You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+29-5Lines changed: 29 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,12 +15,18 @@ This guide provides an introduction to using the PostgreSQL Operator. It will he
15
15
- You’ll need a Kubernetes cluster to run against. You can use [KIND](https://sigs.k8s.io/kind) to get a local cluster for testing, or run against a remote cluster.
16
16
**Note:** Your controller will automatically use the current context in your kubeconfig file (i.e. whatever cluster `kubectl cluster-info` shows).
17
17
- A kubernetes secret that contains base64 encrypted PostgreSQL Database details `username`, `password`, `endpoint`, `port`, `database` and `role_password`
18
-
> _Note:_
19
-
> - You can use existing secret with database details and role password
20
-
> - You can new secret with database details and role password
21
-
> - You can also created two separate secret for database details and role password
22
18
23
-
- Create a secret that contains both the database details and the role password. You have the flexibility to choose your own name for the key representing the role password, as long as you reference it correctly in the Role CRD.
19
+
> [!NOTE]
20
+
> - You can use existing secret with database details and role password
21
+
> - You can new secret with database details and role password
22
+
> - You can also created two separate secret for database details and role password
23
+
24
+
> [!CAUTION]
25
+
> - For granting permissions to a specific role, you should utilize either the Grant or GrantStatement Custom Resource Definition — but not both concurrently. Using both might lead to conflicts or unexpected behavior.
26
+
> - For managing role permissions through the GrantStatement Custom Resource Definition on any database, ensure that no additional permissions are assigned outside the CRD manually. Any such additional permissions will be revoked when the CRD gets updated.
27
+
> - Please note that you should not use any PostgreSQL GRANT query for a different database in a GrantStatement Custom Resource Definition that is specifically related to one database. If you do, the role cleanup process may not be successful.
28
+
29
+
- Create a secret that contains both the database details and the role password. You have the flexibility to choose your own name for the key representing the role password, as long as you reference it correctly in the Role CRD.
|`metadata`_[ObjectMeta](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.23/#objectmeta-v1-meta)_| Refer to Kubernetes API documentation for fields of `metadata`. |
117
+
|`spec`_[GrantStatementSpec](#rolespec)_||
118
+
119
+
#### GrantStatementSpec
120
+
121
+
GrantStatementSpec defines the desired state of GrantStatement
0 commit comments