Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use multiple Ceph secrets in ci_dcn_site role #2518

Draft
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

fultonj
Copy link
Contributor

@fultonj fultonj commented Nov 6, 2024

Without this patch the ci_dcn_site role creates
one secret with all Ceph keys and distributes
all of these keys to all DCN sites. This patch
makes the role create one secret for each DCN
site and only that secret is used at that site.
The secret for each DCN site only has the keys
that are required. This will make the testing
consistent with the documentation.

Additional secrets for Ceph configuration are
created and extraMounts for both the control
plane and each dataplane is extended to include
the extra secrets so that not all of the Ceph
keys are distributed.

Jira: https://issues.redhat.com/browse/OSPRH-6603

Without this patch the ci_dcn_site role creates
one secret with all Ceph keys and distributes
all of these keys to all DCN sites. This patch
makes the role create one secret for each DCN
site and only that secret is used at that site.
The secret for each DCN site only has the keys
that are required. This will make the testing
consistent with the documentation.

Additional secrets for Ceph configuration are
created and `extraMounts` for both the control
plane and each dataplane is extended to include
the extra secrets so that not all of the Ceph
keys are distributed.

Jira: https://issues.redhat.com/browse/OSPRH-6603

Signed-off-by: John Fulton <[email protected]>
Copy link
Contributor

openshift-ci bot commented Nov 6, 2024

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please ask for approval from fultonj. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@github-actions github-actions bot marked this pull request as draft November 6, 2024 01:15
Copy link

github-actions bot commented Nov 6, 2024

Thanks for the PR! ❤️
I'm marking it as a draft, once your happy with it merging and the PR is passing CI, click the "Ready for review" button below.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant