Skip to content

Commit 5a012ed

Browse files
author
Anton
authored
CLOUDP-85517: no connection secrets in db user status (#184)
1 parent ad58135 commit 5a012ed

File tree

4 files changed

+0
-38
lines changed

4 files changed

+0
-38
lines changed

config/crd/bases/atlas.mongodb.com_atlasdatabaseusers.yaml

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -185,13 +185,6 @@ spec:
185185
- type
186186
type: object
187187
type: array
188-
connectionSecrets:
189-
additionalProperties:
190-
type: string
191-
description: ConnectionSecrets defines all the Secrets for the current
192-
database user that were created by the Atlas Operator and which
193-
provide the Atlas clusters connectivity information
194-
type: object
195188
name:
196189
description: UserName is the current name of database user.
197190
type: string

pkg/api/v1/status/atlasdatabaseuser.go

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,6 @@ package status
55
// AtlasDatabaseUserStatusOption is the option that is applied to Atlas Project Status
66
type AtlasDatabaseUserStatusOption func(s *AtlasDatabaseUserStatus)
77

8-
func AtlasDatabaseUserSecretsOption(clusters2Secrets map[string]string) AtlasDatabaseUserStatusOption {
9-
return func(s *AtlasDatabaseUserStatus) {
10-
s.ConnectionSecrets = clusters2Secrets
11-
}
12-
}
13-
148
func AtlasDatabaseUserPasswordVersion(passwordVersion string) AtlasDatabaseUserStatusOption {
159
return func(s *AtlasDatabaseUserStatus) {
1610
s.PasswordVersion = passwordVersion
@@ -26,10 +20,6 @@ func AtlasDatabaseUserNameOption(name string) AtlasDatabaseUserStatusOption {
2620
type AtlasDatabaseUserStatus struct {
2721
Common `json:",inline"`
2822

29-
// ConnectionSecrets defines all the Secrets for the current database user that were created by the Atlas Operator
30-
// and which provide the Atlas clusters connectivity information
31-
ConnectionSecrets map[string]string `json:"connectionSecrets,omitempty"`
32-
3323
// PasswordVersion is the 'ResourceVersion' of the password Secret that the Atlas Operator is aware of
3424
PasswordVersion string `json:"passwordVersion,omitempty"`
3525

pkg/controller/atlasdatabaseuser/connectionsecrets.go

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ import (
77
"sigs.k8s.io/controller-runtime/pkg/client"
88

99
mdbv1 "github.com/mongodb/mongodb-atlas-kubernetes/pkg/api/v1"
10-
"github.com/mongodb/mongodb-atlas-kubernetes/pkg/api/v1/status"
1110
"github.com/mongodb/mongodb-atlas-kubernetes/pkg/controller/connectionsecret"
1211
"github.com/mongodb/mongodb-atlas-kubernetes/pkg/controller/workflow"
1312
"github.com/mongodb/mongodb-atlas-kubernetes/pkg/util/stringutil"
@@ -20,7 +19,6 @@ func createOrUpdateConnectionSecrets(ctx *workflow.Context, k8sClient client.Cli
2019
return workflow.Terminate(workflow.DatabaseUserConnectionSecretsNotCreated, err.Error())
2120
}
2221

23-
secretNames := make(map[string]string)
2422
requeue := false
2523
for _, cluster := range clusters {
2624
scopes := dbUser.GetScopes(mdbv1.ClusterScopeType)
@@ -56,14 +54,12 @@ func createOrUpdateConnectionSecrets(ctx *workflow.Context, k8sClient client.Cli
5654
return workflow.Terminate(workflow.DatabaseUserConnectionSecretsNotCreated, err.Error())
5755
}
5856
ctx.Log.Debugw("Ensured connection Secret up-to-date", "secretname", secretName)
59-
secretNames[cluster.Name] = secretName
6057
}
6158

6259
if err := cleanupStaleSecrets(ctx, k8sClient, project.ID(), dbUser); err != nil {
6360
return workflow.Terminate(workflow.DatabaseUserStaleConnectionSecrets, err.Error())
6461
}
6562

66-
ctx.EnsureStatusOption(status.AtlasDatabaseUserSecretsOption(secretNames))
6763
if requeue {
6864
return workflow.InProgress(workflow.DatabaseUserConnectionSecretsNotCreated, "Waiting for clusters to get created/updated")
6965
}

test/int/dbuser_test.go

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -185,12 +185,6 @@ var _ = Describe("AtlasDatabaseUser", func() {
185185
validateSecret(k8sClient, *createdProject, *createdClusterGCP, *createdDBUser)
186186
validateSecret(k8sClient, *createdProject, *createdClusterAWS, *createdDBUser)
187187
checkNumberOfConnectionSecrets(k8sClient, *createdProject, 2)
188-
189-
expectedSecretsInStatus := map[string]string{
190-
"test-cluster-aws": connSecretname("-test-cluster-aws-test-db-user"),
191-
"test-cluster-gcp": connSecretname("-test-cluster-gcp-test-db-user"),
192-
}
193-
Expect(createdDBUser.Status.ConnectionSecrets).To(Equal(expectedSecretsInStatus))
194188
})
195189
By("Checking connectivity to Clusters", func() {
196190
// The user created lacks read/write roles
@@ -218,12 +212,6 @@ var _ = Describe("AtlasDatabaseUser", func() {
218212
validateSecret(k8sClient, *createdProject, *createdClusterGCP, *createdDBUser)
219213
validateSecret(k8sClient, *createdProject, *createdClusterAWS, *createdDBUser)
220214
checkNumberOfConnectionSecrets(k8sClient, *createdProject, 2)
221-
222-
expectedSecretsInStatus := map[string]string{
223-
"test-cluster-aws": connSecretname("-test-cluster-aws-test-db-user"),
224-
"test-cluster-gcp": connSecretname("-test-cluster-gcp-test-db-user"),
225-
}
226-
Expect(createdDBUser.Status.ConnectionSecrets).To(Equal(expectedSecretsInStatus))
227215
})
228216

229217
By("Checking write permissions for Clusters", func() {
@@ -271,8 +259,6 @@ var _ = Describe("AtlasDatabaseUser", func() {
271259
validateSecret(k8sClient, *createdProject, *createdClusterAWS, *createdDBUser)
272260
validateSecret(k8sClient, *createdProject, *createdClusterGCP, *secondDBUser)
273261
checkNumberOfConnectionSecrets(k8sClient, *createdProject, 3)
274-
expectedSecretsInStatus := map[string]string{"test-cluster-gcp": connSecretname("-test-cluster-gcp-second-db-user")}
275-
Expect(secondDBUser.Status.ConnectionSecrets).To(Equal(expectedSecretsInStatus))
276262
})
277263

278264
By("Checking write permissions for Clusters", func() {
@@ -323,7 +309,6 @@ var _ = Describe("AtlasDatabaseUser", func() {
323309

324310
checkUserInAtlas(*createdDBUser)
325311
checkNumberOfConnectionSecrets(k8sClient, *createdProject, 0)
326-
Expect(createdDBUser.Status.ConnectionSecrets).To(BeEmpty())
327312
})
328313
By("Creating cluster", func() {
329314
createdClusterAWS = mdbv1.DefaultAWSCluster(namespace.Name, createdProject.Name)
@@ -346,8 +331,6 @@ var _ = Describe("AtlasDatabaseUser", func() {
346331
By("Checking connection Secrets", func() {
347332
validateSecret(k8sClient, *createdProject, *createdClusterAWS, *createdDBUser)
348333
checkNumberOfConnectionSecrets(k8sClient, *createdProject, 1)
349-
expectedSecretsInStatus := map[string]string{"test-cluster-aws": connSecretname("-test-cluster-aws-test-db-user")}
350-
Expect(createdDBUser.Status.ConnectionSecrets).To(Equal(expectedSecretsInStatus))
351334
})
352335
})
353336
})

0 commit comments

Comments
 (0)