Compare commits

...

8 Commits

Author SHA1 Message Date
Gabriele Fedi
d71ae18319
Merge 2cb76ef622 into 921b20c249 2025-11-27 11:10:02 +08:00
Armando Ruocco
921b20c249
feat: add pprof-server support (#538)
Some checks failed
Deploy Docusaurus to GitHub Pages / build (push) Failing after 5s
Deploy Docusaurus to GitHub Pages / deploy (push) Has been skipped
release-please / release-please (push) Failing after 2s
Barman Base Image / build (push) Failing after 6s
Closes #421

Signed-off-by: Armando Ruocco <armando.ruocco@enterprisedb.com>
2025-11-26 17:54:34 +01:00
Gabriele Fedi
2cb76ef622 refactor: mispelled auth method naming
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
2025-11-18 09:32:14 +01:00
Gabriele Fedi
cdb893a70d docs: minor fixes
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
2025-11-18 09:25:45 +01:00
Gabriele Fedi
6d2d3eb925 chore(dockerfile): add pkg folder to containers
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
2025-11-17 10:18:22 +01:00
Gabriele Fedi
80dfe727ed style(lint): imports
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
2025-11-17 10:17:48 +01:00
Gabriele Fedi
c811749c32 docs: default azure credentials
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
2025-11-14 16:54:50 +01:00
Gabriele Fedi
1c3dd8558f feat(auth): add support for DefaultAzureCredential
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
2025-11-14 16:21:00 +01:00
14 changed files with 96 additions and 2 deletions

View File

@ -128,6 +128,7 @@ pluginConfiguration
podName
postgres
postgresql
pprof
primaryUpdateStrategy
rbac
rc

View File

@ -15,6 +15,7 @@ RUN go mod download
COPY ../cmd/manager/main.go cmd/manager/main.go
COPY ../api/ api/
COPY ../internal/ internal/
COPY ../pkg/ pkg/
ENV GOCACHE=/root/.cache/go-build
ENV GOMODCACHE=/go/pkg/mod

View File

@ -24,6 +24,7 @@ ENV GOMODCACHE=/go/pkg/mod
COPY ../cmd/manager/main.go cmd/manager/main.go
COPY ../api/ api/
COPY ../internal/ internal/
COPY ../pkg/ pkg/
# Build
# the GOARCH has not a default value to allow the binary be built according to the host where the command

View File

@ -52,6 +52,13 @@ func NewCmd() *cobra.Command {
},
}
cmd.Flags().String("pprof-server",
"",
"The address where pprof server should be exposed, for example: 0.0.0.0:6061. "+
"Empty string means disabled. Disabled by default",
)
_ = viper.BindPFlag("pprof-server", cmd.Flags().Lookup("pprof-server"))
_ = viper.BindEnv("namespace", "NAMESPACE")
_ = viper.BindEnv("cluster-name", "CLUSTER_NAME")
_ = viper.BindEnv("pod-name", "POD_NAME")

View File

@ -20,13 +20,17 @@ SPDX-License-Identifier: Apache-2.0
package common
import (
"context"
"fmt"
"path"
"strings"
barmanapi "github.com/cloudnative-pg/barman-cloud/pkg/api"
"github.com/cloudnative-pg/barman-cloud/pkg/command"
apiv1 "github.com/cloudnative-pg/plugin-barman-cloud/api/v1"
"github.com/cloudnative-pg/plugin-barman-cloud/internal/cnpgi/metadata"
pluginmetadata "github.com/cloudnative-pg/plugin-barman-cloud/pkg/metadata"
)
// TODO: refactor.
@ -97,3 +101,14 @@ func MergeEnv(env []string, incomingEnv []string) []string {
func BuildCertificateFilePath(objectStoreName string) string {
return path.Join(metadata.BarmanCertificatesPath, objectStoreName, metadata.BarmanCertificatesFileName)
}
// ContextWithProviderOptions enriches the context with cloud service provider specific options
// based on the ObjectStore resource
func ContextWithProviderOptions(ctx context.Context, objectStore apiv1.ObjectStore) context.Context {
if objectStore.GetAnnotations()[pluginmetadata.UseDefaultAzureCredentialAnnotationName] ==
pluginmetadata.UseDefaultAzureCredentialTrueValue {
return command.ContextWithDefaultAzureCredentials(ctx, true)
}
return ctx
}

View File

@ -127,6 +127,8 @@ func (w WALServiceImplementation) Archive(
return nil, err
}
ctx = ContextWithProviderOptions(ctx, objectStore)
envArchive, err := barmanCredentials.EnvSetCloudCredentialsAndCertificates(
ctx,
w.Client,

View File

@ -87,6 +87,8 @@ func (b BackupServiceImplementation) Backup(
return nil, err
}
ctx = common.ContextWithProviderOptions(ctx, objectStore)
if err := fileutils.EnsureDirectoryExists(postgres.BackupTemporaryDirectory); err != nil {
contextLogger.Error(err, "Cannot create backup temporary directory", "err", err)
return nil, err

View File

@ -52,7 +52,8 @@ func Start(ctx context.Context) error {
namespace := viper.GetString("namespace")
controllerOptions := ctrl.Options{
Scheme: scheme,
PprofBindAddress: viper.GetString("pprof-server"),
Scheme: scheme,
Client: client.Options{
// Important: the caching options below are used by
// controller-runtime only.

