23m 17s
watcher-operator-kuttl RETRY_LIMIT in 1h 04m 54s

controllers/watcherapi_controller.go Outdated Show resolved Hide resolved
templates/watcher/config/00-default.conf Outdated Show resolved Hide resolved
templates/watcher/config/00-default.conf Outdated Show resolved Hide resolved
Copy link

This change depends on a change that failed to merge.

Change openstack-k8s-operators/ci-framework#2658 is needed.

In order to validate internal connections with TLS we need to add the
standard TLS options to the CRs. Note that, it will be copied from the
top level one to all subCRs so it only will be exposed in main Watcher
CRD top level.
This patch adds support for SSL to the Database depending on the
configuration of TLS in watcher and watcherapi spec.
By default memcached is created with TLS support by openstack operators.
This patch adds support to access memcached instance with TLS enabled.
When connecting to internal services, watcher may find they have TLS
enabled. This patch is adding the required parameter `cafile` based on
the presence of TLS.CaBundleSecretName parameter which defines de Secret
of the CA bundle containing the cert used for internal communications.
@amoralej amoralej changed the title WIP Support accessing to TLS enabled backends Support accessing to TLS enabled backends Jan 22, 2025
This patch checks proper values of config files for TLS enablement.
@cescgina
Copy link
Contributor

/approve

Copy link

openshift-ci bot commented Jan 22, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cescgina

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@viroel
Copy link
Contributor

viroel commented Jan 22, 2025

this lgtm, thanks

@raukadah
Copy link
Contributor

/lgtm

Codewise looks good.

without this patch, tempest tests were failing with unable to get local issuer certificate and after applying it, we are able to run single watcher tempest test..

@openshift-merge-bot openshift-merge-bot bot merged commit b29a0ac into openstack-k8s-operators:main Jan 23, 2025
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants