Skip to content

Conversation

@stephenfin
Copy link
Contributor

@stephenfin stephenfin commented Nov 11, 2024

If a CA bundle is required to talk to your OpenStack then obviously all services that talk to the cloud need to have both credentials and said bundle. Currently, these users can get their credentials via cloud credential operator, but they need to source their CA bundle from elsewhere (typically by extracting it from the cloud controller manager's configuration). This makes configuration of services more complicated than necessary.

Continue the resolution of the issue by storing the CA bundle, if any, in the root secret on OpenStack. When coupled with the changes introduced in openshift/cloud-credential-operator#780, this allows us to dole out the bundle to anyone who asks for it via a CredentialsRequest.

While we're here, we also tweak the configuration for the cloud provider to (a) start generating the configuration file in the new format expected by cluster-cloud-controller-manager-operator and (b) stop generating an old secret that only the old, now-removed in-tree OpenStack cloud provider needed and used.

EDIT: I have deferred the above changes to a different PR.

@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Nov 11, 2024

@stephenfin: This pull request references OSASINFRA-3657 which is a valid jira issue.

In response to this:

If a CA bundle is required to talk to your OpenStack then obviously all
services that talk to the cloud need to have both credentials and said bundle.
Currently, these users can get their credentials via cloud credential operator,
but they need to source their CA bundle from elsewhere (typically by extracting
it from the cloud controller manager's configuration). This makes configuration
of services more complicated than necessary.

Continue the resolution of the issue by storing the CA bundle, if any, in the
root secret on OpenStack. When coupled with the changes introduced in
openshift/cloud-credential-operator#780, this allows us to dole out the bundle
to anyone who asks for it via a CredentialsRequest.

While we're here, we also tweak the configuration for the cloud provider to (a)
start generating the configuration file in the new format expected by
cluster-cloud-controller-manager-operator and (b) stop generating an old secret
that only the old, now-removed in-tree OpenStack cloud provider needed and
used.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Nov 11, 2024
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Nov 11, 2024

@stephenfin: This pull request references OSASINFRA-3657 which is a valid jira issue.

In response to this:

If a CA bundle is required to talk to your OpenStack then obviously all services that talk to the cloud need to have both credentials and said bundle. Currently, these users can get their credentials via cloud credential operator, but they need to source their CA bundle from elsewhere (typically by extracting it from the cloud controller manager's configuration). This makes configuration of services more complicated than necessary.

Continue the resolution of the issue by storing the CA bundle, if any, in the root secret on OpenStack. When coupled with the changes introduced in openshift/cloud-credential-operator#780, this allows us to dole out the bundle to anyone who asks for it via a CredentialsRequest.

While we're here, we also tweak the configuration for the cloud provider to (a) start generating the configuration file in the new format expected by cluster-cloud-controller-manager-operator and (b) stop generating an old secret that only the old, now-removed in-tree OpenStack cloud provider needed and used.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot requested review from EmilienM and rna-afk November 11, 2024 13:02
@stephenfin
Copy link
Contributor Author

/hold

Will wait for 4.19 for this.

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Nov 18, 2024
@mandre
Copy link
Member

mandre commented Feb 3, 2025

/retest

@stephenfin stephenfin changed the title OSASINFRA-3657: Add support for storing OpenStack CA bundles] OSASINFRA-3657: Add support for storing OpenStack CA bundles Feb 14, 2025
@stephenfin stephenfin changed the title OSASINFRA-3657: Add support for storing OpenStack CA bundles OSASINFRA-3730: Add support for storing OpenStack CA bundles Feb 19, 2025
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Feb 19, 2025

@stephenfin: This pull request references OSASINFRA-3730 which is a valid jira issue.

In response to this:

If a CA bundle is required to talk to your OpenStack then obviously all services that talk to the cloud need to have both credentials and said bundle. Currently, these users can get their credentials via cloud credential operator, but they need to source their CA bundle from elsewhere (typically by extracting it from the cloud controller manager's configuration). This makes configuration of services more complicated than necessary.

Continue the resolution of the issue by storing the CA bundle, if any, in the root secret on OpenStack. When coupled with the changes introduced in openshift/cloud-credential-operator#780, this allows us to dole out the bundle to anyone who asks for it via a CredentialsRequest.

While we're here, we also tweak the configuration for the cloud provider to (a) start generating the configuration file in the new format expected by cluster-cloud-controller-manager-operator and (b) stop generating an old secret that only the old, now-removed in-tree OpenStack cloud provider needed and used.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@EmilienM
Copy link
Member

nice cleanup
/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Feb 19, 2025
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Mar 12, 2025

@stephenfin: This pull request references OSASINFRA-3730 which is a valid jira issue.

In response to this:

If a CA bundle is required to talk to your OpenStack then obviously all services that talk to the cloud need to have both credentials and said bundle. Currently, these users can get their credentials via cloud credential operator, but they need to source their CA bundle from elsewhere (typically by extracting it from the cloud controller manager's configuration). This makes configuration of services more complicated than necessary.

Continue the resolution of the issue by storing the CA bundle, if any, in the root secret on OpenStack. When coupled with the changes introduced in openshift/cloud-credential-operator#780, this allows us to dole out the bundle to anyone who asks for it via a CredentialsRequest.

While we're here, we also tweak the configuration for the cloud provider to (a) start generating the configuration file in the new format expected by cluster-cloud-controller-manager-operator and (b) stop generating an old secret that only the old, now-removed in-tree OpenStack cloud provider needed and used.

This needs to wait for the CCO change to be approved before we merge this.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@EmilienM
Copy link
Member

/retest

1 similar comment
@EmilienM
Copy link
Member

/retest

We are storing a cloud configuration file, not a cloud credentials file.

Signed-off-by: Stephen Finucane <[email protected]>
If a CA cert is required to talk to your OpenStack then obviously all
services that talk to the cloud need to have both credentials and said
cert. Currently, these users can get their credentials via cloud
credential operator, but they need to source their CA cert from
elsewhere (typically by extracting it from the cloud controller
manager's configuration). This makes configuration of services more
complicated than necessary.

Continue the resolution of the issue by storing the CA cert, if any,
in the root secret on OpenStack. When coupled with the changes
introduced in openshift/cloud-credential-operator#780 [1], this allows
us to dole out the cert to anyone who asks for it via a
'CredentialsRequest'.

[1] openshift/cloud-credential-operator#780

Signed-off-by: Stephen Finucane <[email protected]>
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Mar 26, 2025

@stephenfin: This pull request references OSASINFRA-3730 which is a valid jira issue.

In response to this:

If a CA bundle is required to talk to your OpenStack then obviously all services that talk to the cloud need to have both credentials and said bundle. Currently, these users can get their credentials via cloud credential operator, but they need to source their CA bundle from elsewhere (typically by extracting it from the cloud controller manager's configuration). This makes configuration of services more complicated than necessary.

Continue the resolution of the issue by storing the CA bundle, if any, in the root secret on OpenStack. When coupled with the changes introduced in openshift/cloud-credential-operator#780, this allows us to dole out the bundle to anyone who asks for it via a CredentialsRequest.

While we're here, we also tweak the configuration for the cloud provider to (a) start generating the configuration file in the new format expected by cluster-cloud-controller-manager-operator and (b) stop generating an old secret that only the old, now-removed in-tree OpenStack cloud provider needed and used.

EDIT: I have deferred the above changes to a different PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@stephenfin
Copy link
Contributor Author

stephenfin commented Mar 26, 2025

/unhold

The CCO change has merged.

@openshift-ci openshift-ci bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Mar 26, 2025
@stephenfin
Copy link
Contributor Author

/retest

@stephenfin
Copy link
Contributor Author

/test e2e-openstack-proxy

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 27, 2025

@stephenfin: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-vsphere-host-groups-ovn-custom-no-upgrade 5e359c0dbce90c7f7d597a2c81ee46c883bdc74d link false /test e2e-vsphere-host-groups-ovn-custom-no-upgrade
ci/prow/e2e-azure-ovn 5e359c0dbce90c7f7d597a2c81ee46c883bdc74d link true /test e2e-azure-ovn
ci/prow/e2e-azure-ovn-upi 5e359c0dbce90c7f7d597a2c81ee46c883bdc74d link false /test e2e-azure-ovn-upi
ci/prow/e2e-gcp-ovn 5e359c0dbce90c7f7d597a2c81ee46c883bdc74d link true /test e2e-gcp-ovn

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@stephenfin
Copy link
Contributor Author

/test e2e-openstack-proxy

Copy link
Member

@mandre mandre left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Mar 28, 2025
@patrickdillon
Copy link
Contributor

/approve

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 28, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: mandre, patrickdillon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 28, 2025
@stephenfin
Copy link
Contributor Author

/label acknowledge-critical-fixes-only

This is low risk since it's purely additive.

@openshift-ci openshift-ci bot added the acknowledge-critical-fixes-only Indicates if the issuer of the label is OK with the policy. label Mar 28, 2025
@openshift-merge-bot openshift-merge-bot bot merged commit 2376a18 into openshift:main Mar 28, 2025
25 checks passed
@openshift-merge-bot openshift-merge-bot bot deleted the OSASINFRA-3657 branch March 28, 2025 20:31
@openshift-bot
Copy link
Contributor

[ART PR BUILD NOTIFIER]

Distgit: ose-installer-altinfra
This PR has been included in build ose-installer-altinfra-container-v4.20.0-202503282312.p0.g2376a18.assembly.stream.el9.
All builds following this will include this PR.

@openshift-bot
Copy link
Contributor

[ART PR BUILD NOTIFIER]

Distgit: ose-installer-terraform-providers
This PR has been included in build ose-installer-terraform-providers-container-v4.19.0-202503282312.p0.g2376a18.assembly.stream.el9.
All builds following this will include this PR.

@openshift-bot
Copy link
Contributor

[ART PR BUILD NOTIFIER]

Distgit: ose-baremetal-installer
This PR has been included in build ose-baremetal-installer-container-v4.20.0-202503282312.p0.g2376a18.assembly.stream.el9.
All builds following this will include this PR.

@openshift-bot
Copy link
Contributor

[ART PR BUILD NOTIFIER]

Distgit: ose-installer-artifacts
This PR has been included in build ose-installer-artifacts-container-v4.19.0-202503282312.p0.g2376a18.assembly.stream.el9.
All builds following this will include this PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

acknowledge-critical-fixes-only Indicates if the issuer of the label is OK with the policy. approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants