-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Feature db operator watches for db passwords #130
Feature db operator watches for db passwords #130
Conversation
Hi, had a quick look and already some questions coming in my mind. db-operator support to use existing secrets, but can also auto generate this if not existing (so you don't need to manage secrets at all in some kind of source code). For each database you could have separate credentials. Looks with your function The functions under General I like the idea of rotating secrets/credentials. But except the change and event against the db-operator. Also your application need to support this. Or have a transition phase where both credentials are valid. Think also you code is not working. We have a checksum check to know when something has changed on the db CR, to skip events without changes onto the |
Hi @dabde , thanks for your review and your tips. Let me share my updates regarding your answer:
It should not conflict with existing design, because Secret Update Event will be processed only. (
I think you right, it is NOT correct to allow using shared DB credentials by customers because of possible conflicts. I have fixed that.
Done , created separate database_secret_handler.go
I like too :). Currently, I think that your
We are going to implement "Cluster Level Secret Rotation" logic using your
Yes, you right, to fix that I have introduced additional checksum/secret custom annotation. What do you think about that ? P.S.: Currently , I see that logic is working on my local cluster. Please share your thoughts about these changes, after your approve I will fix minor issues and cover new logic by unit tests. Thanks. |
Can please update our db-operator helm chart to configure namespace through values file? |
Can please update our db-operator helm chart to configure namespace through values file?
@hyunysmile please review this PR again. |
@dabde @hyunysmile Please review this PR again. |
For the failing test. think the system is going slower than in the past. Think it's fine to increate the reties and the interval like this in the retry=30
interval=15 |
@dabde done, I have updated
|
okay, was try to run the integration test locally. looks like the databaseSecrets pointer is not correct. Will also debug it on my side.
|
charts/db-operator/Chart.yaml
Outdated
@@ -1,7 +1,7 @@ | |||
apiVersion: v2 | |||
type: application | |||
kubeVersion: ">= 1.19-prerelease <= 1.22-prerelease" | |||
kubeVersion: ">= 1.19-prerelease <= 1.23-prerelease" | |||
appVersion: "1.4.0" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@vladimir22 can you increase the app version to "1.5.0". Then I will approve and release the new version.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi colleagues, I like your
db-operator
solution and believe it has a bright future!I would like to propose you to add some enhancement into the
database_controller.go
to watch for the Secrets Update Events related to correspondingdatabase
resource.In this case we can easily add new "DB Password Rotation" feature, to rotate already existing DB passwords.
Could you review my PR and share your thoughts about that?
Thanks.
P.S: I have added logic for WATCH_NAMESPACE env because not found that, it is optional, probably you have better solution. The main purpose of the PR is to watch for DB password updates.