Skip to content

Commit

Permalink
followup on PR and release new version
Browse files Browse the repository at this point in the history
  • Loading branch information
Lerentis committed Jan 22, 2023
1 parent 4e23b67 commit 689a6e5
Show file tree
Hide file tree
Showing 4 changed files with 48 additions and 8 deletions.
2 changes: 1 addition & 1 deletion Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ RUN apk add wget unzip
RUN cd /tmp && wget https://github.com/bitwarden/clients/releases/download/cli-v${BW_VERSION}/bw-linux-${BW_VERSION}.zip && \
unzip /tmp/bw-linux-${BW_VERSION}.zip

FROM alpine:3.17
FROM alpine:3.17.1

ARG PYTHON_VERSION=3.10.9-r1
ARG PIP_VERSION=22.3.1-r1
Expand Down
16 changes: 9 additions & 7 deletions charts/bitwarden-crd-operator/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,9 @@ description: Deploy the Bitwarden CRD Operator

type: application

version: "v0.5.0"
version: "v0.5.1"

appVersion: "0.5.0"
appVersion: "0.5.1"

keywords:
- operator
Expand Down Expand Up @@ -94,12 +94,14 @@ annotations:
artifacthub.io/license: MIT
artifacthub.io/operator: "true"
artifacthub.io/changes: |
- kind: added
description: "Implemented update handling"
- kind: fixed
description: "Unlocking bitwarden only when needed"
- kind: changed
description: "Changed default logging structure to json logging"
description: "Allow switch of namespaces in CRDs"
- kind: fixed
description: "Handle none existing keys gracefully"
- kind: changed
description: "Secrets are periodically updated every 15 minutes"
description: "Bump alpine minor release version"
artifacthub.io/images: |
- name: bitwarden-crd-operator
image: lerentis/bitwarden-crd-operator:0.5.0
image: lerentis/bitwarden-crd-operator:0.5.1
19 changes: 19 additions & 0 deletions src/dockerlogin.py
Original file line number Diff line number Diff line change
Expand Up @@ -63,6 +63,25 @@ def update_managed_registry_secret(spec, status, name, namespace, logger, body,
secret_name = spec.get('name')
secret_namespace = spec.get('namespace')


old_config = None
old_secret_name = None
old_secret_namespace = None
if 'kopf.zalando.org/last-handled-configuration' in body.metadata.annotations:
old_config = json.loads(body.metadata.annotations['kopf.zalando.org/last-handled-configuration'])
old_secret_name = old_config['spec'].get('name')
old_secret_namespace = old_config['spec'].get('namespace')
secret_name = spec.get('name')
secret_namespace = spec.get('namespace')

if old_config is not None and (old_secret_name != secret_name or old_secret_namespace != secret_namespace):
# If the name of the secret or the namespace of the secret is different
# We have to delete the secret an recreate it
logger.info("Secret name or namespace changed, let's recreate it")
delete_managed_secret(old_config['spec'], name, namespace, logger, **kwargs)
create_managed_registry_secret(spec, name, namespace, logger, **kwargs)
return

unlock_bw(logger)
logger.info(f"Locking up secret with ID: {id}")
secret_json_object = json.loads(get_secret_from_bitwarden(id))
Expand Down
19 changes: 19 additions & 0 deletions src/template.py
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
import kopf
import base64
import kubernetes
import json

from utils.utils import unlock_bw
from lookups.bitwarden_lookup import bitwarden_lookup
Expand Down Expand Up @@ -57,6 +58,24 @@ def update_managed_secret(spec, status, name, namespace, logger, body, **kwargs)
secret_name = spec.get('name')
secret_namespace = spec.get('namespace')

old_config = None
old_secret_name = None
old_secret_namespace = None
if 'kopf.zalando.org/last-handled-configuration' in body.metadata.annotations:
old_config = json.loads(body.metadata.annotations['kopf.zalando.org/last-handled-configuration'])
old_secret_name = old_config['spec'].get('name')
old_secret_namespace = old_config['spec'].get('namespace')
secret_name = spec.get('name')
secret_namespace = spec.get('namespace')

if old_config is not None and (old_secret_name != secret_name or old_secret_namespace != secret_namespace):
# If the name of the secret or the namespace of the secret is different
# We have to delete the secret an recreate it
logger.info("Secret name or namespace changed, let's recreate it")
delete_managed_secret(old_config['spec'], name, namespace, logger, **kwargs)
create_managed_secret(spec, name, namespace, logger, body, **kwargs)
return

unlock_bw(logger)

api = kubernetes.client.CoreV1Api()
Expand Down

0 comments on commit 689a6e5

Please sign in to comment.