Skip to content

Commit 71a1603

Browse files
committed
fix: wpb-22439 disable MLS secret and postgresql secret generation, disable postgresql deployment for 5.14 release
1 parent bbd8345 commit 71a1603

5 files changed

Lines changed: 34 additions & 44 deletions

File tree

ansible/helm_external.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@
4949

5050
- hosts: "postgresql"
5151
become: false
52+
tags: postgresql-external
5253
tasks:
5354
- name: Create external IP directory for postgresql
5455
file:

bin/offline-cluster.sh

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,11 +50,12 @@ ansible-playbook -i $INVENTORY_FILE $ANSIBLE_DIR/kubernetes.yml --skip-tags boot
5050
ansible-playbook -i $INVENTORY_FILE $ANSIBLE_DIR/cassandra.yml
5151
ansible-playbook -i $INVENTORY_FILE $ANSIBLE_DIR/elasticsearch.yml
5252
ansible-playbook -i $INVENTORY_FILE $ANSIBLE_DIR/minio.yml
53-
ansible-playbook -i $INVENTORY_FILE $ANSIBLE_DIR/postgresql-deploy.yml
53+
54+
#ansible-playbook -i $INVENTORY_FILE $ANSIBLE_DIR/postgresql-deploy.yml
5455

5556
# Uncomment to deploy external RabbitMQ (temporarily commented out until implemented in CD), PS. remote --skip-tags=rabbitmq-external from the next section
5657
#ansible-playbook -i $INVENTORY_FILE $ANSIBLE_DIR/roles/rabbitmq-cluster/tasks/configure_dns.yml
5758
#ansible-playbook -i $INVENTORY_FILE $ANSIBLE_DIR/rabbitmq.yml
5859

5960
# create helm values that tell our helm charts what the IP addresses of cassandra, elasticsearch and minio are:
60-
ansible-playbook -i $INVENTORY_FILE $ANSIBLE_DIR/helm_external.yml --skip-tags=rabbitmq-external
61+
ansible-playbook -i $INVENTORY_FILE $ANSIBLE_DIR/helm_external.yml --skip-tags=rabbitmq-external,postgresql-external

bin/offline-deploy.sh

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -42,15 +42,15 @@ fi
4242
$DOCKER_RUN_BASE $SSH_MOUNT $WSD_CONTAINER ./bin/offline-cluster.sh
4343

4444
# Sync PostgreSQL password from K8s secret to secrets.yaml
45-
echo "Syncing PostgreSQL password from Kubernetes secret..."
46-
sudo docker run --network=host -v $PWD:/wire-server-deploy $WSD_CONTAINER ./bin/sync-k8s-secret-to-wire-secrets.sh \
47-
wire-postgresql-external-secret \
48-
password \
49-
values/wire-server/secrets.yaml \
50-
.brig.secrets.pgPassword \
51-
.galley.secrets.pgPassword \
52-
.spar.secrets.pgPassword \
53-
.gundeck.secrets.pgPassword
45+
#echo "Syncing PostgreSQL password from Kubernetes secret..."
46+
#sudo docker run --network=host -v $PWD:/wire-server-deploy $WSD_CONTAINER ./bin/sync-k8s-secret-to-wire-secrets.sh \
47+
# wire-postgresql-external-secret \
48+
# password \
49+
# values/wire-server/secrets.yaml \
50+
# .brig.secrets.pgPassword \
51+
# .galley.secrets.pgPassword \
52+
# .spar.secrets.pgPassword \
53+
# .gundeck.secrets.pgPassword
5454

5555

5656
sudo docker run --network=host -v $PWD:/wire-server-deploy $WSD_CONTAINER ./bin/offline-helm.sh

bin/offline-helm.sh

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,25 +3,25 @@
33
set -euo pipefail
44
set -x
55

6-
sync_pg_secrets() {
7-
# Sync postgresql secret
8-
./bin/sync-k8s-secret-to-wire-secrets.sh \
9-
wire-postgresql-external-secret \
10-
password \
11-
values/wire-server/secrets.yaml \
12-
.brig.secrets.pgPassword \
13-
.galley.secrets.pgPassword \
14-
.spar.secrets.pgPassword \
15-
.gundeck.secrets.pgPassword
16-
}
6+
#sync_pg_secrets() {
7+
# # Sync postgresql secret
8+
# ./bin/sync-k8s-secret-to-wire-secrets.sh \
9+
# wire-postgresql-external-secret \
10+
# password \
11+
# values/wire-server/secrets.yaml \
12+
# .brig.secrets.pgPassword \
13+
# .galley.secrets.pgPassword \
14+
# .spar.secrets.pgPassword \
15+
# .gundeck.secrets.pgPassword
16+
#}
1717

