-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add TLS Support to barbican operator #55
Add TLS Support to barbican operator #55
Conversation
d58b268
to
8416f11
Compare
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: vakwetu The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Creates certs for k8s service of the service operator when spec.tls.endpoint.internal.enabled: true For a service like nova which talks to multiple service internal endpoints, this has to be set for each of them for, like: ~~~ customServiceConfig: | [keystone_authtoken] insecure = true [placement] insecure = true [neutron] insecure = true [glance] insecure = true [cinder] insecure = true ~~~ Depends-On: openstack-k8s-operators/lib-common#428 Depends-On: openstack-k8s-operators#620 Depends-On: openstack-k8s-operators/barbican-operator#55 Jira: OSPRH-2349
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
in general looks good. might want to add envTest and kuttl tests, like we added to the other operators. Can you also add a sample for tls
} | ||
} | ||
|
||
// TODO(alee) should this validation occur in an if statement? what happens when tls is not enabled? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
certsHash would be calculated for the empty certHashes https://github.com/openstack-k8s-operators/lib-common/blob/main/modules/common/tls/tls.go#L166 as both endpoints are not enabled for tls
instance.Status.Conditions.MarkTrue(condition.ServiceConfigReadyCondition, condition.ServiceConfigReadyMessage) | ||
|
||
// TODO(alee) Figure out how serviceLabels are used and what must be in them |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
serviceLabels is basically the base labels to be set on all resources created by the controller to easy query/identify them. depending on which resource is created they get extended with additional, e.g. k8s svc will have the serviceLabels + the endpoint identifier.
@@ -634,9 +696,38 @@ func (r *BarbicanAPIReconciler) reconcileNormal(ctx context.Context, instance *b | |||
return ctrlResult, nil | |||
} | |||
|
|||
Log.Info(fmt.Sprintf("[API] Getting input hash '%s'", instance.Name)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should we keep this log?
/wip |
These tests will determine the functionality of TLSe within the barbican-operator.
/lgtm |
3b43913
into
openstack-k8s-operators:main
spec.tls.endpoint.internal.enabled: true For a service like nova which talks to multiple service internal endpoints, this has to be set for each of them for, like: ~~~ customServiceConfig: | [keystone_authtoken] insecure = true [placement] insecure = true [neutron] insecure = true [glance] insecure = true [cinder] insecure = true ~~~ Depends-On: openstack-k8s-operators/lib-common#428 Depends-On: openstack-k8s-operators#620 Depends-On: openstack-k8s-operators/barbican-operator#55 Jira: OSPRH-2349
This adds the changes needed to enable TLS-E in barbican.