Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create singleton recipe for Cert Manager #2328

Open
wants to merge 10 commits into
base: scripts-dev
Choose a base branch
from
85 changes: 85 additions & 0 deletions velero/backup/cert-manager/label-singleton-cert-manager-job.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,85 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: label-singleton-cert-manager-job
namespace: <cert manager namespace>
---

apiVersion: rbac.authorization.k8s.io/v1
kind: Role
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If the catalogsource is not in the same namespace as the cert manager operator, do we need a second role and rolebinding specifically for the catalogsource?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, this is a good point. I have committed a new YAML file named label-singleton-cert-manager-clusterrole.yaml, which contains a ClusterRole and RoleBinding specifically for the catalog in a namespace diff from the operator.
We could also mention in the documentation that if a customer has this situation, they need a cluster permission and apply this YAML file.

metadata:
name: label-singleton-cert-manager-job
rules:
- verbs:
- get
- list
- update
- patch
apiGroups:
- operators.coreos.com
- operator.ibm.com
resources:
- namespaces
- catalogsources
- operatorgroups
- subscriptions
- certmanagerconfigs
---

apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: label-singleton-cert-manager-job
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: label-singleton-cert-manager-job
subjects:
- kind: ServiceAccount
name: label-singleton-cert-manager-job
namespace: <cert manager namespace>
---

apiVersion: batch/v1
kind: Job
metadata:
name: label-singleton-cert-manager-job
namespace: <cert manager namespace>
spec:
template:
metadata:
name: label-singleton-cert-manager-job
namespace: <cert manager namespace>
spec:
suspend: true
restartPolicy: OnFailure
containers:
- command: ["/bin/bash", "-c", "/scripts/velero/backup/cert-manager/label-singleton-cert-manager.sh --namespaces <cert manager namespace>"]

image: icr.io/cpopen/cpfs/cpfs-utils:4.6.4
imagePullPolicy: IfNotPresent
name: cpfs-util
resources:
limits:
cpu: 500m
ephemeral-storage: 512Mi
memory: 1536Mi
requests:
cpu: 200m
ephemeral-storage: 128Mi
memory: 512Mi
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: File
volumeMounts:
- name: logs
mountPath: /scripts/logs
dnsPolicy: ClusterFirst
schedulerName: default-scheduler
securityContext:
runAsNonRoot: true
serviceAccount: label-singleton-cert-manager-job
serviceAccountName: label-singleton-cert-manager-job
terminationGracePeriodSeconds: 30
volumes:
- emptyDir: {}
name: logs
183 changes: 183 additions & 0 deletions velero/backup/cert-manager/label-singleton-cert-manager.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,183 @@
#!/usr/bin/env bash

# Licensed Materials - Property of IBM
# Copyright IBM Corporation 2023. All Rights Reserved
# US Government Users Restricted Rights -
# Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
#
# This is an internal component, bundled with an official IBM product.
# Please refer to that particular license for additional information.

set -o errtrace
set -o nounset

# ---------- Command arguments ----------
OC=oc
CERT_MANAGER_NAMESPACE="ibm-cert-manager"

# Catalog sources and namespace
ENABLE_PRIVATE_CATALOG=0
CM_SOURCE="ibm-cert-manager-catalog"
CM_SOURCE_NS="openshift-marketplace"

# ---------- Command variables ----------

# script base directory
BASE_DIR=$(cd $(dirname "$0")/$(dirname "$(readlink $0)") && pwd -P)

# ---------- Main functions ----------

function main() {
parse_arguments "$@"
pre_req
label_catalogsource
label_ns_and_related
label_subscription
label_cert_manager_config
success "Successfully labeled all the resources"
}

function print_usage(){ #TODO update usage definition
script_name=`basename ${0}`
echo "Usage: ${script_name} [OPTIONS]"
echo ""
echo "Label Cert Manager resources to prepare for Backup."
echo "Cert Manager namespace is always required."
echo ""
echo "Options:"
echo " --oc string Optional. File path to oc CLI. Default uses oc in your PATH. Can also be set in env.properties."
echo " --cert-manager-ns Optional. Specifying will enable labeling of the cert manager operator. Permissions may need to be updated to include the namespace."
echo " --enable-private-catalog Optional. Specifying will look for catalog sources in the operator namespace. If enabled, will look for cert manager in its respective namespaces."
echo " --cert-manager-catalog Optional. Specifying will look for the cert manager catalog source name."
echo " --cert-manager-catalog-ns Optional. Specifying will look for the cert manager catalog source namespace."
echo " -h, --help Print usage information"
echo ""

