allow using both infrastructure_roles_options (#1090)
* allow using both infrastructure_roles_options * new default values for user and role definition * use robot_zmon as parent role * add operator log to debug * right name for old secret * only extract if rolesDefs is empty * set password1 in old infrastructure role * fix new infra rile secret * choose different role key for new secret * set memberof everywhere * reenable all tests * reflect feedback * remove condition for rolesDefs
This commit is contained in:
parent
7cf2fae6df
commit
43163cf83b
|
|
@ -149,6 +149,10 @@ spec:
|
||||||
type: string
|
type: string
|
||||||
rolekey:
|
rolekey:
|
||||||
type: string
|
type: string
|
||||||
|
defaultuservalue:
|
||||||
|
type: string
|
||||||
|
defaultrolevalue:
|
||||||
|
type: string
|
||||||
details:
|
details:
|
||||||
type: string
|
type: string
|
||||||
template:
|
template:
|
||||||
|
|
|
||||||
File diff suppressed because it is too large
Load Diff
|
|
@ -3,8 +3,6 @@ data:
|
||||||
# infrastructure role definition in the new format
|
# infrastructure role definition in the new format
|
||||||
# robot_zmon_acid_monitoring_new
|
# robot_zmon_acid_monitoring_new
|
||||||
user: cm9ib3Rfem1vbl9hY2lkX21vbml0b3JpbmdfbmV3
|
user: cm9ib3Rfem1vbl9hY2lkX21vbml0b3JpbmdfbmV3
|
||||||
# robot_zmon_new
|
|
||||||
role: cm9ib3Rfem1vbl9uZXc=
|
|
||||||
# foobar_new
|
# foobar_new
|
||||||
password: Zm9vYmFyX25ldw==
|
password: Zm9vYmFyX25ldw==
|
||||||
kind: Secret
|
kind: Secret
|
||||||
|
|
|
||||||
|
|
@ -7,12 +7,14 @@ data:
|
||||||
# provide other options in the configmap.
|
# provide other options in the configmap.
|
||||||
# robot_zmon_acid_monitoring
|
# robot_zmon_acid_monitoring
|
||||||
user1: cm9ib3Rfem1vbl9hY2lkX21vbml0b3Jpbmc=
|
user1: cm9ib3Rfem1vbl9hY2lkX21vbml0b3Jpbmc=
|
||||||
|
# foobar
|
||||||
|
password1: Zm9vYmFy
|
||||||
# robot_zmon
|
# robot_zmon
|
||||||
inrole1: cm9ib3Rfem1vbg==
|
inrole1: cm9ib3Rfem1vbg==
|
||||||
# testuser
|
# testuser
|
||||||
user2: dGVzdHVzZXI=
|
user2: dGVzdHVzZXI=
|
||||||
# foobar
|
# testpassword
|
||||||
password2: Zm9vYmFy
|
password2: dGVzdHBhc3N3b3Jk
|
||||||
# user batman with the password justice
|
# user batman with the password justice
|
||||||
# look for other fields in the infrastructure roles configmap
|
# look for other fields in the infrastructure roles configmap
|
||||||
batman: anVzdGljZQ==
|
batman: anVzdGljZQ==
|
||||||
|
|
|
||||||
|
|
@ -145,6 +145,10 @@ spec:
|
||||||
type: string
|
type: string
|
||||||
rolekey:
|
rolekey:
|
||||||
type: string
|
type: string
|
||||||
|
defaultuservalue:
|
||||||
|
type: string
|
||||||
|
defaultrolevalue:
|
||||||
|
type: string
|
||||||
details:
|
details:
|
||||||
type: string
|
type: string
|
||||||
template:
|
template:
|
||||||
|
|
|
||||||
|
|
@ -930,6 +930,12 @@ var OperatorConfigCRDResourceValidation = apiextv1beta1.CustomResourceValidation
|
||||||
"rolekey": {
|
"rolekey": {
|
||||||
Type: "string",
|
Type: "string",
|
||||||
},
|
},
|
||||||
|
"defaultuservalue": {
|
||||||
|
Type: "string",
|
||||||
|
},
|
||||||
|
"defaultrolevalue": {
|
||||||
|
Type: "string",
|
||||||
|
},
|
||||||
"details": {
|
"details": {
|
||||||
Type: "string",
|
Type: "string",
|
||||||
},
|
},
|
||||||
|
|
|
||||||
|
|
@ -207,7 +207,7 @@ func (c *Cluster) deleteConnectionPooler() (err error) {
|
||||||
serviceName = service.Name
|
serviceName = service.Name
|
||||||
}
|
}
|
||||||
|
|
||||||
// set delete propagation policy to foreground, so that all the dependant
|
// set delete propagation policy to foreground, so that all the dependent
|
||||||
// will be deleted.
