Skip to content

Conversation

@sbueringer
Copy link
Owner

What this PR does / why we need it:

Which issue(s) this PR fixes (optional, in fixes #<issue number>(, fixes #<issue_number>, ...) format, will close the issue(s) when PR gets merged):
Fixes #

Special notes for your reviewer:

  1. Please confirm that if this PR changes any image versions, then that's the sole change this PR makes.

Release note:


hidekazuna and others added 3 commits July 3, 2019 16:52
This patch adds MachineDeployment template as in
cluster-api-provider-aws.
per discussion , deployment has sideeffect such as potential
race condition, so need switch to statefulset.
centos generate has some issue, missed  commands=>files changes
type KeyPair struct {
// base64 encoded cert and key
Cert []byte `json:"cert"`
Key []byte `json:"key"`

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

consider to add omitempty here?

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done


// ReconcileCertificates generate certificates if none exists.
func (s *Service) ReconcileCertificates(clusterName string, clusterProviderSpec *v1alpha1.OpenstackClusterProviderSpec) error {
if !clusterProviderSpec.CAKeyPair.HasCertAndKey() {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

from code, looks like you are trying to generate those keys? if it's generated, then how do you store them and reuse? looks to me the Spec are the desired state but if you didn't give key at beginning, it's not desired state?? just curious ..

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'll move this PR and your comment over to the kubernetes-sigs repo now that the first PR is merged :)

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

jichenjc and others added 6 commits July 11, 2019 00:54
upgrade klog from 0.1 to 0.3 to avoid no log issue
* factored out services

These changes are heavily inspired by CAPA. They should improve the structure
of the code for the upcoming addition of multi-node control plane
support.

* fix tests
)

Stefan works currently on cleaning up stuff as well as the multi master
implementation. I want him to be able to review PRs.
This is heavily inspired bei CAPA. We now reconcile and store certificates
in the Cluster CRD. Thus it's possible to distribute the same CAs over all
control plane nodes (as soon as multi-node control plane supported is
implemented). We also don't have to ssh on the/a control plane node to get
a valid kubeconfig. We now can just generate one from the CA.
… controllerClient

This enables us to run the controller outside the Workload Cluster, e.g. in a Management
Cluster.
Now it's possible to use a local userdata folder. This is mostly useful
for development to avoid updating the user data Secrets all the time.
@sbueringer sbueringer force-pushed the pr-implement-reconcile-certs branch from bb70c66 to d0bb419 Compare July 11, 2019 17:52
@sbueringer sbueringer closed this Jul 11, 2019
@sbueringer
Copy link
Owner Author

Moved to kubernetes-sigs#394

sbueringer pushed a commit that referenced this pull request Feb 22, 2021
* Makefile: add GOPROXY to docker-build build-arg

* add go version for running go env GOPROXY in Makefile

* add caas owners, simplify PR template

* use caas specific version for GIT_VERSION

* use mirrored golang image

* add kore team as owners

* update README

* use Go 1.15.8 from Harbor registry
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants