Skip to content

THIS REPO IS FOR PR JOB TESTING ONLY#3

Closed
smarterclayton wants to merge 1 commit intoopenshift:masterfrom
smarterclayton:dockerfile
Closed

THIS REPO IS FOR PR JOB TESTING ONLY#3
smarterclayton wants to merge 1 commit intoopenshift:masterfrom
smarterclayton:dockerfile

Conversation

@smarterclayton
Copy link
Copy Markdown
Contributor

Before creating your PR, please make sure to add the appropriate GitHub labels
like e.g. run-smoke-tests + platform/<xxx>. For more details see
tests/README.md.

(In case you don't have permissions to add labels, please ask a
Maintainer.)

@openshift-ci-robot openshift-ci-robot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Jun 21, 2018
@smarterclayton
Copy link
Copy Markdown
Contributor Author

/retest

@smarterclayton smarterclayton changed the title Test change THIS REPO IS FOR PR JOB TESTING ONLY Jun 22, 2018
@smarterclayton
Copy link
Copy Markdown
Contributor Author

/retest

1 similar comment
@smarterclayton
Copy link
Copy Markdown
Contributor Author

/retest

@openshift-docker
Copy link
Copy Markdown

openshift-docker commented Jun 25, 2018 via email

@smarterclayton
Copy link
Copy Markdown
Contributor Author

/retest

1 similar comment
@smarterclayton
Copy link
Copy Markdown
Contributor Author

/retest

@smarterclayton
Copy link
Copy Markdown
Contributor Author

/test e2e-aws

@smarterclayton
Copy link
Copy Markdown
Contributor Author

/retest

@smarterclayton
Copy link
Copy Markdown
Contributor Author

/test e2e-aws

@crawford
Copy link
Copy Markdown
Contributor

crawford commented Jul 6, 2018

It looks like this can be closed. I'd close it for you, @smarterclayton but I don't have permissions anymore.

@smarterclayton
Copy link
Copy Markdown
Contributor Author

I need to set up a team for this group, will make someone an admin

@smarterclayton
Copy link
Copy Markdown
Contributor Author

smarterclayton commented Jul 6, 2018 via email

@smarterclayton
Copy link
Copy Markdown
Contributor Author

smarterclayton commented Jul 6, 2018 via email

mandre pushed a commit to mandre/installer that referenced this pull request Aug 19, 2019
stbenjam pushed a commit to stbenjam/installer that referenced this pull request Feb 10, 2021
bpradipt added a commit to bpradipt/installer that referenced this pull request Jun 3, 2021
Patch Series to add loadbalancer TF resources
bennerv pushed a commit to bennerv/installer that referenced this pull request Jun 4, 2021
Use Ignition v2 Spec for Backwards Compatibility
zaneb pushed a commit to zaneb/openshift-installer that referenced this pull request Apr 29, 2022
rvanderp3 referenced this pull request in openshift-splat-team/installer Apr 14, 2026
This commit implements Story #3: Install Config Schema Extension for
vSphere Multi-Account Credentials. It extends the install-config.yaml
schema to support per-component credentials while maintaining backward
compatibility with legacy single-account mode.

Changes:
- Add ComponentCredentials struct with fields for installer, machineAPI,
  csiDriver, cloudController, and diagnostics components
- Add AccountCredentials struct supporting multi-vCenter topologies
- Add platform field for optional ComponentCredentials
- Create test stubs for schema validation (6 test scenarios)
- Create test stubs for install-config integration tests

Test Plan:
- Unit tests in pkg/types/vsphere/validation_test.go
- Default/fallback tests in pkg/types/vsphere/defaults_test.go
- Integration tests in pkg/asset/installconfig/vsphere/validation_test.go

All tests are currently stub implementations marked with t.Skip() and
will be fully implemented in subsequent iterations.

Related: openshift-splat-team/splat-team#3
Parent: openshift-splat-team/splat-team#2

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
rvanderp3 referenced this pull request in openshift-splat-team/installer Apr 14, 2026
Add vSphere privilege validation logic using component-specific
privilege lists. Validates that each OpenShift component account
(installer, machine-api, csi-driver, cloud-controller, diagnostics)
has required vCenter permissions before installation proceeds.

Implementation:
- PrivilegeValidator struct with ValidateComponentPrivileges method
- ValidationResult struct with Valid, MissingPrivileges, Scope fields
- GetRequiredPrivileges() function with comprehensive privilege lists
  - Installer: ~45 privileges for infrastructure deployment
  - Machine API: ~35 privileges for VM lifecycle
  - CSI Driver: ~12 privileges for storage provisioning
  - Cloud Controller: ~10 read-only privileges for node discovery
  - Diagnostics: ~5 read-only privileges for troubleshooting

Test coverage:
- 9 test scenarios covering all acceptance criteria
- Missing privilege detection (machine-api, csi-driver)
- Successful validation for all components
- Component-specific privilege sets
- Error handling

Foundation for Story #4: Privilege Validation
Parent Epic: #2 - vSphere Multi-Account Credentials
Depends on: Story #3 (schema extension)

Related: openshift-splat-team/splat-team#4
Related: openshift-splat-team/splat-team#2

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
rvanderp3 referenced this pull request in openshift-splat-team/installer Apr 14, 2026
This commit implements the greenfield installation flow for per-component
vSphere credentials (Story #6), enabling distinct vCenter accounts for each
OpenShift component to improve security posture through principle of least
privilege.

Implementation:
- percomponent.go: Integration logic for credential validation and selection
  - ValidatePerComponentCredentials: Validates all 5 component credentials
  - GetInstallerCredentials: Returns installer credentials for infrastructure
  - IsPerComponentMode: Detects per-component vs legacy mode
  - Helper functions for vCenter/credential resolution
- integration_test.go: 8 integration test scenarios
  - Happy path: All 5 accounts configured and validated
  - Validation failures: Missing privileges for installer, machine-api, csi-driver
  - Component secret isolation: RBAC verification
  - Runtime credential usage: Machine API, CSI, CCM, Diagnostics
- vsphere_percomponent_test.go: 2 E2E test scenarios
  - Full installation flow with all components
  - vCenter audit log verification for distinct usernames

Test Coverage:
- 10 test scenarios covering all acceptance criteria
- Integration with Stories #3 (schema), #4 (validation), #5 (CCO)
- All tests compile successfully
- Tests skip with "Implementation pending" (TDD approach)

Acceptance Criteria:
- AC1: Installer validates component credentials have required privileges
- AC2: Installer uses installer account for infrastructure provisioning
- AC3: CCO creates component-specific secrets
- AC4-AC7: Components use their specific credentials at runtime
- AC8: vCenter audit logs show distinct usernames

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants