-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Validate the availability of traefik container before updating CA cer… #267
Validate the availability of traefik container before updating CA cer… #267
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you verify that we can indeed remove the defer() call and still have the charm work as intended?
0103dbe
to
8f1bc7e
Compare
490bfe9
to
a200a53
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
very nice, thanks!
Signed-off-by: gatici <[email protected]>
Thanks @gatici for this important fix! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1
Validate the availability of traefik container before updating CA certs
Issue
While updating CA certificates when CertificateTransfer relation joined, traefik container many not be running yet. This causes ConnectionError like https://github.com/canonical/vault-k8s-operator/actions/runs/6430745831/job/17462295379?pr=53.
Solution
Availability of traefik container needs to be checked before trying to update CA certs
Context
The issue is appeared when Traefik is related with Vault-k8s using CertificateTransfer interface.
Testing Instructions
Run
tox -e integration
.Release Notes
This PR aims to fix the bug: #265.
First #266 needs to be merged as it fixes some existing test problems in main branch. Otherwise, some tests are failing regardless of this PR.