View File

@ -93,6 +93,8 @@ func (c *CatalogMaintenanceRunnable) cycle(ctx context.Context) (time.Duration,
return 0, err
}
ctx = common.ContextWithProviderOptions(ctx, barmanObjectStore)
if err := c.maintenance(ctx, &cluster, &barmanObjectStore); err != nil {
return 0, err
}

View File

@ -109,7 +109,7 @@ func (impl JobHookImpl) Restore(
}
if err := impl.checkBackupDestination(
ctx,
common.ContextWithProviderOptions(ctx, targetObjectStore),
configuration.Cluster,
&targetObjectStore.Spec.Configuration,
targetObjectStore.Name,
@ -118,6 +118,8 @@ func (impl JobHookImpl) Restore(
}
}
ctx = common.ContextWithProviderOptions(ctx, recoveryObjectStore)
// Detect the backup to recover
backup, env, err := loadBackupObjectFromExternalCluster(
ctx,

2
pkg/metadata/doc.go Normal file
View File

@ -0,0 +1,2 @@
// Package metadata provides metadata utilities for the Barman Cloud plugin
package metadata

View File

@ -0,0 +1,15 @@
package metadata
// MetadataNamespace is the namespace used for the Barman Cloud plugin metadata
const MetadataNamespace = "barmancloud.cnpg.io"
const (
// UseDefaultAzureCredentialAnnotationName is an annotation that can be set
// on an ObjectStore resource to enable the authentication to Azure via DefaultAzureCredential.
// This is meant to be used with inheritFromAzureAD enabled.
UseDefaultAzureCredentialAnnotationName = MetadataNamespace + "/useDefaultAzureCredential"
// UseDefaultAzureCredentialTrueValue is the value for the annotation
// barmancloud.cnpg.io/useDefaultAzureCredential to enable the DefaultAzureCredentials auth mechanism.
UseDefaultAzureCredentialTrueValue = "true"
)

View File

@ -74,3 +74,24 @@ spec:
For a complete list of supported options, refer to the
[official Barman Cloud documentation](https://docs.pgbarman.org/release/latest/).
## Enable the pprof debug server for the sidecar
You can enable the instance sidecar's pprof debug HTTP server by adding the `--pprof-server=<address>` flag to the container's
arguments via `.spec.instanceSidecarConfiguration.additionalContainerArgs`.
Pass a bind address in the form `<host>:<port>` (for example, `0.0.0.0:6061`).
An empty value disables the server (disabled by default).
### Example
```yaml
apiVersion: barmancloud.cnpg.io/v1
kind: ObjectStore
metadata:
name: my-store
spec:
instanceSidecarConfiguration:
additionalContainerArgs:
- "--pprof-server=0.0.0.0:6061"
```

View File

@ -233,6 +233,7 @@ Barman Cloud supports the following authentication methods:
- Storage Account Name + [Access Key](https://learn.microsoft.com/en-us/azure/storage/common/storage-account-keys-manage)
- Storage Account Name + [SAS Token](https://learn.microsoft.com/en-us/azure/storage/blobs/sas-service-create)
- [Azure AD Workload Identity](https://azure.github.io/azure-workload-identity/docs/introduction.html)
- [DefaultAzureCredential](https://learn.microsoft.com/en-us/azure/developer/go/sdk/authentication/credential-chains#defaultazurecredential-overview)
### Azure AD Workload Identity
@ -252,6 +253,27 @@ spec:
[...]
```
### DefaultAzureCredential
To authenticate using `DefaultAzureCredential`, set the annotation
`barmancloud.cnpg.io/useDefaultAzureCredential="true"` on the ObjectStore in
conjunction with the `.spec.configuration.inheritFromAzureAD` option:
```yaml
apiVersion: barmancloud.cnpg.io/v1
kind: ObjectStore
metadata:
name: azure-store
annotations:
barmancloud.cnpg.io/useDefaultAzureCredential: "true"
spec:
configuration:
destinationPath: "<destination path here>"
azureCredentials:
inheritFromAzureAD: true
[...]
```
### Access Key, SAS Token, or Connection String
Store credentials in a Kubernetes secret: