Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow writeConnectionSecretToRef to be compatible with SQL community provider #1189

Open
Keralin opened this issue Mar 1, 2024 · 8 comments
Labels
enhancement New feature or request

Comments

@Keralin
Copy link

Keralin commented Mar 1, 2024

What problem are you facing?

Using the community provider for SQL can't connect to the cluster created if we reference the secrets generated by writeConnectionSecretToRef to the provider because it will search for password and username instead of master_username and attribute.master_password (as is required in their doc) so it requires so manual action modifying the secret and can't be solved in a GitOps way.

How the secrets should be stored:

apiVersion: v1
kind: Secret
data:
  endpoint: xxxxxx
  password: xxxxxx
  port: xxxxxx
  readerEndpoint: xxxxxx
  username: xxxxxx

How are the secrets stored:

apiVersion: v1
kind: Secret
data:
  endpoint: xxxxxx
  attribute.master_password: xxxxxx
  port: xxxxxx
  readerEndpoint: xxxxxx
  master_username: xxxxxx

How could Official AWS Provider help solve your problem?

Enabling a feature to allow configuring how that secret or parameters should be stored, thus allowing the choice to save the connection with a username and password to be compatible with the community SQL provider like other community providers do.

@turkenf
Copy link
Collaborator

turkenf commented May 9, 2024

Hi @Keralin,

I'm a little skeptical about this issue, changing these fields will cause breaking API changes. It seems more logical to fix this on the provider-sql side.

@ivanfoo
Copy link

ivanfoo commented May 9, 2024

@turkenf I think the issue here is that an RDS Cluster resource does not publish the connection details using the keys expected by other components https://github.com/crossplane/crossplane-runtime/blob/master/apis/common/v1/resource.go#L25-L44

The SQL Provider just relies on that: https://github.com/crossplane-contrib/provider-sql/blob/afdf5802c7445e6ed42db11b35e1a45d8f2771dd/pkg/clients/postgresql/postgresql.go#L37

I guess it would be possible to keep publishing the current custom fields (like master_password), but to publish also the standard ones. Is that an option?

@chlunde
Copy link
Contributor

chlunde commented May 27, 2024

Related: #778

Copy link

This provider repo does not have enough maintainers to address every issue. Since there has been no activity in the last 90 days it is now marked as stale. It will be closed in 14 days if no further activity occurs. Leaving a comment starting with /fresh will mark this issue as not stale.

@github-actions github-actions bot added the stale label Aug 27, 2024
@pierluigilenoci
Copy link

/fresh

@github-actions github-actions bot removed the stale label Aug 29, 2024
Copy link

This provider repo does not have enough maintainers to address every issue. Since there has been no activity in the last 90 days it is now marked as stale. It will be closed in 14 days if no further activity occurs. Leaving a comment starting with /fresh will mark this issue as not stale.

@pierluigilenoci
Copy link

/fresh

@pierluigilenoci
Copy link

FYI #1578

@github-actions github-actions bot removed the stale label Nov 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

6 participants