-
-
Notifications
You must be signed in to change notification settings - Fork 0
feat: Allow adding entries to the OpenSearch keystore #76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
753e529 to
c77ac69
Compare
| crd::{ | ||
| NodeRoles, | ||
| v1alpha1::{self, OpenSearchKeystore, SecretKeyRef}, | ||
| }, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We decided to use the versioned module explicitly.
| crd::{ | |
| NodeRoles, | |
| v1alpha1::{self, OpenSearchKeystore, SecretKeyRef}, | |
| }, | |
| crd::{NodeRoles, v1alpha1}, |
rust/operator-binary/src/controller/build/role_group_builder.rs
Outdated
Show resolved
Hide resolved
tests/templates/kuttl/snapshot-s3/20-install-opensearch.yaml.j2
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This file is generated by make regenerate-charts.
| --- | ||
| apiVersion: opensearch.stackable.tech/v1alpha1 | ||
| kind: OpenSearchCluster | ||
| metadata: | ||
| name: opensearch | ||
| spec: | ||
| clusterConfig: | ||
| keystore: | ||
| - key: s3.client.default.access_key # <1> | ||
| secretKeyRef: | ||
| name: s3-credentials # <2> | ||
| key: accessKey # <3> | ||
| - key: s3.client.default.secret_key | ||
| secretKeyRef: | ||
| name: s3-credentials | ||
| key: secretKey | ||
| nodes: | ||
| roleGroups: | ||
| default: | ||
| replicas: 1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks like a complete specification with the header and role group definition, but it is not working (at least the image property is missing and the TLS configuration). Should we just leave out the unnecessary fields such as nodes and replace it with ...?
| vec![v1alpha1::OpenSearchKeystore { | ||
| key: OpenSearchKeystoreKey::from_str_unsafe("Keystore1"), | ||
| secret_key_ref: v1alpha1::SecretKeyRef { | ||
| name: SecretName::from_str_unsafe("my-keystore-secret"), | ||
| key: SecretKey::from_str_unsafe("my-keystore-file"), | ||
| }, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OpenSearchKeystore is not used in this module and should therefore not be added.
| vec![OpenSearchKeystore { | ||
| key: OpenSearchKeystoreKey::from_str_unsafe("Keystore1"), | ||
| secret_key_ref: SecretKeyRef { | ||
| name: SecretName::from_str_unsafe("my-keystore-secret"), | ||
| key: SecretKey::from_str_unsafe("my-keystore-file"), | ||
| }, | ||
| }], |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There is no assertion for OpenSearchKeystore. I would remove it from the test.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These changes must also be applied to 51-install-opensearch-2.yaml.j2.
Description
Allow referencing Secret keys in the OpenSearch config to add them as entries to the OpenSearch keystore.
Part of #44.
Definition of Done Checklist
Author
Reviewer
Acceptance
type/deprecationlabel & add to the deprecation scheduletype/experimentallabel & add to the experimental features tracker