}

function parse_arguments() {
script_name=`basename ${0}`
echo "All arguments passed into the ${script_name}: $@"
echo ""

# process options
while [[ "$@" != "" ]]; do
case "$1" in
--oc)
shift
OC=$1
;;
--cert-manager-ns)
shift
CERT_MANAGER_NAMESPACE=$1
;;
--enable-private-catalog)
ENABLE_PRIVATE_CATALOG=1
;;
--cert-manager-catalog)
shift
CM_SOURCE=$1
;;
--cert-manager-catalog-ns)
shift
CM_SOURCE_NS=$1
;;
-h | --help)
print_usage
exit 1
;;
*)
echo "Entered option $1 not supported. Run ./${script_name} -h for script usage info."
;;
esac
shift
done
echo ""
}

function pre_req(){

title "Start to validate the parameters passed into script... "
# Checking oc command logged in
user=$($OC whoami 2> /dev/null)
if [ $? -ne 0 ]; then
error "You must be logged into the OpenShift Cluster from the oc command line"
else
success "oc command logged in as ${user}"
fi
}

function label_catalogsource() {

title "Start to label the Cert Manager catalog sources... "
# Label the Private CatalogSources in provided namespaces
if [ $ENABLE_PRIVATE_CATALOG -eq 1 ]; then
CM_SOURCE_NS=$CERT_MANAGER_NAMESPACE
fi
${OC} label catalogsource "$CM_SOURCE" foundationservices.cloudpak.ibm.com=cert-manager-operator -n "$CM_SOURCE_NS" --overwrite=true 2>/dev/null
echo ""
}

function label_ns_and_related() {

title "Start to label the namespaces, operatorgroups... "

# Label the cert manager namespace
${OC} label namespace "$CERT_MANAGER_NAMESPACE" foundationservices.cloudpak.ibm.com=cert-manager-operator --overwrite=true 2>/dev/null

# Label the cert manager OperatorGroup
operator_group=$(${OC} get operatorgroup -n "$CERT_MANAGER_NAMESPACE" -o jsonpath='{.items[*].metadata.name}')
${OC} label operatorgroup "$operator_group" foundationservices.cloudpak.ibm.com=cert-manager-operator -n "$CERT_MANAGER_NAMESPACE" --overwrite=true 2>/dev/null

echo ""
}


function label_subscription() {

title "Start to label the Subscriptions... "
local cm_pm="ibm-cert-manager-operator"
${OC} label subscriptions.operators.coreos.com $cm_pm foundationservices.cloudpak.ibm.com=cert-manager-operator -n $CERT_MANAGER_NAMESPACE --overwrite=true 2>/dev/null
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have two different labels for the cert manager subscription in this pr. If a user runs both the label common service script and the label singleton cert manager script, the order they are both run could affect how/whether the restore works.

echo ""
}

function label_cert_manager_config(){
title "Start to label the Cert Manager resources... "
${OC} label customresourcedefinition certmanagerconfigs.operator.ibm.com foundationservices.cloudpak.ibm.com=cert-manager-operator --overwrite=true 2>/dev/null
info "Start to label the Cert Manager Configs"
cert_manager_configs=$(${OC} get certmanagerconfigs.operator.ibm.com -n $CERT_MANAGER_NAMESPACE -o jsonpath='{.items[*].metadata.name}')
while IFS= read -r cert_manager_config; do
${OC} label certmanagerconfigs.operator.ibm.com $cert_manager_config foundationservices.cloudpak.ibm.com=cert-manager-operator -n $CERT_MANAGER_NAMESPACE --overwrite=true 2>/dev/null
done <<< "$cert_manager_configs"
}