1818
helm upgrade --install --wait cassandra-external ./charts/cassandra-external --values ./values/cassandra-external/values.yaml
19-
helm upgrade --install --wait postgresql-external ./charts/postgresql-external --values ./values/postgresql-external/values.yaml
19+
#helm upgrade --install --wait postgresql-external ./charts/postgresql-external --values ./values/postgresql-external/values.yaml
2020
helm upgrade --install --wait elasticsearch-external ./charts/elasticsearch-external --values ./values/elasticsearch-external/values.yaml
2121
helm upgrade --install --wait minio-external ./charts/minio-external --values ./values/minio-external/values.yaml
2222
helm upgrade --install --wait fake-aws ./charts/fake-aws --values ./values/fake-aws/prod-values.example.yaml
2323

24-
sync_pg_secrets
24+
#sync_pg_secrets
2525

2626
# ensure that the RELAY_NETWORKS value is set to the podCIDR
2727
SMTP_VALUES_FILE="./values/smtp/prod-values.example.yaml"

bin/offline-secrets.sh

Lines changed: 8 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -24,22 +24,21 @@ prometheus_pass="$(tr -dc A-Za-z0-9 </dev/urandom | head -c 16)"
2424

2525
# Generate MLS private keys using openssl
2626
# Keys need 10 spaces indent (5 levels deep: galley > secrets > mlsPrivateKeys > removal > keyname)
27-
readonly MLS_KEY_INDENT=" "
28-
generate_mls_key() {
29-
openssl genpkey "$@" 2>/dev/null | awk -v indent="$MLS_KEY_INDENT" '{printf "%s%s\n", indent, $0}'
30-
}
27+
#readonly MLS_KEY_INDENT=" "
28+
#generate_mls_key() {
29+
# openssl genpkey "$@" 2>/dev/null | awk -v indent="$MLS_KEY_INDENT" '{printf "%s%s\n", indent, $0}'
30+
#}
3131

32-
mls_ed25519_key="$(generate_mls_key -algorithm ed25519)"
33-
mls_ecdsa_p256_key="$(generate_mls_key -algorithm ec -pkeyopt ec_paramgen_curve:P-256)"
34-
mls_ecdsa_p384_key="$(generate_mls_key -algorithm ec -pkeyopt ec_paramgen_curve:P-384)"
35-
mls_ecdsa_p521_key="$(generate_mls_key -algorithm ec -pkeyopt ec_paramgen_curve:P-521)"
32+
#mls_ed25519_key="$(generate_mls_key -algorithm ed25519)"
33+
#mls_ecdsa_p256_key="$(generate_mls_key -algorithm ec -pkeyopt ec_paramgen_curve:P-256)"
34+
#mls_ecdsa_p384_key="$(generate_mls_key -algorithm ec -pkeyopt ec_paramgen_curve:P-384)"
35+
#mls_ecdsa_p521_key="$(generate_mls_key -algorithm ec -pkeyopt ec_paramgen_curve:P-521)"
3636

3737
if [[ ! -f $VALUES_DIR/wire-server/secrets.yaml ]]; then
3838
echo "Writing $VALUES_DIR/wire-server/secrets.yaml"
3939
cat <<EOF > $VALUES_DIR/wire-server/secrets.yaml
4040
brig:
4141
secrets:
42-
pgPassword: verysecurepassword
4342
smtpPassword: dummyPassword
4443
zAuth:
4544
publicKeys: "$zauth_public"
@@ -76,19 +75,8 @@ galley:
7675
rabbitmq:
7776
username: guest
7877
password: guest
79-
pgPassword: verysecurepassword
8078
awsKeyId: dummykey
8179
awsSecretKey: dummysecret
82-
mlsPrivateKeys:
83-
removal:
84-
ed25519: |
85-
$mls_ed25519_key
86-
ecdsa_secp256r1_sha256: |
87-
$mls_ecdsa_p256_key
88-
ecdsa_secp384r1_sha384: |
89-
$mls_ecdsa_p384_key
90-
ecdsa_secp521r1_sha512: |
91-
$mls_ecdsa_p521_key
9280
gundeck:
9381
secrets:
9482
awsKeyId: dummykey

0 commit comments

Comments
 (0)