|
// will be deleted.
|
||||||
err = c.KubeClient.
|
err = c.KubeClient.
|
||||||
Services(c.Namespace).
|
Services(c.Namespace).
|
||||||
|
|
|
||||||
|
|
@ -15,6 +15,7 @@ import (
|
||||||
acidv1 "github.com/zalando/postgres-operator/pkg/apis/acid.zalan.do/v1"
|
acidv1 "github.com/zalando/postgres-operator/pkg/apis/acid.zalan.do/v1"
|
||||||
"github.com/zalando/postgres-operator/pkg/cluster"
|
"github.com/zalando/postgres-operator/pkg/cluster"
|
||||||
"github.com/zalando/postgres-operator/pkg/spec"
|
"github.com/zalando/postgres-operator/pkg/spec"
|
||||||
|
"github.com/zalando/postgres-operator/pkg/util"
|
||||||
"github.com/zalando/postgres-operator/pkg/util/config"
|
"github.com/zalando/postgres-operator/pkg/util/config"
|
||||||
"github.com/zalando/postgres-operator/pkg/util/k8sutil"
|
"github.com/zalando/postgres-operator/pkg/util/k8sutil"
|
||||||
"gopkg.in/yaml.v2"
|
"gopkg.in/yaml.v2"
|
||||||
|
|
@ -118,13 +119,9 @@ var emptyName = (spec.NamespacedName{})
|
||||||
// configuration in ConfigMap & CRD.
|
// configuration in ConfigMap & CRD.
|
||||||
func (c *Controller) getInfrastructureRoleDefinitions() []*config.InfrastructureRole {
|
func (c *Controller) getInfrastructureRoleDefinitions() []*config.InfrastructureRole {
|
||||||
var roleDef config.InfrastructureRole
|
var roleDef config.InfrastructureRole
|
||||||
rolesDefs := c.opConfig.InfrastructureRoles
|
|
||||||
|
|
||||||
if c.opConfig.InfrastructureRolesSecretName == emptyName {
|
// take from CRD configuration
|
||||||
// All the other possibilities require secret name to be present, so if
|
rolesDefs := c.opConfig.InfrastructureRoles
|
||||||
// it is not, then nothing else to be done here.
|
|
||||||
return rolesDefs
|
|
||||||
}
|
|
||||||
|
|
||||||
// check if we can extract something from the configmap config option
|
// check if we can extract something from the configmap config option
|
||||||
if c.opConfig.InfrastructureRolesDefs != "" {
|
if c.opConfig.InfrastructureRolesDefs != "" {
|
||||||
|
|
@ -163,27 +160,33 @@ func (c *Controller) getInfrastructureRoleDefinitions() []*config.Infrastructure
|
||||||
roleDef.PasswordKey = value
|
roleDef.PasswordKey = value
|
||||||
case "rolekey":
|
case "rolekey":
|
||||||
roleDef.RoleKey = value
|
roleDef.RoleKey = value
|
||||||
|
case "defaultuservalue":
|
||||||
|
roleDef.DefaultUserValue = value
|
||||||
|
case "defaultrolevalue":
|
||||||
|
roleDef.DefaultRoleValue = value
|
||||||
default:
|
default:
|
||||||
c.logger.Warningf("Role description is not known: %s", properties)
|
c.logger.Warningf("Role description is not known: %s", properties)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
|
if roleDef.SecretName != emptyName &&
|
||||||
|
(roleDef.UserKey != "" || roleDef.DefaultUserValue != "") &&
|
||||||
|
roleDef.PasswordKey != "" {
|
||||||
|
rolesDefs = append(rolesDefs, &roleDef)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.opConfig.InfrastructureRolesSecretName != emptyName {
|
||||||
// At this point we deal with the old format, let's replicate it
|
// At this point we deal with the old format, let's replicate it
|
||||||
// via existing definition structure and remember that it's just a
|
// via existing definition structure and remember that it's just a
|
||||||
// template, the real values are in user1,password1,inrole1 etc.
