@@ -119,6 +119,10 @@ var (
119
119
120
120
const PDBFinalizer = "database.oracle.com/PDBfinalizer"
121
121
122
+ var tdePassword string
123
+ var tdeSecret string
124
+
125
+
122
126
//+kubebuilder:rbac:groups=database.oracle.com,resources=pdbs,verbs=get;list;watch;create;update;patch;delete
123
127
//+kubebuilder:rbac:groups=database.oracle.com,resources=pdbs/status,verbs=get;update;patch
124
128
//+kubebuilder:rbac:groups=database.oracle.com,resources=pdbs/finalizers,verbs=get;create;update;patch;delete
@@ -585,6 +589,9 @@ func (r *PDBReconciler) createPDB(ctx context.Context, req ctrl.Request, pdb *db
585
589
log := r .Log .WithValues ("createPDB" , req .NamespacedName )
586
590
587
591
var err error
592
+ var tdePassword string
593
+ var tdeSecret string
594
+
588
595
589
596
cdb , err := r .getCDBResource (ctx , req , pdb )
590
597
if err != nil {
@@ -613,14 +620,17 @@ func (r *PDBReconciler) createPDB(ctx context.Context, req ctrl.Request, pdb *db
613
620
"getScript" : strconv .FormatBool (* (pdb .Spec .GetScript ))}
614
621
615
622
if * (pdb .Spec .TDEImport ) {
616
- tdePassword , err : = r .getSecret (ctx , req , pdb , pdb .Spec .TDEPassword .Secret .SecretName , pdb .Spec .TDEPassword .Secret .Key )
623
+ tdePassword , err = r .getSecret (ctx , req , pdb , pdb .Spec .TDEPassword .Secret .SecretName , pdb .Spec .TDEPassword .Secret .Key )
617
624
if err != nil {
618
625
return err
619
626
}
620
- tdeSecret , err : = r .getSecret (ctx , req , pdb , pdb .Spec .TDESecret .Secret .SecretName , pdb .Spec .TDESecret .Secret .Key )
627
+ tdeSecret , err = r .getSecret (ctx , req , pdb , pdb .Spec .TDESecret .Secret .SecretName , pdb .Spec .TDESecret .Secret .Key )
621
628
if err != nil {
622
629
return err
623
630
}
631
+
632
+ tdeSecret = tdeSecret [:len (tdeSecret )- 1 ]
633
+ tdePassword = tdeSecret [:len (tdePassword )- 1 ]
624
634
values ["tdePassword" ] = tdePassword
625
635
values ["tdeKeystorePath" ] = pdb .Spec .TDEKeystorePath
626
636
values ["tdeSecret" ] = tdeSecret
@@ -636,6 +646,7 @@ func (r *PDBReconciler) createPDB(ctx context.Context, req ctrl.Request, pdb *db
636
646
}
637
647
_ , err = r .callAPI (ctx , req , pdb , url , values , "POST" )
638
648
if err != nil {
649
+ log .Error (err , "callAPI error" , err .Error ())
639
650
return err
640
651
}
641
652
@@ -720,6 +731,8 @@ func (r *PDBReconciler) plugPDB(ctx context.Context, req ctrl.Request, pdb *dbap
720
731
log := r .Log .WithValues ("plugPDB" , req .NamespacedName )
721
732
722
733
var err error
734
+ var tdePassword string
735
+ var tdeSecret string
723
736
724
737
cdb , err := r .getCDBResource (ctx , req , pdb )
725
738
if err != nil {
@@ -742,14 +755,17 @@ func (r *PDBReconciler) plugPDB(ctx context.Context, req ctrl.Request, pdb *dbap
742
755
"getScript" : strconv .FormatBool (* (pdb .Spec .GetScript ))}
743
756
744
757
if * (pdb .Spec .TDEImport ) {
745
- tdePassword , err : = r .getSecret (ctx , req , pdb , pdb .Spec .TDEPassword .Secret .SecretName , pdb .Spec .TDEPassword .Secret .Key )
758
+ tdePassword , err = r .getSecret (ctx , req , pdb , pdb .Spec .TDEPassword .Secret .SecretName , pdb .Spec .TDEPassword .Secret .Key )
746
759
if err != nil {
747
760
return err
748
761
}
749
- tdeSecret , err : = r .getSecret (ctx , req , pdb , pdb .Spec .TDESecret .Secret .SecretName , pdb .Spec .TDESecret .Secret .Key )
762
+ tdeSecret , err = r .getSecret (ctx , req , pdb , pdb .Spec .TDESecret .Secret .SecretName , pdb .Spec .TDESecret .Secret .Key )
750
763
if err != nil {
751
764
return err
752
765
}
766
+
767
+ tdeSecret = tdeSecret [:len (tdeSecret )- 1 ]
768
+ tdePassword = tdeSecret [:len (tdePassword )- 1 ]
753
769
values ["tdePassword" ] = tdePassword
754
770
values ["tdeKeystorePath" ] = pdb .Spec .TDEKeystorePath
755
771
values ["tdeSecret" ] = tdeSecret
@@ -793,6 +809,9 @@ func (r *PDBReconciler) unplugPDB(ctx context.Context, req ctrl.Request, pdb *db
793
809
log := r .Log .WithValues ("unplugPDB" , req .NamespacedName )
794
810
795
811
var err error
812
+ var tdePassword string
813
+ var tdeSecret string
814
+
796
815
797
816
cdb , err := r .getCDBResource (ctx , req , pdb )
798
817
if err != nil {
@@ -806,21 +825,25 @@ func (r *PDBReconciler) unplugPDB(ctx context.Context, req ctrl.Request, pdb *db
806
825
807
826
if * (pdb .Spec .TDEExport ) {
808
827
// Get the TDE Password
809
- tdePassword , err : = r .getSecret (ctx , req , pdb , pdb .Spec .TDEPassword .Secret .SecretName , pdb .Spec .TDEPassword .Secret .Key )
828
+ tdePassword , err = r .getSecret (ctx , req , pdb , pdb .Spec .TDEPassword .Secret .SecretName , pdb .Spec .TDEPassword .Secret .Key )
810
829
if err != nil {
811
830
return err
812
831
}
813
- tdeSecret , err : = r .getSecret (ctx , req , pdb , pdb .Spec .TDESecret .Secret .SecretName , pdb .Spec .TDESecret .Secret .Key )
832
+ tdeSecret , err = r .getSecret (ctx , req , pdb , pdb .Spec .TDESecret .Secret .SecretName , pdb .Spec .TDESecret .Secret .Key )
814
833
if err != nil {
815
834
return err
816
835
}
836
+
837
+ tdeSecret = tdeSecret [:len (tdeSecret )- 1 ]
838
+ tdePassword = tdeSecret [:len (tdePassword )- 1 ]
817
839
values ["tdePassword" ] = tdePassword
818
840
values ["tdeKeystorePath" ] = pdb .Spec .TDEKeystorePath
819
841
values ["tdeSecret" ] = tdeSecret
820
842
values ["tdeExport" ] = strconv .FormatBool (* (pdb .Spec .TDEExport ))
821
843
}
822
844
823
845
url := "https://" + pdb .Spec .CDBResName + "-ords:" + strconv .Itoa (cdb .Spec .ORDSPort ) + "/ords/_/db-api/latest/database/pdbs/" + pdb .Spec .PDBName + "/"
846
+ log .Info ("CallAPI(url)" , "url" , url )
824
847
825
848
pdb .Status .Phase = pdbPhaseUnplug
826
849
pdb .Status .Msg = "Waiting for PDB to be unplugged"
0 commit comments