-
Notifications
You must be signed in to change notification settings - Fork 109
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[CECO-743] Secret backend configuration #1395
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This pull request does not contain a valid label. Please add one of the following labels: bug, enhancement, refactoring, documentation, tooling, dependencies
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #1395 +/- ##
==========================================
+ Coverage 48.75% 48.92% +0.17%
==========================================
Files 222 222
Lines 19342 19432 +90
==========================================
+ Hits 9431 9508 +77
- Misses 9425 9435 +10
- Partials 486 489 +3
Flags with carried forward coverage won't be shown. Click here to find out more.
Continue to review full report in Codecov by Sentry.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🎉
/merge |
🚂 MergeQueue: pull request added to the queue The median merge time in Use |
* global secret backend config * tests * fix DefaultAgentResourceSuffix that changed from apicommon to v2alpha1
What does this PR do?
Implements the Secrets Backend within
global
to directly configure Secrets management from theDatadogAgent
custom resource, providing helpers to handle RBAC similar to the Helm chartMotivation
Describe your test plan
The scenarios below are covered by the unit tests and replicate them in e2e manner, verifying functionality. Ensure the new version of the CRD is installed with
make install
and install the built-operator withmake IMG=<replace me> deploy
(pre-loading your built image in your cluster withkind load docker-image <replace me> --name <KIND CLUSTER NAME>
Testing env variables
Exec into your Agent pod and assert:
agent config | grep secret_backend -A 2
matches the parameters defined in the CRTesting global RBAC and secrets resolution
args
andtimeout
. AddenableGlobalPermissions
set totrue
. Re-deploy your CRkubectl apply -f "https://github.com/rabbitmq/cluster-operator/releases/download/v2.9.0/cluster-operator.yml"
Assert the following :
k auth can-i get -n rabbitmq-system secrets/rabbitmqcluster-sample-default-user --as=system:serviceaccount:system:datadog-agent
agent secret
inside the node AgentTesting specific RBAC (roles), its priority over
enableGlobalPermissions
and bindingrabbitmq-system
is withinWATCH_NAMESPACE
variable if not using global watch scope :Assert the following :
k auth can-i get -n rabbitmq-system secrets/rabbitmqcluster-sample-default-user --as=system:serviceaccount:system:datadog-agent
k auth can-i get -n rabbitmq-system secrets/rabbitmqcluster-sample-erlang-cookie --as=system:serviceaccount:system:datadog-agent
Checklist
bug
,enhancement
,refactoring
,documentation
,tooling
, and/ordependencies
qa/skip-qa
label