followup on PR and release new version
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing

This commit is contained in:
Tobias Trabelsi 2023-01-22 13:33:43 +01:00
parent 4e23b67f5d
commit 689a6e5bae
Signed by: lerentis
GPG Key ID: FF0C2839718CAF2E
4 changed files with 48 additions and 8 deletions

View File

@ -7,7 +7,7 @@ RUN apk add wget unzip
RUN cd /tmp && wget https://github.com/bitwarden/clients/releases/download/cli-v${BW_VERSION}/bw-linux-${BW_VERSION}.zip && \ RUN cd /tmp && wget https://github.com/bitwarden/clients/releases/download/cli-v${BW_VERSION}/bw-linux-${BW_VERSION}.zip && \
unzip /tmp/bw-linux-${BW_VERSION}.zip unzip /tmp/bw-linux-${BW_VERSION}.zip
FROM alpine:3.17 FROM alpine:3.17.1
ARG PYTHON_VERSION=3.10.9-r1 ARG PYTHON_VERSION=3.10.9-r1
ARG PIP_VERSION=22.3.1-r1 ARG PIP_VERSION=22.3.1-r1

View File

@ -4,9 +4,9 @@ description: Deploy the Bitwarden CRD Operator
type: application type: application
version: "v0.5.0" version: "v0.5.1"
appVersion: "0.5.0" appVersion: "0.5.1"
keywords: keywords:
- operator - operator
@ -94,12 +94,14 @@ annotations:
artifacthub.io/license: MIT artifacthub.io/license: MIT
artifacthub.io/operator: "true" artifacthub.io/operator: "true"
artifacthub.io/changes: | artifacthub.io/changes: |
- kind: added - kind: fixed
description: "Implemented update handling" description: "Unlocking bitwarden only when needed"
- kind: changed - kind: changed
description: "Changed default logging structure to json logging" description: "Allow switch of namespaces in CRDs"
- kind: fixed
description: "Handle none existing keys gracefully"
- kind: changed - kind: changed
description: "Secrets are periodically updated every 15 minutes" description: "Bump alpine minor release version"
artifacthub.io/images: | artifacthub.io/images: |
- name: bitwarden-crd-operator - name: bitwarden-crd-operator
image: lerentis/bitwarden-crd-operator:0.5.0 image: lerentis/bitwarden-crd-operator:0.5.1

View File

@ -63,6 +63,25 @@ def update_managed_registry_secret(spec, status, name, namespace, logger, body,
secret_name = spec.get('name') secret_name = spec.get('name')
secret_namespace = spec.get('namespace') secret_namespace = spec.get('namespace')
old_config = None
old_secret_name = None
old_secret_namespace = None
if 'kopf.zalando.org/last-handled-configuration' in body.metadata.annotations:
old_config = json.loads(body.metadata.annotations['kopf.zalando.org/last-handled-configuration'])
old_secret_name = old_config['spec'].get('name')
old_secret_namespace = old_config['spec'].get('namespace')
secret_name = spec.get('name')
secret_namespace = spec.get('namespace')
if old_config is not None and (old_secret_name != secret_name or old_secret_namespace != secret_namespace):
# If the name of the secret or the namespace of the secret is different
# We have to delete the secret an recreate it
logger.info("Secret name or namespace changed, let's recreate it")
delete_managed_secret(old_config['spec'], name, namespace, logger, **kwargs)
create_managed_registry_secret(spec, name, namespace, logger, **kwargs)
return
unlock_bw(logger) unlock_bw(logger)
logger.info(f"Locking up secret with ID: {id}") logger.info(f"Locking up secret with ID: {id}")
secret_json_object = json.loads(get_secret_from_bitwarden(id)) secret_json_object = json.loads(get_secret_from_bitwarden(id))

View File

@ -1,6 +1,7 @@
import kopf import kopf
import base64 import base64
import kubernetes import kubernetes
import json
from utils.utils import unlock_bw from utils.utils import unlock_bw
from lookups.bitwarden_lookup import bitwarden_lookup from lookups.bitwarden_lookup import bitwarden_lookup
@ -57,6 +58,24 @@ def update_managed_secret(spec, status, name, namespace, logger, body, **kwargs)
secret_name = spec.get('name') secret_name = spec.get('name')
secret_namespace = spec.get('namespace') secret_namespace = spec.get('namespace')
old_config = None
old_secret_name = None
old_secret_namespace = None
if 'kopf.zalando.org/last-handled-configuration' in body.metadata.annotations:
old_config = json.loads(body.metadata.annotations['kopf.zalando.org/last-handled-configuration'])
old_secret_name = old_config['spec'].get('name')
old_secret_namespace = old_config['spec'].get('namespace')
secret_name = spec.get('name')
secret_namespace = spec.get('namespace')
if old_config is not None and (old_secret_name != secret_name or old_secret_namespace != secret_namespace):
# If the name of the secret or the namespace of the secret is different
# We have to delete the secret an recreate it
logger.info("Secret name or namespace changed, let's recreate it")
delete_managed_secret(old_config['spec'], name, namespace, logger, **kwargs)
create_managed_secret(spec, name, namespace, logger, body, **kwargs)
return
unlock_bw(logger) unlock_bw(logger)
api = kubernetes.client.CoreV1Api() api = kubernetes.client.CoreV1Api()