|
// template, the real values are in user1,password1,inrole1 etc.
|
||||||
roleDef = config.InfrastructureRole{
|
rolesDefs = append(rolesDefs, &config.InfrastructureRole{
|
||||||
SecretName: c.opConfig.InfrastructureRolesSecretName,
|
SecretName: c.opConfig.InfrastructureRolesSecretName,
|
||||||
UserKey: "user",
|
UserKey: "user",
|
||||||
PasswordKey: "password",
|
PasswordKey: "password",
|
||||||
RoleKey: "inrole",
|
RoleKey: "inrole",
|
||||||
Template: true,
|
Template: true,
|
||||||
}
|
})
|
||||||
}
|
|
||||||
|
|
||||||
if roleDef.UserKey != "" &&
|
|
||||||
roleDef.PasswordKey != "" &&
|
|
||||||
roleDef.RoleKey != "" {
|
|
||||||
rolesDefs = append(rolesDefs, &roleDef)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return rolesDefs
|
return rolesDefs
|
||||||
|
|
@ -330,9 +333,10 @@ func (c *Controller) getInfrastructureRole(
|
||||||
return nil, fmt.Errorf("could not decode yaml role: %v", err)
|
return nil, fmt.Errorf("could not decode yaml role: %v", err)
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
roleDescr.Name = string(secretData[infraRole.UserKey])
|
roleDescr.Name = util.Coalesce(string(secretData[infraRole.UserKey]), infraRole.DefaultUserValue)
|
||||||
roleDescr.Password = string(secretData[infraRole.PasswordKey])
|
roleDescr.Password = string(secretData[infraRole.PasswordKey])
|
||||||
roleDescr.MemberOf = append(roleDescr.MemberOf, string(secretData[infraRole.RoleKey]))
|
roleDescr.MemberOf = append(roleDescr.MemberOf,
|
||||||
|
util.Coalesce(string(secretData[infraRole.RoleKey]), infraRole.DefaultRoleValue))
|
||||||
}
|
}
|
||||||
|
|
||||||
if roleDescr.Valid() {
|
if roleDescr.Valid() {
|
||||||
|
|
|
||||||
|
|
@ -279,7 +279,7 @@ func TestInfrastructureRoleDefinitions(t *testing.T) {
|
||||||
roleSecrets string
|
roleSecrets string
|
||||||
expectedDefs []*config.InfrastructureRole
|
expectedDefs []*config.InfrastructureRole
|
||||||
}{
|
}{
|
||||||
// only new format
|
// only new CRD format
|
||||||
{
|
{
|
||||||
[]*config.InfrastructureRole{
|
[]*config.InfrastructureRole{
|
||||||
&config.InfrastructureRole{
|
&config.InfrastructureRole{
|
||||||
|
|
@ -287,9 +287,9 @@ func TestInfrastructureRoleDefinitions(t *testing.T) {
|
||||||
Namespace: v1.NamespaceDefault,
|
Namespace: v1.NamespaceDefault,
|
||||||
Name: testInfrastructureRolesNewSecretName,
|
Name: testInfrastructureRolesNewSecretName,
|
||||||
},
|
},
|
||||||
UserKey: "user",
|
UserKey: "test-user",
|
||||||
PasswordKey: "password",
|
PasswordKey: "test-password",
|
||||||
RoleKey: "inrole",
|
RoleKey: "test-role",
|
||||||
Template: false,
|
Template: false,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
@ -301,14 +301,50 @@ func TestInfrastructureRoleDefinitions(t *testing.T) {
|
||||||
Namespace: v1.NamespaceDefault,
|
Namespace: v1.NamespaceDefault,
|
||||||
Name: testInfrastructureRolesNewSecretName,
|
Name: testInfrastructureRolesNewSecretName,
|
||||||
},
|
},
|
||||||
UserKey: "user",
|
UserKey: "test-user",
|
||||||
PasswordKey: "password",
|
PasswordKey: "test-password",
|
||||||
RoleKey: "inrole",
|
RoleKey: "test-role",
|
||||||
Template: false,
|
