The orchestrator was minting a fresh client cert (CN = local cluster name) for each peer connection. Even with PR #1530's "sign with peer's CA" fix the TLS handshake succeeded but etcd RBAC rejected: error="etcdserver: permission denied" Cilium's clustermesh-apiserver etcd has RBAC with a `remote` user that has read access on the cilium/* prefix. The chart generates `kube-system/clustermesh-apiserver-remote-cert` with CN=`remote`. Canonical `cilium clustermesh connect` CLI copies THIS Secret's tls.crt/tls.key as the client cert the REMOTE cluster presents — matches the etcd RBAC user verbatim. This PR adopts that pattern: snapshotRemoteCert() reads the peer's existing `clustermesh-apiserver-remote-cert` Secret, returns tls.crt + tls.key bytes, and the orchestrator writes them into A's `cilium-clustermesh` Secret instead of minting. Caught on t129 (6cddff7ef4432bdc, 2026-05-16): - TLS handshake succeeded after firewall fix (PR #1538) opened NodePort range so LB→backend health check passed - cilium-dbg status reported `etcd: 1/1 connected, has-quorum=true` (TLS path working) - BUT `remote configuration: expected=true, retrieved=false` and agent logs spammed `etcdserver: permission denied` With this PR's CN=remote cert, etcd authorizes the kvstore List and clustermesh sync completes — agent should flip to `2/2 remote clusters ready`. Completes the D11 chain: #1525 (regionKeyFromSpec) → #1528 (clusterName derivation) → #1530 (cert with peer's CA — no longer needed but kept as defense-in-depth) → #1536 (hostAlias pattern) → #1538 (firewall NodePort range) → this. Refs DoD D11. Co-authored-by: hatiyildiz <hatice.yildiz@openova.io> Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| bootstrap | ||
| chart | ||
| README.md | ||
OpenOva Catalyst (composite Blueprint)
The umbrella Blueprint bp-catalyst-platform — composes the Catalyst control plane.
Status: Deployed. Updated: 2026-04-28.
This product directory contains:
chart/— the Helm chart that deploys Catalyst-Zero on a Kubernetes cluster (and every franchised Sovereign).chart/templates/{ui,api}-deployment.yaml+ service + ingress — the catalyst-ui (React SPA wizard scaffold) and catalyst-api (Go bootstrap API) workloads.chart/templates/sme-services/— 11 manifests for the legacy SME backend services + the consolidatedconsole,admin,marketplaceUI workloads (sourced fromcore/{console,admin,marketplace}/).chart/templates/marketplace-api/— manifests for the Go marketplace-api backend (sourced fromcore/marketplace-api/).bootstrap/{ui,api}/— the source code for catalyst-ui and catalyst-api (deployed via the catalyst-build CI workflow).
For the unified architecture and the wizard's target shape, see docs/PROVISIONING-PLAN.md, docs/ARCHITECTURE.md, and docs/SOVEREIGN-PROVISIONING.md.
How Catalyst-Zero is deployed today
A Flux Kustomization on the Catalyst-Zero cluster (Contabo k3s) reconciles products/catalyst/chart/templates/ from this public repo. CI workflows (.github/workflows/{catalyst,console,admin,marketplace,marketplace-api}-build.yaml) build and push images on every push to main, then the deploy step pins the image SHA into the corresponding manifest in this directory and commits back. Flux picks up the commit and rolls the deployment.
Image registry: ghcr.io/openova-io/openova/{catalyst-ui,catalyst-api,console,admin,marketplace,marketplace-api}:<sha>.
Migration status (per docs/PROVISIONING-PLAN.md)
| Component | Source location | Image | Status |
|---|---|---|---|
| catalyst-ui | products/catalyst/bootstrap/ui/ |
ghcr.io/openova-io/openova/catalyst-ui |
✅ public repo |
| catalyst-api | products/catalyst/bootstrap/api/ |
ghcr.io/openova-io/openova/catalyst-api |
✅ public repo |
| console | core/console/ |
ghcr.io/openova-io/openova/console |
✅ public repo (Phase 1) |
| admin | core/admin/ |
ghcr.io/openova-io/openova/admin |
✅ public repo (Phase 1) |
| marketplace | core/marketplace/ |
ghcr.io/openova-io/openova/marketplace |
✅ public repo (Phase 1) |
| marketplace-api | core/marketplace-api/ |
ghcr.io/openova-io/openova/marketplace-api |
✅ public repo (Phase 1) |
| sme-{auth,billing,catalog,domain,gateway,notification,provisioning,tenant} | (still in openova-private/services/) | ghcr.io/openova-io/openova-private/sme-* |
⏳ follow-up phase — source not yet moved |