|
| 1 | +# Docker Environment |
| 2 | + |
| 3 | +This example demonstrates how to set up a local development environment using Quarkus Dev Services to test the Operator manually. |
| 4 | +As the K3s cluster port and the secrets change on every `./gradlew :operator:quarkusDev` run, you will have to manually update the port and secrets in the `~/.kube/config` every time. |
| 5 | + |
| 6 | +## 1. Configure Kubeconfig from Dev Services |
| 7 | + |
| 8 | +When running in dev mode (`make run` or via IntelliJ), Quarkus starts the pre-configured K3s and PostgreSQL Dev Services. |
| 9 | + |
| 10 | +1. Access the Quarkus Dev UI at [http://localhost:8080/q/dev-ui/dev-services](http://localhost:8080/q/dev-ui/dev-services). |
| 11 | +2. Locate the properties for the `kubernetes-client` Dev Service. |
| 12 | +3. Convert these properties into a **Kubeconfig YAML** format, see the example below. |
| 13 | +4. Merge this configuration into your local `~/.kube/config`. This allows your local environment to communicate with the ephemeral Kubernetes cluster provided by Dev Services. |
| 14 | + |
| 15 | +```yml |
| 16 | +apiVersion: v1 |
| 17 | +kind: Config |
| 18 | +current-context: quarkus-cluster |
| 19 | +clusters: |
| 20 | + - cluster: |
| 21 | + certificate-authority-data: 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 |
| 22 | + server: https://localhost:53658 |
| 23 | + name: quarkus-cluster |
| 24 | +# ... more clusters |
| 25 | +contexts: |
| 26 | + - context: |
| 27 | + cluster: quarkus-cluster |
| 28 | + namespace: default |
| 29 | + user: quarkus-user |
| 30 | + name: quarkus-context |
| 31 | +# ... more contexts |
| 32 | +users: |
| 33 | + - name: quarkus-user |
| 34 | + user: |
| 35 | + client-certificate-data: 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 |
| 36 | + client-key-data: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSUFuN1dTOWJGZUhlaUpKMmJHcHFFTjBJc28vQzR3VEVNRFBSdENRNzNYMmhvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFZStybENWUmc4UVZhaHFvVFl3U3Ztb0x3M1FUVmpZVFlBdnY1b2kyUlhkcDhZVWpiU1FEegoyN0VuNnhsb0lXeWRHeHRybCtTZE1jNkZ1YnhkMk5IRU9nPT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo= |
| 37 | +# ... more users |
| 38 | +``` |
| 39 | + |
| 40 | +## 2. Create PostgreSQL Connection and Secret |
| 41 | + |
| 42 | +For the `postgresql` Dev Service, you can generate the necessary Custom Resources to test the Operator: |
| 43 | + |
| 44 | +1. From the Dev UI, get the `postgresql` Dev Service properties (username, password, host, port). |
| 45 | +2. Convert the `postgresql` Dev Service properties to a **Basic Auth Secret** and a **ClusterConnection** CR instance. |
| 46 | + For more details see the [ClusterConnection](cluster-connection.md) CRD definition. |
| 47 | +3. Apply the generated files using IntelliJ or `kubectl`. |
| 48 | +  |
| 49 | + |
| 50 | +**Example Secret (`secret.yml`):** |
| 51 | + |
| 52 | +```yaml |
| 53 | +apiVersion: v1 |
| 54 | +kind: Secret |
| 55 | +metadata: |
| 56 | + name: quarkus-db-secret |
| 57 | + labels: |
| 58 | + app.kubernetes.io/name: quarkus-postgres |
| 59 | +type: kubernetes.io/basic-auth |
| 60 | +stringData: |
| 61 | + # extracted from quarkus.datasource.username |
| 62 | + username: root |
| 63 | + # extracted from quarkus.datasource.password |
| 64 | + password: password |
| 65 | +``` |
| 66 | +
|
| 67 | +**Example ClusterConnection (`cluster-connection.yml`):** |
| 68 | + |
| 69 | +```yaml |
| 70 | +apiVersion: postgresql.aboutbits.it/v1 |
| 71 | +kind: ClusterConnection |
| 72 | +metadata: |
| 73 | + name: quarkus-postgres-connection |
| 74 | +spec: |
| 75 | + adminSecretRef: |
| 76 | + name: quarkus-db-secret |
| 77 | + host: localhost |
| 78 | + port: 5432 |
| 79 | + database: postgres |
| 80 | +``` |
| 81 | + |
| 82 | + |
| 83 | + |
| 84 | +## 3. Create a Role |
| 85 | + |
| 86 | +Similarly, you can create a `Role` resource: |
| 87 | + |
| 88 | +1. Manually create a **Role** CR instance. |
| 89 | + For more details see the [Role](role.md) CRD definition. |
| 90 | +2. Apply the file using IntelliJ or `kubectl`. |
| 91 | + |
| 92 | +**Example Role (`role.yml`):** |
| 93 | + |
| 94 | +```yaml |
| 95 | +apiVersion: postgresql.aboutbits.it/v1 |
| 96 | +kind: Role |
| 97 | +metadata: |
| 98 | + name: test-role-from-crd |
| 99 | +spec: |
| 100 | + # The actual name of the role to be created in the PostgreSQL database |
| 101 | + name: test-role-from-crd |
| 102 | + comment: It simply works |
| 103 | + # Connects this role definition to the specific Postgres ClusterConnection CR instance |
| 104 | + clusterRef: |
| 105 | + name: quarkus-postgres-connection |
| 106 | + flags: |
| 107 | + createdb: true |
| 108 | + validUntil: "2026-12-31T23:59:59Z" |
| 109 | +``` |
| 110 | + |
| 111 | + |
| 112 | + |
| 113 | + |
| 114 | +The same principle applies to other CRDs. |
0 commit comments