Template: false,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
// only old format
|
// only new configmap format
|
||||||
|
{
|
||||||
|
[]*config.InfrastructureRole{},
|
||||||
|
spec.NamespacedName{},
|
||||||
|
"secretname: infrastructureroles-new-test, userkey: test-user, passwordkey: test-password, rolekey: test-role",
|
||||||
|
[]*config.InfrastructureRole{
|
||||||
|
&config.InfrastructureRole{
|
||||||
|
SecretName: spec.NamespacedName{
|
||||||
|
Namespace: v1.NamespaceDefault,
|
||||||
|
Name: testInfrastructureRolesNewSecretName,
|
||||||
|
},
|
||||||
|
UserKey: "test-user",
|
||||||
|
PasswordKey: "test-password",
|
||||||
|
RoleKey: "test-role",
|
||||||
|
Template: false,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// new configmap format with defaultRoleValue
|
||||||
|
{
|
||||||
|
[]*config.InfrastructureRole{},
|
||||||
|
spec.NamespacedName{},
|
||||||
|
"secretname: infrastructureroles-new-test, userkey: test-user, passwordkey: test-password, defaultrolevalue: test-role",
|
||||||
|
[]*config.InfrastructureRole{
|
||||||
|
&config.InfrastructureRole{
|
||||||
|
SecretName: spec.NamespacedName{
|
||||||
|
Namespace: v1.NamespaceDefault,
|
||||||
|
Name: testInfrastructureRolesNewSecretName,
|
||||||
|
},
|
||||||
|
UserKey: "test-user",
|
||||||
|
PasswordKey: "test-password",
|
||||||
|
DefaultRoleValue: "test-role",
|
||||||
|
Template: false,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// only old CRD and configmap format
|
||||||
{
|
{
|
||||||
[]*config.InfrastructureRole{},
|
[]*config.InfrastructureRole{},
|
||||||
spec.NamespacedName{
|
spec.NamespacedName{
|
||||||
|
|
@ -329,19 +365,13 @@ func TestInfrastructureRoleDefinitions(t *testing.T) {
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
// only configmap format
|
// both formats for CRD
|
||||||
{
|
{
|
||||||
[]*config.InfrastructureRole{},
|
|
||||||
spec.NamespacedName{
|
|
||||||
Namespace: v1.NamespaceDefault,
|
|
||||||
Name: testInfrastructureRolesOldSecretName,
|
|
||||||
},
|
|
||||||
"secretname: infrastructureroles-old-test, userkey: test-user, passwordkey: test-password, rolekey: test-role, template: false",
|
|
||||||
[]*config.InfrastructureRole{
|
[]*config.InfrastructureRole{
|
||||||
&config.InfrastructureRole{
|
&config.InfrastructureRole{
|
||||||
SecretName: spec.NamespacedName{
|
SecretName: spec.NamespacedName{
|
||||||
Namespace: v1.NamespaceDefault,
|
Namespace: v1.NamespaceDefault,
|
||||||
Name: testInfrastructureRolesOldSecretName,
|
Name: testInfrastructureRolesNewSecretName,
|
||||||
},
|
},
|
||||||
UserKey: "test-user",
|
UserKey: "test-user",
|
||||||
PasswordKey: "test-password",
|
PasswordKey: "test-password",
|
||||||
|
|
@ -349,14 +379,69 @@ func TestInfrastructureRoleDefinitions(t *testing.T) {
|
||||||
Template: false,
|
Template: false,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
spec.NamespacedName{
|
||||||
|
Namespace: v1.NamespaceDefault,
|
||||||
|
Name: testInfrastructureRolesOldSecretName,
|
||||||
},
|
},
|
||||||
// incorrect configmap format
|
"",
|
||||||
|
[]*config.InfrastructureRole{
|
||||||
|
&config.InfrastructureRole{
|
||||||
|
