reflect feedback
This commit is contained in:
parent
bf74dee169
commit
7d014d9c2f
|
|
@ -138,6 +138,7 @@ spec:
|
||||||
type: object
|
type: object
|
||||||
required:
|
required:
|
||||||
- secretname
|
- secretname
|
||||||
|
- userkey
|
||||||
- passwordkey
|
- passwordkey
|
||||||
properties:
|
properties:
|
||||||
secretname:
|
secretname:
|
||||||
|
|
|
||||||
|
|
@ -3,8 +3,6 @@ data:
|
||||||
# infrastructure role definition in the new format
|
# infrastructure role definition in the new format
|
||||||
# robot_zmon_acid_monitoring_new
|
# robot_zmon_acid_monitoring_new
|
||||||
user: cm9ib3Rfem1vbl9hY2lkX21vbml0b3JpbmdfbmV3
|
user: cm9ib3Rfem1vbl9hY2lkX21vbml0b3JpbmdfbmV3
|
||||||
# robot_zmon
|
|
||||||
memberof: cm9ib3Rfem1vbg==
|
|
||||||
# foobar_new
|
# foobar_new
|
||||||
password: Zm9vYmFyX25ldw==
|
password: Zm9vYmFyX25ldw==
|
||||||
kind: Secret
|
kind: Secret
|
||||||
|
|
|
||||||
|
|
@ -134,6 +134,7 @@ spec:
|
||||||
type: object
|
type: object
|
||||||
required:
|
required:
|
||||||
- secretname
|
- secretname
|
||||||
|
- userkey
|
||||||
- passwordkey
|
- passwordkey
|
||||||
properties:
|
properties:
|
||||||
secretname:
|
secretname:
|
||||||
|
|
|
||||||
|
|
@ -916,7 +916,7 @@ var OperatorConfigCRDResourceValidation = apiextv1beta1.CustomResourceValidation
|
||||||
Items: &apiextv1beta1.JSONSchemaPropsOrArray{
|
Items: &apiextv1beta1.JSONSchemaPropsOrArray{
|
||||||
Schema: &apiextv1beta1.JSONSchemaProps{
|
Schema: &apiextv1beta1.JSONSchemaProps{
|
||||||
Type: "object",
|
Type: "object",
|
||||||
Required: []string{"secretname", "passwordkey"},
|
Required: []string{"secretname", "userkey", "passwordkey"},
|
||||||
Properties: map[string]apiextv1beta1.JSONSchemaProps{
|
Properties: map[string]apiextv1beta1.JSONSchemaProps{
|
||||||
"secretname": {
|
"secretname": {
|
||||||
Type: "string",
|
Type: "string",
|
||||||
|
|
|
||||||
|
|
@ -500,7 +500,6 @@ func (c *Cluster) syncSecrets() error {
|
||||||
c.logger.Warningf("secret %q does not contain the role %q", secretSpec.Name, secretUsername)
|
c.logger.Warningf("secret %q does not contain the role %q", secretSpec.Name, secretUsername)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
c.Secrets[secret.UID] = secret
|
|
||||||
c.logger.Debugf("secret %q already exists, fetching its password", util.NameFromMeta(secret.ObjectMeta))
|
c.logger.Debugf("secret %q already exists, fetching its password", util.NameFromMeta(secret.ObjectMeta))
|
||||||
if secretUsername == c.systemUsers[constants.SuperuserKeyName].Name {
|
if secretUsername == c.systemUsers[constants.SuperuserKeyName].Name {
|
||||||
secretUsername = constants.SuperuserKeyName
|
secretUsername = constants.SuperuserKeyName
|
||||||
|
|
|
||||||
|
|
@ -339,7 +339,6 @@ func TestInfrastructureRoleDefinitions(t *testing.T) {
|
||||||
},
|
},
|
||||||
UserKey: "test-user",
|
UserKey: "test-user",
|
||||||
PasswordKey: "test-password",
|
PasswordKey: "test-password",
|
||||||
RoleKey: "",
|
|
||||||
DefaultRoleValue: "test-role",
|
DefaultRoleValue: "test-role",
|
||||||
Template: false,
|
Template: false,
|
||||||
},
|
},
|
||||||
|
|
@ -450,7 +449,7 @@ func TestInfrastructureRoleDefinitions(t *testing.T) {
|
||||||
{
|
{
|
||||||
[]*config.InfrastructureRole{},
|
[]*config.InfrastructureRole{},
|
||||||
spec.NamespacedName{},
|
spec.NamespacedName{},
|
||||||
"userkey: test-user, passwordkey: test-password, rolekey: test-role, template: false",
|
"userkey: test-user, passwordkey: test-password, rolekey: test-role",
|
||||||
[]*config.InfrastructureRole{},
|
[]*config.InfrastructureRole{},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue