You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -87,7 +82,7 @@ type OpenStackIdentityReference struct {
87
82
// +optional
88
83
Namestring`json:"name,omitempty"`
89
84
90
-
// CloudName required for Secret type, ignored for ClusterIdentity type
85
+
// CloudName required for Secret type, forbidden for ClusterIdentity type
91
86
// +optional
92
87
CloudNamestring`json:"cloudName,omitempty"`
93
88
@@ -188,7 +183,7 @@ type OpenStackIdentityReference struct {
188
183
// +optional
189
184
Namestring`json:"name,omitempty"`
190
185
191
-
// CloudName required for Secret type, ignored for ClusterIdentity type
186
+
// CloudName required for Secret type, forbidden for ClusterIdentity type
192
187
// +optional
193
188
CloudNamestring`json:"cloudName,omitempty"`
194
189
@@ -343,42 +338,4 @@ This change automatically enables cluster identity support for:
343
338
- `OpenStackMachine`resources
344
339
- `OpenStackServer`resources
345
340
346
-
## Conditions
347
-
348
-
Following the existing CAPO pattern for simple resources (like OpenStackFloatingIPPool), the `OpenStackClusterIdentityStatus` uses a single condition:
349
-
350
-
- **Ready**: Indicates whether the identity can be used for authentication. This includes secret accessibility, structure validation, and credential validation. Different reason codes provide specific failure details.
351
-
352
-
### Example Condition States
353
-
354
-
**Secret not found:**
355
-
```yaml
356
-
status:
357
-
conditions:
358
-
- type: Ready
359
-
status: "False"
360
-
reason: SecretNotFound
361
-
message: "Secret 'openstack-creds' not found in namespace 'capo-system'"
362
-
```
363
-
364
-
**Authentication failure:**
365
-
```yaml
366
-
status:
367
-
conditions:
368
-
- type: Ready
369
-
status: "False"
370
-
reason: AuthenticationFailed
371
-
message: "OpenStack authentication failed: invalid credentials for cloud 'openstack'"
This proposal provides centralized credential management while maintaining full backward compatibility and following established Kubernetes patterns (discriminated union).
0 commit comments