Skip to content

fix problem with disabling tls #2295

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

nicmorales9
Copy link
Contributor

@nicmorales9 nicmorales9 commented Jun 10, 2025

Description

This lifts some constraints on coordinator selection, hopefully fixes #871
(ran subset of e2e tests which reconciled, will see if the rest do)

Type of change

Please select one of the options below.

  • Bug fix (non-breaking change which fixes an issue)

Discussion

Are there any design details that you would like to discuss further?

Testing

Please describe the tests that you ran to verify your changes. Unit tests?
Manual testing?

Do we need to perform additional testing once this is merged, or perform in a larger testing environment?

Documentation

Did you update relevant documentation within this repository?

If this change is adding new functionality, do we need to describe it in our user manual?

If this change is adding or removing subreconcilers, have we updated the core technical design doc to reflect that?

If this change is adding new safety checks or new potential failure modes, have we documented and how to debug potential issues?

Follow-up

Are there any follow-up issues that we should pursue in the future?

Does this introduce new defaults that we should re-evaluate in the future?

@foundationdb-ci
Copy link
Contributor

Result of fdb-kubernetes-operator-pr on Linux RHEL 9

  • Commit ID: 309ad4a
  • Duration 2:39:23
  • Result: ❌ FAILED
  • Error: Error while executing command: if $fail_test; then exit 1; fi. Reason: exit status 1
  • Build Log terminal output (available for 30 days)
  • Build Workspace zip file of the working directory (available for 30 days)

var ipAddress fdbv1beta2.ProcessAddress
for _, addr := range addresses {
if addr.Flags["tls"] == cluster.Spec.MainContainer.EnableTLS {
if mixedTls || (addr.Flags["tls"] == cluster.Spec.MainContainer.EnableTLS) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not totally sure in which cases that should help. In cased of "mixed TLS" the processes should have the right listen address anyways (either tls or non-tls, depending on the migration path). Would be nice if you could add some additional information why this change is needed. What are the risks of this change?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry still very much a WIP, I want to do a few more tests to be sure this solves it on some edge cases. I haven't looked much at the risks yet (I did figure the generation condition would protect against most of them) - wanted to make sure it works first haha.

When I was doing some tests disabling TLS, the listen address was still using TLS when the maincontainer.enableTls was set to false, and this TLS-match-condition caused the coordinator addresses to be seen as invalid, and the operator wasn't able to select coordinators. It might be a different or FDB bug that the addresses were still on TLS though

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

TLS disabling and enabling leads cluster to unavailability
3 participants