Bug 2055715 - [external mode] do not validate csi secrets
Summary: [external mode] do not validate csi secrets
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat OpenShift Data Foundation
Classification: Red Hat Storage
Component: rook
Version: 4.10
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
: ODF 4.10.0
Assignee: Sébastien Han
QA Contact: Neha Berry
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-02-17 15:00 UTC by Sébastien Han
Modified: 2023-08-09 17:03 UTC (History)
6 users (show)

Fixed In Version: 4.10.0-163
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-04-21 09:12:46 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github red-hat-storage rook pull 347 0 None open Bug 2055715: various external mode enhancements 2022-02-17 16:40:36 UTC
Github rook rook pull 9760 0 None open core: various external mode enhancements 2022-02-17 15:01:05 UTC

Description Sébastien Han 2022-02-17 15:00:34 UTC
In the OCS to OCS case, the Ceph-CSI secret names are different (unique to each consumer), Rook was validating the existence of hardcoded secret names (the one used in the StorageClass example), in external mode this is not needed so we should not validate the secret names.


Note You need to log in before you can comment on or make changes to this bug.