-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ Add FrontProxy controller #20
Conversation
Hi @SimonTheLeg. Thanks for your PR. I'm waiting for a kcp-dev member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
f8039f8
to
db1149d
Compare
/ok-to-test |
db1149d
to
d68bbaa
Compare
On-behalf-of: SAP simon.bein@sap.com Signed-off-by: Simon Bein <simontheleg@gmail.com>
Co-authored-by: Marvin Beckers <marvin@kubermatic.com> On-behalf-of: SAP simon.bein@sap.com Signed-off-by: Simon Bein <simontheleg@gmail.com> Signed-off-by: Marvin Beckers <marvin@kubermatic.com>
On-behalf-of: SAP <marvin.beckers@sap.com> Signed-off-by: Marvin Beckers <marvin@kubermatic.com>
On-behalf-of: SAP <marvin.beckers@sap.com> Signed-off-by: Marvin Beckers <marvin@kubermatic.com>
On-behalf-of: SAP <marvin.beckers@sap.com> Signed-off-by: Marvin Beckers <marvin@kubermatic.com>
On-behalf-of: SAP <marvin.beckers@sap.com> Signed-off-by: Marvin Beckers <marvin@kubermatic.com>
On-behalf-of: SAP <marvin.beckers@sap.com> Signed-off-by: Marvin Beckers <marvin@kubermatic.com>
On-behalf-of: SAP <marvin.beckers@sap.com> Signed-off-by: Marvin Beckers <marvin@kubermatic.com>
6e52f96
to
1e6054b
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
LGTM label has been added. Git tree hash: d296437090b0f4269c7049c85a8b79dd375a35b1
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: xrstf The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Summary
Adds Support for FrontProxy
Some bits and bobs about this, due to timeconstraints:
Currently this code will create all certificates, cas, issuers, configmaps and deployments when a frontproxy resource is added. The frontproxy pod is starting up and does not crash. This was the last topic I got it to. I have not yet verified that it actually does the correct connections and so on. Steps to get this working locally so far
Since we dropped the
-cert
suffix from the operator (compared to the helm chart), the secret created from the issuer $rootshard-$frontproxy-kubeconfig would have the same name as the other kubeconfig secret, which is created by the operator. For this reason I have renamed the latter one to $rootshard-$frontproxy-dynamic-kubeconfig. Dynamic because this kubeconfig as far as I understand it is dynamically changed by the front-proxy. I am also open for other names, this was just the first thing that came to mind :DI don’t know if there are additional mounts required in the rootshard deployment. I did not check this yet.
The whole templating of names is still a bit messy atm. I tried to make this similar to our new structure in resources.go, but did not have the time to migrate all of them properly.
@embik for now I dropped what we chatted about with the "fp" identifier, because after revisiting the $rootshard-$frontproxy scoping in the chart, I noticed that there were no more overlaps
I have started using FrontProxyBasepath variable to denote common paths, but it is not done everywhere. I am not sure whether we want to have this templated everywhere or hardcoded everywhere. ptal
There is an issue with how the secret is reconciled after you stop the operator locally and restart it. I did not have the time to look further into it, but I am sure it's just a minor thing somewhere in the ReconcilerFunc
I have created a dirty
deployment_test.go
thing, which can just quick and dirty render out the deployment yaml. Maybe it is of help also for you :)Related issue(s)
Fixes #10
Release Notes