# ---------- Info functions ----------#

function msg() {
printf '%b\n' "$1"
}

function success() {
msg "\33[32m[✔] ${1}\33[0m"
}

function error() {
msg "\33[31m[✘] ${1}\33[0m"
exit 1
}

function title() {
msg "\33[34m# ${1}\33[0m"
}

function info() {
msg "[INFO] ${1}"
}

function warning() {
msg "\33[33m[✗] ${1}\33[0m"
}

main $*

# ---------------- finish ----------------
15 changes: 14 additions & 1 deletion velero/backup/common-service/label-common-service.sh
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,9 @@ function main() {
label_ns_and_related
label_configmap
label_subscription
if [[ $ENABLE_CERT_MANAGER -eq 1 ]]; then
label_cert_manager
fi
if [[ $ENABLE_LSR -eq 1 ]]; then
label_lsr
fi
Expand Down Expand Up @@ -323,7 +326,7 @@ function label_subscription() {

${OC} label subscriptions.operators.coreos.com $cs_pm foundationservices.cloudpak.ibm.com=subscription -n $OPERATOR_NS --overwrite=true 2>/dev/null
if [[ $ENABLE_CERT_MANAGER -eq 1 ]]; then
${OC} label subscriptions.operators.coreos.com $cm_pm foundationservices.cloudpak.ibm.com=singleton-subscription -n $CERT_MANAGER_NAMESPACE --overwrite=true 2>/dev/null
${OC} label subscriptions.operators.coreos.com $cm_pm foundationservices.cloudpak.ibm.com=cert-manager -n $CERT_MANAGER_NAMESPACE --overwrite=true 2>/dev/null
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have a couple thoughts on changing the label name:

  1. we will need to update the instructions for OADP/Velero to make sure these are properly reflected
  2. we need to include the cert manager crds (like certificate and issuer) because they are currently not included so when we restore cert-manager, we will fail to restore certs and issuers labeled cert-manager from the label-cert-manager.sh script

Its possible to lump all cert manager resources (including the subscription) together (I think) but we need to make sure CRDs are there and I don't seem them labeled in any of our existing scripts.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These thoughts mostly apply to how the script changes affect OADP/Velero. In Fusion, we can always create the subscription first and then the resources after and its not a big deal but if we are running the restore-cert-manager.yaml file for OADP/Velero, it may not be able to create the certificates and issuers because the crds are not present yet

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think to address the above comments, we either label the cert manager crds or we continue with the singleton-subscription label. I am leaning towards labeling cert manager CRDs (certs, issuers, etc.)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For the labelling subscription of cert manager, I have updated the label in both label-singleton-cert-manager.sh and label-common-services.sh scripts to foundationservices.cloudpak.ibm.com=cert-manager-operator as we discussed this could be diff from the one in label-cert-manager.sh

fi
if [[ $ENABLE_LICENSING -eq 1 ]]; then
${OC} label subscriptions.operators.coreos.com $lis_pm foundationservices.cloudpak.ibm.com=singleton-subscription -n $LICENSING_NAMESPACE --overwrite=true 2>/dev/null
Expand All @@ -334,6 +337,16 @@ function label_subscription() {
echo ""
}

function label_cert_manager(){
title "Start to label the Cert Manager resources... "
${OC} label customresourcedefinition certmanagerconfigs.operator.ibm.com foundationservices.cloudpak.ibm.com=cert-manager --overwrite=true 2>/dev/null
info "Start to label the Cert Manager Configs"
cert_manager_configs=$(${OC} get certmanagerconfigs.operator.ibm.com -n $CERT_MANAGER_NAMESPACE -o jsonpath='{.items[*].metadata.name}')
while IFS= read -r cert_manager_config; do
${OC} label certmanagerconfigs.operator.ibm.com $cert_manager_config foundationservices.cloudpak.ibm.com=cert-manager -n $CERT_MANAGER_NAMESPACE --overwrite=true 2>/dev/null
done <<< "$cert_manager_configs"
}

function label_lsr() {

title "Start to label the License Service Reporter... "
Expand Down
Loading