-
Notifications
You must be signed in to change notification settings - Fork 1
Add support for custom CA bundle #3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Slicer launches microVMs on KVM-enabled hosts with K3s and a join token to add and remove new nodes dynamically, which are fully isolated through Firecracker. Signed-off-by: Alex Ellis (OpenFaaS Ltd) <alexellis2@gmail.com>
Add support for custom CA bundles when communicating with Slicer APIs to enable secure connections with self-signed certificates or internal certificate authorities. Signed-off-by: Han Verstraete (OpenFaaS Ltd) <han@openfaas.com>
AI Pull Request OverviewSummary
Summary per fileSummary per file
Overall AssessmentOverall AssessmentThe PR successfully adds a new cloud provider for Slicer, enabling autoscaling on microVMs. The implementation follows the established patterns in the codebase. However, there are several issues that need addressing: inconsistent node sizing between creation and template, excessive logging at Info level, debug code left in production, and lack of tests. The CA bundle feature is a good security addition but should validate the file path. Overall, the PR is functional but requires cleanup and fixes before merging. Detailed ReviewDetailed Reviewcluster-autoscaler/cloudprovider/slicer/slicer_cloud_provider.go
cluster-autoscaler/cloudprovider/slicer/slicer_node_group.go
cluster-autoscaler/core/static_autoscaler.go
Testing
Security
Performance
Documentation
AI agent details. |
What type of PR is this?
/kind feature
What this PR does / why we need it:
Add support for custom CA bundles when communicating with Slicer APIs
to enable secure connections with self-signed certificates or internal
certificate authorities.