-
Notifications
You must be signed in to change notification settings - Fork 252
Open
0 / 10 of 1 issue completedOpen
0 / 10 of 1 issue completed
Copy link
Labels
internal/trackingThis is an issue tracking release of a PR across multiple verisonsThis is an issue tracking release of a PR across multiple verisonsrelease/v14Targets release v14.x correlating to Rancher's v2.14.xTargets release v14.x correlating to Rancher's v2.14.x
Description
This is the tracking issue for #1626
Please add labels indicating the release versions eg. 'release/v13'
Please add comments for user issues which this issue addresses.
Description copied from PR:
Issue
Resolves #1299
Problem
When enabling the local_auth_endpoint for a cluster, users could not opt into using the internally generated CA certificate.
Attempting to retrieve the CA certificate through a data.rancher2_cluster data source led to a dependency cycle, and only an external CA could be configured directly.
Solution
- Added a
use_internal_ca_certsboolean flag inside thelocal_auth_endpointblock, mutually exclusive withca_certs. - Introduced logic to fetch the cluster’s internal CA and populate it when
use_internal_ca_certsis true during create, update, and read operations. - Updated diff handling and helper functions so the flag is tracked in state and diffed correctly.
- Expanded resource documentation and unit tests to cover the new behavior.
Testing
Engineering Testing
- Ran
make buildto compile the provider. - Verified
go test ./rancher2 -run TestExpandClusterV2LocalAuthEndpoint -count=1 -vafter enabling the new flag. - Executed
make testto confirm all unit tests pass with the new logic.
Automated Testing
- Added unit tests for
TestExpandClusterV2LocalAuthEndpointand updated existing tests to assert state preservation ofuse_internal_ca_certs. - Existing unit test suite validates mutual exclusivity between
ca_certsanduse_internal_ca_certs.
QA Testing Considerations
- Confirm that enabling
use_internal_ca_certson a cluster withlocal_auth_endpointcorrectly pulls internal CA data without requiring explicitca_certs. - Validate upgrade scenarios: clusters configured with
ca_certsshould behave unchanged, while togglinguse_internal_ca_certsshould swap to internal CA seamlessly.
Regressions Considerations
- Potential regression in cluster diffing logic around
local_auth_endpointfields; verify that state refresh and plan outputs remain stable. - Low probability, but focus on any workflows combining
use_internal_ca_certswith other cluster CA options.
Reactions are currently unavailable
Sub-issues
Metadata
Metadata
Assignees
Labels
internal/trackingThis is an issue tracking release of a PR across multiple verisonsThis is an issue tracking release of a PR across multiple verisonsrelease/v14Targets release v14.x correlating to Rancher's v2.14.xTargets release v14.x correlating to Rancher's v2.14.x