docs(seinode): LLD for sidecar TLS via externally-provisioned Secret#256
Merged
Merged
Conversation
Captures the revised design that replaces the in-place-toggle approach explored in closed PR #254. Lands as a doc-only PR so subsequent implementation work in #255 can reference a merged design. Key design decisions (§0.1): - Externalize cert ownership: operator/platform tooling provisions the kubernetes.io/tls Secret; controller references it by name and gates on presence + cert validity. Mirrors signingKey / nodeKey / operatorKeyring / imported-PVC patterns already in the controller. - spec.sidecar.tls is immutable post-creation; toggle via delete + recreate with PVC retention. - Cert→SeiNode contract is machine-readable via status.sidecarTLS.{secretName, requiredDNSNames} — no naming- convention docs the operator must find. Collapses the drift detector, observer task, status mirror, condition reason expansion, classifyPlan discrimination, cert-manager Ready logic, and Issuer trust-anchor security surface. CRD shrinks to spec.sidecar.tls.secretName: string + immutability CEL. Tracking: #255. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
|
You have used all Bugbot PR reviews included in your free trial for your GitHub account on this workspace. To continue using Bugbot reviews, enable Bugbot for your team in the Cursor dashboard. |
8 tasks
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
spec.sidecar.tlsimmutable.Design at a glance (LLD §0.1)
Three coupled decisions:
kubernetes.io/tlsSecret; controller references it by name and gates on presence + cert validity. MirrorssigningKey/nodeKey/operatorKeyring/ imported-PVC patterns already in the controller.status.sidecarTLS.{secretName, requiredDNSNames}whenever TLS is enabled. Platform tooling reads this directly — no naming-convention docs the operator must find.What collapses (vs. PR #254 design)
sidecarTLSDrift)status.currentSidecarTLS)TLSToggleStarted,UpdateAndTLSToggleStarted)classifyPlandiscriminationApplySidecarCerttask andGenerateSidecarCertificategeneratorObserveSidecarTLStaskIssuerName/IssuerKind)CRD shrinks to
spec.sidecar.tls.secretName: string+ immutability CEL.What stays
noderesourcepod/service generation with the existingif SidecarTLSEnabled(node) { ... }branchingApplyRBACProxyConfigtask (controller-owned, namespace/name-dependent)Tracking
Test plan
This is a doc-only PR; verification of the design happens in #255's implementation tests (LLD §8 lists them). Reviewing here is reviewing the design itself — section by section.
🤖 Generated with Claude Code