SecretName: spec.NamespacedName{
|
||||||
|
Namespace: v1.NamespaceDefault,
|
||||||
|
Name: testInfrastructureRolesNewSecretName,
|
||||||
|
},
|
||||||
|
UserKey: "test-user",
|
||||||
|
PasswordKey: "test-password",
|
||||||
|
RoleKey: "test-role",
|
||||||
|
Template: false,
|
||||||
|
},
|
||||||
|
&config.InfrastructureRole{
|
||||||
|
SecretName: spec.NamespacedName{
|
||||||
|
Namespace: v1.NamespaceDefault,
|
||||||
|
Name: testInfrastructureRolesOldSecretName,
|
||||||
|
},
|
||||||
|
UserKey: "user",
|
||||||
|
PasswordKey: "password",
|
||||||
|
RoleKey: "inrole",
|
||||||
|
Template: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// both formats for configmap
|
||||||
{
|
{
|
||||||
[]*config.InfrastructureRole{},
|
[]*config.InfrastructureRole{},
|
||||||
spec.NamespacedName{
|
spec.NamespacedName{
|
||||||
Namespace: v1.NamespaceDefault,
|
Namespace: v1.NamespaceDefault,
|
||||||
Name: testInfrastructureRolesOldSecretName,
|
Name: testInfrastructureRolesOldSecretName,
|
||||||
},
|
},
|
||||||
|
"secretname: infrastructureroles-new-test, userkey: test-user, passwordkey: test-password, rolekey: test-role",
|
||||||
|
[]*config.InfrastructureRole{
|
||||||
|
&config.InfrastructureRole{
|
||||||
|
SecretName: spec.NamespacedName{
|
||||||
|
Namespace: v1.NamespaceDefault,
|
||||||
|
Name: testInfrastructureRolesNewSecretName,
|
||||||
|
},
|
||||||
|
UserKey: "test-user",
|
||||||
|
PasswordKey: "test-password",
|
||||||
|
RoleKey: "test-role",
|
||||||
|
Template: false,
|
||||||
|
},
|
||||||
|
&config.InfrastructureRole{
|
||||||
|
SecretName: spec.NamespacedName{
|
||||||
|
Namespace: v1.NamespaceDefault,
|
||||||
|
Name: testInfrastructureRolesOldSecretName,
|
||||||
|
},
|
||||||
|
UserKey: "user",
|
||||||
|
PasswordKey: "password",
|
||||||
|
RoleKey: "inrole",
|
||||||
|
Template: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// incorrect configmap format
|
||||||
|
{
|
||||||
|
[]*config.InfrastructureRole{},
|
||||||
|
spec.NamespacedName{},
|
||||||
"wrong-format",
|
"wrong-format",
|
||||||
[]*config.InfrastructureRole{},
|
[]*config.InfrastructureRole{},
|
||||||
},
|
},
|
||||||
|
|
@ -364,7 +449,7 @@ func TestInfrastructureRoleDefinitions(t *testing.T) {
|
||||||
{
|
{
|
||||||
[]*config.InfrastructureRole{},
|
[]*config.InfrastructureRole{},
|
||||||
spec.NamespacedName{},
|
spec.NamespacedName{},
|
||||||
"userkey: test-user, passwordkey: test-password, rolekey: test-role, template: false",
|
"userkey: test-user, passwordkey: test-password, rolekey: test-role",
|
||||||
[]*config.InfrastructureRole{},
|
[]*config.InfrastructureRole{},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -61,6 +61,9 @@ type InfrastructureRole struct {
|
||||||
PasswordKey string
|
PasswordKey string
|
||||||
RoleKey string
|
RoleKey string
|
||||||
|
|
||||||
|
DefaultUserValue string
|
||||||
|
DefaultRoleValue string
|
||||||
|
|
||||||
// This field point out the detailed yaml definition of the role, if exists
|
// This field point out the detailed yaml definition of the role, if exists
|
||||||
Details string
|
Details string
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue