This commit is contained in:
2023-10-07 23:18:55 +02:00
parent 6e53fbe2fa
commit 0079b399d3
2 changed files with 51 additions and 41 deletions

View File

@@ -6,28 +6,34 @@ metadata:
name: dataset-pg
description: null
options:
replicas:
default: 1
examples:
- 1
type: integer
storage:
default: 8Gi
examples:
- 8Gi
type: string
extentions:
default:
pool:
enable: false
examples:
- pool:
enable: false
databases:
default: []
items:
properties:
pool:
default:
enable: false
name:
default: db
type: string
type: object
type: array
roles:
default: []
items:
properties:
enable:
default: false
type: boolean
type: object
name:
default: db
type: string
type: object
type: array
backups:
default:
enable: false
@@ -82,25 +88,23 @@ options:
default: backup-settings
type: string
type: object
databases:
default: []
items:
properties:
name:
default: db
type: string
type: object
type: array
replicas:
default: 1
extentions:
default:
pool:
enable: false
examples:
- 1
type: integer
roles:
default: []
items:
type: string
type: array
- pool:
enable: false
properties:
pool:
default:
enable: false
properties:
enable:
default: false
type: boolean
type: object
type: object
dependencies: []
providers:
kubernetes: true

View File

@@ -1,5 +1,11 @@
locals {
sorted-roles = reverse(distinct(sort(var.roles)))
sorted-roles-name = reverse(distinct(sort(var.roles.name)))
sorted-roles = flatten([
for name in local.sorted-roles-name: [
for r in var.roles:
r if r.name == name
]
])
}
resource "kubectl_manifest" "db_secret_role" {
@@ -9,13 +15,13 @@ resource "kubectl_manifest" "db_secret_role" {
apiVersion: "secretgenerator.mittwald.de/v1alpha1"
kind: "StringSecret"
metadata:
name: "${var.instance}-${var.component}-role-${local.sorted-roles[count.index]}"
name: "${var.instance}-${var.component}-role-${local.sorted-roles[count.index].name}"
namespace: "${var.namespace}"
labels: ${jsonencode(merge(local.common-labels, {"app.kubernetes.io/component" = local.sorted-roles[count.index]}))}
labels: ${jsonencode(merge(local.common-labels, {"app.kubernetes.io/component" = local.sorted-roles[count.index].name}))}
spec:
forceRegenerate: false
data:
POSGRESQL_USERNAME: "${local.sorted-roles[count.index]}"
POSGRESQL_USERNAME: "${local.sorted-roles[count.index].name}"
fields:
- fieldName: "POSGRESQL_PASSWORD"
length: "32"
@@ -26,7 +32,7 @@ data "kubernetes_secret_v1" "password_role_get" {
depends_on = [ kubectl_manifest.db_secret_role ]
count = length(local.sorted-roles)
metadata {
name = "${var.instance}-${var.component}-role-${local.sorted-roles[count.index]}"
name = "${var.instance}-${var.component}-role-${local.sorted-roles[count.index].name}"
namespace = "${var.namespace}"
}
}
@@ -34,7 +40,7 @@ data "kubernetes_secret_v1" "password_role_get" {
resource "postgresql_role" "role" {
depends_on = [ kubectl_manifest.prj_pg ]
count = length(local.sorted-roles)
name = "${local.sorted-roles[count.index]}"
name = "${local.sorted-roles[count.index].name}"
login = true
password = data.kubernetes_secret_v1.password_role_get[count.index].data["POSGRESQL_PASSWORD"]
}