From 9a83199ffec4fa9e144da9dcccf128a1bd73522c Mon Sep 17 00:00:00 2001 From: inovindasari Date: Thu, 21 Aug 2025 14:56:58 +0200 Subject: [PATCH] remove variable changes --- .../v1/operator_configuration_type.go | 2 +- pkg/cluster/k8sres.go | 24 ++++++++-------- pkg/cluster/k8sres_test.go | 28 +++++++++---------- pkg/cluster/sync_test.go | 10 +++---- pkg/controller/operator_config.go | 2 +- pkg/util/config/config.go | 2 +- 6 files changed, 33 insertions(+), 35 deletions(-) diff --git a/pkg/apis/acid.zalan.do/v1/operator_configuration_type.go b/pkg/apis/acid.zalan.do/v1/operator_configuration_type.go index 1ac0b3880..cd11b9173 100644 --- a/pkg/apis/acid.zalan.do/v1/operator_configuration_type.go +++ b/pkg/apis/acid.zalan.do/v1/operator_configuration_type.go @@ -152,7 +152,7 @@ type LoadBalancerConfiguration struct { // AWSGCPConfiguration defines the configuration for AWS // TODO complete Google Cloud Platform (GCP) configuration type AWSGCPConfiguration struct { - WALS3Bucket string `json:"wal_s3_bucket,omitempty"` + WALES3Bucket string `json:"wal_s3_bucket,omitempty"` AWSRegion string `json:"aws_region,omitempty"` WALGSBucket string `json:"wal_gs_bucket,omitempty"` GCPCredentials string `json:"gcp_credentials,omitempty"` diff --git a/pkg/cluster/k8sres.go b/pkg/cluster/k8sres.go index 249ee9c9f..75e1f9f8c 100644 --- a/pkg/cluster/k8sres.go +++ b/pkg/cluster/k8sres.go @@ -1052,8 +1052,8 @@ func (c *Cluster) generateSpiloPodEnvVars( // global variables derived from operator configuration opConfigEnvVars := make([]v1.EnvVar, 0) - if c.OpConfig.WALS3Bucket != "" { - opConfigEnvVars = append(opConfigEnvVars, v1.EnvVar{Name: "WAL_S3_BUCKET", Value: c.OpConfig.WALS3Bucket}) + if c.OpConfig.WALES3Bucket != "" { + opConfigEnvVars = append(opConfigEnvVars, v1.EnvVar{Name: "WAL_S3_BUCKET", Value: c.OpConfig.WALES3Bucket}) opConfigEnvVars = append(opConfigEnvVars, v1.EnvVar{Name: "WAL_BUCKET_SCOPE_SUFFIX", Value: getBucketScopeSuffix(string(uid))}) opConfigEnvVars = append(opConfigEnvVars, v1.EnvVar{Name: "WAL_BUCKET_SCOPE_PREFIX", Value: ""}) } @@ -2118,9 +2118,9 @@ func (c *Cluster) generateCloneEnvironment(description *acidv1.CloneDescription) if description.S3WalPath == "" { c.logger.Info("no S3 WAL path defined - taking value from global config", description.S3WalPath) - if c.OpConfig.WALS3Bucket != "" { - c.logger.Debugf("found WALS3Bucket %s - will set CLONE_WAL_S3_BUCKET", c.OpConfig.WALS3Bucket) - result = append(result, v1.EnvVar{Name: "CLONE_WAL_S3_BUCKET", Value: c.OpConfig.WALS3Bucket}) + if c.OpConfig.WALES3Bucket != "" { + c.logger.Debugf("found WALES3Bucket %s - will set CLONE_WAL_S3_BUCKET", c.OpConfig.WALES3Bucket) + result = append(result, v1.EnvVar{Name: "CLONE_WAL_S3_BUCKET", Value: c.OpConfig.WALES3Bucket}) } else if c.OpConfig.WALGSBucket != "" { c.logger.Debugf("found WALGSBucket %s - will set CLONE_WAL_GS_BUCKET", c.OpConfig.WALGSBucket) result = append(result, v1.EnvVar{Name: "CLONE_WAL_GS_BUCKET", Value: c.OpConfig.WALGSBucket}) @@ -2139,21 +2139,19 @@ func (c *Cluster) generateCloneEnvironment(description *acidv1.CloneDescription) } else { c.logger.Debugf("use S3WalPath %s from the manifest", description.S3WalPath) - // add if result = append(result, v1.EnvVar{ - Name: "CLONE_WALG_S3_PREFIX", + Name: "CLONE_WALE_S3_PREFIX", Value: description.S3WalPath, }) } - // if else wal-g - result = append(result, v1.EnvVar{Name: "CLONE_METHOD", Value: "CLONE_WITH_WALG"}) + result = append(result, v1.EnvVar{Name: "CLONE_METHOD", Value: "CLONE_WITH_WALE"}) result = append(result, v1.EnvVar{Name: "CLONE_TARGET_TIME", Value: description.EndTimestamp}) result = append(result, v1.EnvVar{Name: "CLONE_WAL_BUCKET_SCOPE_PREFIX", Value: ""}) if description.S3Endpoint != "" { result = append(result, v1.EnvVar{Name: "CLONE_AWS_ENDPOINT", Value: description.S3Endpoint}) - result = append(result, v1.EnvVar{Name: "CLONE_WALG_S3_ENDPOINT", Value: description.S3Endpoint}) + result = append(result, v1.EnvVar{Name: "CLONE_WALE_S3_ENDPOINT", Value: description.S3Endpoint}) } if description.S3AccessKeyId != "" { @@ -2197,12 +2195,12 @@ func (c *Cluster) generateStandbyEnvironment(description *acidv1.StandbyDescript c.logger.Info("standby cluster streaming from WAL location") if description.S3WalPath != "" { result = append(result, v1.EnvVar{ - Name: "STANDBY_WALG_S3_PREFIX", + Name: "STANDBY_WALE_S3_PREFIX", Value: description.S3WalPath, }) } else if description.GSWalPath != "" { result = append(result, v1.EnvVar{ - Name: "STANDBY_WALG_GS_PREFIX", + Name: "STANDBY_WALE_GS_PREFIX", Value: description.GSWalPath, }) } else { @@ -2211,7 +2209,7 @@ func (c *Cluster) generateStandbyEnvironment(description *acidv1.StandbyDescript } // if use wal-g - result = append(result, v1.EnvVar{Name: "STANDBY_METHOD", Value: "STANDBY_WITH_WALG"}) + result = append(result, v1.EnvVar{Name: "STANDBY_METHOD", Value: "STANDBY_WITH_WALE"}) result = append(result, v1.EnvVar{Name: "STANDBY_WAL_BUCKET_SCOPE_PREFIX", Value: ""}) } diff --git a/pkg/cluster/k8sres_test.go b/pkg/cluster/k8sres_test.go index c7a4df603..e116636fb 100644 --- a/pkg/cluster/k8sres_test.go +++ b/pkg/cluster/k8sres_test.go @@ -665,7 +665,7 @@ func TestGenerateSpiloPodEnvVars(t *testing.T) { expectedCloneEnvSpec := []ExpectedValue{ { envIndex: 16, - envVarConstant: "CLONE_WALG_S3_PREFIX", + envVarConstant: "CLONE_WALE_S3_PREFIX", envVarValue: "s3://another-bucket", }, { @@ -687,7 +687,7 @@ func TestGenerateSpiloPodEnvVars(t *testing.T) { }, { envIndex: 17, - envVarConstant: "CLONE_WALG_S3_PREFIX", + envVarConstant: "CLONE_WALE_S3_PREFIX", envVarValue: "s3://another-bucket", }, { @@ -730,7 +730,7 @@ func TestGenerateSpiloPodEnvVars(t *testing.T) { expectedStandbyEnvSecret := []ExpectedValue{ { envIndex: 15, - envVarConstant: "STANDBY_WALG_GS_PREFIX", + envVarConstant: "STANDBY_WALE_GS_PREFIX", envVarValue: "gs://some/path/", }, { @@ -767,7 +767,7 @@ func TestGenerateSpiloPodEnvVars(t *testing.T) { { subTest: "will set WAL_S3_BUCKET env", opConfig: config.Config{ - WALS3Bucket: "global-s3-bucket", + WALES3Bucket: "global-s3-bucket", }, cloneDescription: &acidv1.CloneDescription{}, standbyDescription: &acidv1.StandbyDescription{}, @@ -815,7 +815,7 @@ func TestGenerateSpiloPodEnvVars(t *testing.T) { Name: testPodEnvironmentConfigMapName, }, }, - WALS3Bucket: "global-s3-bucket", + WALES3Bucket: "global-s3-bucket", }, cloneDescription: &acidv1.CloneDescription{}, standbyDescription: &acidv1.StandbyDescription{}, @@ -903,7 +903,7 @@ func TestGenerateSpiloPodEnvVars(t *testing.T) { Name: testPodEnvironmentConfigMapName, }, }, - WALS3Bucket: "global-s3-bucket", + WALES3Bucket: "global-s3-bucket", }, cloneDescription: &acidv1.CloneDescription{ ClusterName: "test-cluster", @@ -923,7 +923,7 @@ func TestGenerateSpiloPodEnvVars(t *testing.T) { Name: testPodEnvironmentConfigMapName, }, }, - WALS3Bucket: "global-s3-bucket", + WALES3Bucket: "global-s3-bucket", }, cloneDescription: &acidv1.CloneDescription{ ClusterName: "test-cluster", @@ -953,7 +953,7 @@ func TestGenerateSpiloPodEnvVars(t *testing.T) { Name: testPodEnvironmentConfigMapName, }, }, - WALS3Bucket: "global-s3-bucket", + WALES3Bucket: "global-s3-bucket", }, cloneDescription: &acidv1.CloneDescription{ ClusterName: "test-cluster", @@ -971,7 +971,7 @@ func TestGenerateSpiloPodEnvVars(t *testing.T) { ResourceCheckInterval: time.Duration(testResourceCheckInterval), ResourceCheckTimeout: time.Duration(testResourceCheckTimeout), }, - WALS3Bucket: "global-s3-bucket", + WALES3Bucket: "global-s3-bucket", }, cloneDescription: &acidv1.CloneDescription{ ClusterName: "test-cluster", @@ -989,7 +989,7 @@ func TestGenerateSpiloPodEnvVars(t *testing.T) { ResourceCheckInterval: time.Duration(testResourceCheckInterval), ResourceCheckTimeout: time.Duration(testResourceCheckTimeout), }, - WALS3Bucket: "global-s3-bucket", + WALES3Bucket: "global-s3-bucket", }, cloneDescription: &acidv1.CloneDescription{}, standbyDescription: &acidv1.StandbyDescription{ @@ -1177,7 +1177,7 @@ func TestCloneEnv(t *testing.T) { EndTimestamp: "somewhen", }, env: v1.EnvVar{ - Name: "CLONE_WALG_S3_PREFIX", + Name: "CLONE_WALE_S3_PREFIX", Value: "s3://some/path/", }, envPos: 1, @@ -1213,7 +1213,7 @@ func TestCloneEnv(t *testing.T) { var cluster = New( Config{ OpConfig: config.Config{ - WALS3Bucket: "wal-bucket", + WALES3Bucket: "wal-bucket", ProtectedRoles: []string{"admin"}, Auth: config.Auth{ SuperUsername: superUserName, @@ -1325,7 +1325,7 @@ func TestStandbyEnv(t *testing.T) { S3WalPath: "s3://some/path/", }, env: v1.EnvVar{ - Name: "STANDBY_WALG_S3_PREFIX", + Name: "STANDBY_WALE_S3_PREFIX", Value: "s3://some/path/", }, envPos: 0, @@ -1339,7 +1339,7 @@ func TestStandbyEnv(t *testing.T) { }, env: v1.EnvVar{ Name: "STANDBY_METHOD", - Value: "STANDBY_WITH_WALG", + Value: "STANDBY_WITH_WALE", }, envPos: 1, envLen: 3, diff --git a/pkg/cluster/sync_test.go b/pkg/cluster/sync_test.go index 8acde084d..f2d361ca0 100644 --- a/pkg/cluster/sync_test.go +++ b/pkg/cluster/sync_test.go @@ -741,7 +741,7 @@ func TestSyncStandbyClusterConfiguration(t *testing.T) { assert.NoError(t, err) // check that pods do not have a STANDBY_* environment variable - assert.NotContains(t, sts.Spec.Template.Spec.Containers[0].Env, v1.EnvVar{Name: "STANDBY_METHOD", Value: "STANDBY_WITH_WALG"}) + assert.NotContains(t, sts.Spec.Template.Spec.Containers[0].Env, v1.EnvVar{Name: "STANDBY_METHOD", Value: "STANDBY_WITH_WALE"}) // add standby section cluster.Spec.StandbyCluster = &acidv1.StandbyDescription{ @@ -751,13 +751,13 @@ func TestSyncStandbyClusterConfiguration(t *testing.T) { updatedSts := cluster.Statefulset // check that pods do not have a STANDBY_* environment variable - assert.Contains(t, updatedSts.Spec.Template.Spec.Containers[0].Env, v1.EnvVar{Name: "STANDBY_METHOD", Value: "STANDBY_WITH_WALG"}) + assert.Contains(t, updatedSts.Spec.Template.Spec.Containers[0].Env, v1.EnvVar{Name: "STANDBY_METHOD", Value: "STANDBY_WITH_WALE"}) // this should update the Patroni config err = cluster.syncStandbyClusterConfiguration() assert.NoError(t, err) - configJson = `{"standby_cluster":{"create_replica_methods":["bootstrap_standby_with_g","basebackup_fast_xlog"],"restore_command":"envdir \"/run/etc/wal-g.d/env-standby\" /scripts/restore_command.sh \"%f\" \"%p\""}, "ttl": 20}` + configJson = `{"standby_cluster":{"create_replica_methods":["bootstrap_standby_with_walg","basebackup_fast_xlog"],"restore_command":"envdir \"/run/etc/wal-g.d/env-standby\" /scripts/restore_command.sh \"%f\" \"%p\""}, "ttl": 20}` r = io.NopCloser(bytes.NewReader([]byte(configJson))) response = http.Response{ StatusCode: 200, @@ -774,7 +774,7 @@ func TestSyncStandbyClusterConfiguration(t *testing.T) { /* defaultStandbyParameters := map[string]interface{}{ "create_replica_methods": []string{"bootstrap_standby_with_walg", "basebackup_fast_xlog"}, - "restore_command": "envdir \"/run/etc/wal-g.d/env-standby\" /scripts/restore_command.sh \"%f\" \"%p\"", + "restore_command": "envdir \"/run/etc/wal-e.d/env-standby\" /scripts/restore_command.sh \"%f\" \"%p\"", } assert.True(t, reflect.DeepEqual(defaultStandbyParameters, standbyCluster)) */ @@ -784,7 +784,7 @@ func TestSyncStandbyClusterConfiguration(t *testing.T) { updatedSts2 := cluster.Statefulset // check that pods do not have a STANDBY_* environment variable - assert.NotContains(t, updatedSts2.Spec.Template.Spec.Containers[0].Env, v1.EnvVar{Name: "STANDBY_METHOD", Value: "STANDBY_WITH_WALG"}) + assert.NotContains(t, updatedSts2.Spec.Template.Spec.Containers[0].Env, v1.EnvVar{Name: "STANDBY_METHOD", Value: "STANDBY_WITH_WALE"}) // this should update the Patroni config again err = cluster.syncStandbyClusterConfiguration() diff --git a/pkg/controller/operator_config.go b/pkg/controller/operator_config.go index 6e7277cb9..5739f6314 100644 --- a/pkg/controller/operator_config.go +++ b/pkg/controller/operator_config.go @@ -166,7 +166,7 @@ func (c *Controller) importConfigurationFromCRD(fromCRD *acidv1.OperatorConfigur result.ExternalTrafficPolicy = util.Coalesce(fromCRD.LoadBalancer.ExternalTrafficPolicy, "Cluster") // AWS or GCP config - result.WALS3Bucket = fromCRD.AWSGCP.WALS3Bucket + result.WALES3Bucket = fromCRD.AWSGCP.WALES3Bucket result.AWSRegion = fromCRD.AWSGCP.AWSRegion result.LogS3Bucket = fromCRD.AWSGCP.LogS3Bucket result.KubeIAMRole = fromCRD.AWSGCP.KubeIAMRole diff --git a/pkg/util/config/config.go b/pkg/util/config/config.go index 79d006c97..30b967beb 100644 --- a/pkg/util/config/config.go +++ b/pkg/util/config/config.go @@ -185,7 +185,7 @@ type Config struct { MasterPodMoveTimeout time.Duration `name:"master_pod_move_timeout" default:"20m"` DbHostedZone string `name:"db_hosted_zone" default:"db.example.com"` AWSRegion string `name:"aws_region" default:"eu-central-1"` - WALS3Bucket string `name:"wal_s3_bucket"` + WALES3Bucket string `name:"wal_s3_bucket"` LogS3Bucket string `name:"log_s3_bucket"` KubeIAMRole string `name:"kube_iam_role"` WALGSBucket string `name:"wal_gs_bucket"`