Skip to content

Conversation

@eofff
Copy link
Contributor

@eofff eofff commented Dec 11, 2025

Description

React to creating and modifying provisioning secrets.

Why do we need it, and what problem does it solve?

If a VM refers to a provisioning secret and is created before it exists, it may remain pending because there is no reason to reconcile.

What is the expected result?

A VM starts.

Checklist

  • The code is covered by unit tests.
  • e2e tests passed.
  • Documentation updated according to the changes.
  • Changes were tested in the Kubernetes cluster manually.

Changelog entries

section: vm
type: fix
summary: React to creating and modifying provisioning secrets.
impact_level: low

fix
Signed-off-by: Valeriy Khorunzhin <[email protected]>
@eofff eofff added this to the v1.3.0 milestone Dec 11, 2025
Signed-off-by: Valeriy Khorunzhin <[email protected]>
@eofff eofff modified the milestones: v1.3.0, v1.4.0 Dec 11, 2025
@eofff eofff added the e2e/run Run e2e test on cluster of PR author label Dec 12, 2025
@deckhouse-BOaTswain
Copy link
Contributor

Workflow has started.
Follow the progress here: Workflow Run

@eofff eofff merged commit e20f167 into main Dec 12, 2025
53 of 55 checks passed
@eofff eofff deleted the fix/vm/watch-for-secrets branch December 12, 2025 10:17
@eofff eofff removed the e2e/run Run e2e test on cluster of PR author label Dec 12, 2025
Isteb4k pushed a commit that referenced this pull request Dec 15, 2025
Signed-off-by: Valeriy Khorunzhin <[email protected]>
(cherry picked from commit e20f167)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants