Skip to content

Conversation

@kstrenkova
Copy link
Contributor

The hook was supposed to create a secret with custom ca certs and also update the Openstack control-plane to use it. This approach has brought some issues with the control-plane restarting, so we want to change the approach to creating the secret only. The use of the secret will be done separately.

@kstrenkova kstrenkova requested a review from a team as a code owner November 13, 2025 13:15
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 13, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

The hook was supposed to create a secret with custom ca certs and
also update the Openstack control-plane to use it. This approach
has brought some issues with the control-plane restarting, so we
want to change the approach to creating the secret only. The use of
the secret will be done separately.

Signed-off-by: Katarina Strenkova <[email protected]>
connection: local
vars:
_custom_ca_cert_filepath: "{{ custom_ca_cert_filepath | mandatory }}"
_custom_ca_cert_url: "{{ custom_ca_cert_url | mandatory }}"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(non-blocking) question: Don't we want to maintain functionallity to slurp local ca_cert?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants