2022-11-04 19:43:29 +00:00
|
|
|
apiVersion: v1
|
|
|
|
kind: ConfigMap
|
|
|
|
metadata:
|
|
|
|
name: {{ printf "%s-scripts" (include "common.names.fullname" .) }}
|
|
|
|
namespace: {{ .Release.Namespace | quote }}
|
|
|
|
labels: {{- include "common.labels.standard" . | nindent 4 }}
|
|
|
|
{{- if .Values.commonLabels }}
|
|
|
|
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
|
|
|
|
{{- end }}
|
|
|
|
{{- if .Values.commonAnnotations }}
|
|
|
|
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
|
|
|
|
{{- end }}
|
|
|
|
data:
|
|
|
|
{{- $fullname := include "common.names.fullname" . }}
|
|
|
|
{{- $releaseNamespace := .Release.Namespace }}
|
|
|
|
{{- $clusterDomain := .Values.clusterDomain }}
|
|
|
|
{{- $interBrokerPort := .Values.service.ports.internal }}
|
|
|
|
{{- $clientPort := .Values.service.ports.client }}
|
|
|
|
{{- $jksTruststoreSecret := .Values.auth.tls.jksTruststoreSecret -}}
|
|
|
|
{{- $jksTruststore := .Values.auth.tls.jksTruststore -}}
|
|
|
|
{{- $jksKeystoreSAN := .Values.auth.tls.jksKeystoreSAN -}}
|
|
|
|
{{- if .Values.externalAccess.autoDiscovery.enabled }}
|
|
|
|
auto-discovery.sh: |-
|
|
|
|
#!/bin/bash
|
|
|
|
|
|
|
|
SVC_NAME="${MY_POD_NAME}-external"
|
|
|
|
|
|
|
|
{{- if eq .Values.externalAccess.service.type "LoadBalancer" }}
|
|
|
|
# Auxiliary functions
|
|
|
|
retry_while() {
|
|
|
|
local -r cmd="${1:?cmd is missing}"
|
|
|
|
local -r retries="${2:-12}"
|
|
|
|
local -r sleep_time="${3:-5}"
|
|
|
|
local return_value=1
|
|
|
|
|
|
|
|
read -r -a command <<< "$cmd"
|
|
|
|
for ((i = 1 ; i <= retries ; i+=1 )); do
|
|
|
|
"${command[@]}" && return_value=0 && break
|
|
|
|
sleep "$sleep_time"
|
|
|
|
done
|
|
|
|
return $return_value
|
|
|
|
}
|
|
|
|
k8s_svc_lb_ip() {
|
|
|
|
local namespace=${1:?namespace is missing}
|
|
|
|
local service=${2:?service is missing}
|
|
|
|
local service_ip=$(kubectl get svc "$service" -n "$namespace" -o jsonpath="{.status.loadBalancer.ingress[0].ip}")
|
|
|
|
local service_hostname=$(kubectl get svc "$service" -n "$namespace" -o jsonpath="{.status.loadBalancer.ingress[0].hostname}")
|
|
|
|
|
|
|
|
if [[ -n ${service_ip} ]]; then
|
|
|
|
echo "${service_ip}"
|
|
|
|
else
|
|
|
|
echo "${service_hostname}"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
k8s_svc_lb_ip_ready() {
|
|
|
|
local namespace=${1:?namespace is missing}
|
|
|
|
local service=${2:?service is missing}
|
|
|
|
[[ -n "$(k8s_svc_lb_ip "$namespace" "$service")" ]]
|
|
|
|
}
|
|
|
|
# Wait until LoadBalancer IP is ready
|
|
|
|
retry_while "k8s_svc_lb_ip_ready {{ $releaseNamespace }} $SVC_NAME" || exit 1
|
|
|
|
# Obtain LoadBalancer external IP
|
|
|
|
k8s_svc_lb_ip "{{ $releaseNamespace }}" "$SVC_NAME" | tee "$SHARED_FILE"
|
|
|
|
{{- else if eq .Values.externalAccess.service.type "NodePort" }}
|
|
|
|
k8s_svc_node_port() {
|
|
|
|
local namespace=${1:?namespace is missing}
|
|
|
|
local service=${2:?service is missing}
|
|
|
|
local index=${3:-0}
|
|
|
|
local node_port="$(kubectl get svc "$service" -n "$namespace" -o jsonpath="{.spec.ports[$index].nodePort}")"
|
|
|
|
echo "$node_port"
|
|
|
|
}
|
|
|
|
k8s_svc_node_port "{{ $releaseNamespace }}" "$SVC_NAME" | tee "$SHARED_FILE"
|
|
|
|
{{- end }}
|
|
|
|
{{- end }}
|
|
|
|
setup.sh: |-
|
|
|
|
#!/bin/bash
|
|
|
|
|
|
|
|
ID="${MY_POD_NAME#"{{ $fullname }}-"}"
|
2023-03-10 23:07:57 +00:00
|
|
|
# If process.roles is not set at all, it is assumed to be in ZooKeeper mode.
|
|
|
|
# https://kafka.apache.org/documentation/#kraft_role
|
|
|
|
|
2022-11-04 19:43:29 +00:00
|
|
|
if [[ -f "{{ .Values.logsDirs | splitList "," | first }}/meta.properties" ]]; then
|
2023-03-10 23:07:57 +00:00
|
|
|
if [[ $KAFKA_CFG_PROCESS_ROLES == "" ]]; then
|
|
|
|
export KAFKA_CFG_BROKER_ID="$(grep "broker.id" "{{ .Values.logsDirs | splitList "," | first }}/meta.properties" | awk -F '=' '{print $2}')"
|
|
|
|
else
|
2023-04-24 15:37:57 +00:00
|
|
|
export KAFKA_CFG_NODE_ID="$(grep "node.id" "{{ .Values.logsDirs | splitList "," | first }}/meta.properties" | awk -F '=' '{print $2}')"
|
2023-03-10 23:07:57 +00:00
|
|
|
fi
|
2022-11-04 19:43:29 +00:00
|
|
|
else
|
2023-04-24 15:37:57 +00:00
|
|
|
if [[ $KAFKA_CFG_PROCESS_ROLES == "" ]]; then
|
|
|
|
export KAFKA_CFG_BROKER_ID="$((ID + {{ .Values.minId }}))"
|
|
|
|
else
|
|
|
|
export KAFKA_CFG_NODE_ID="$((ID + {{ .Values.minId }}))"
|
|
|
|
fi
|
2022-11-04 19:43:29 +00:00
|
|
|
fi
|
|
|
|
|
2023-03-10 23:07:57 +00:00
|
|
|
if [[ $KAFKA_CFG_PROCESS_ROLES == *"controller"* ]]; then
|
2023-04-24 15:37:57 +00:00
|
|
|
node_id={{ .Values.minId }}
|
2023-03-10 23:07:57 +00:00
|
|
|
pod_id=0
|
|
|
|
while :
|
|
|
|
do
|
|
|
|
VOTERS="${VOTERS}$node_id@{{ include "common.names.fullname" . }}-$pod_id.{{ include "common.names.fullname" . }}-headless.{{ $releaseNamespace }}.svc.{{ $clusterDomain }}:{{ .Values.containerPorts.controller }}"
|
|
|
|
node_id=$(( $node_id + 1 ))
|
|
|
|
pod_id=$(( $pod_id + 1 ))
|
|
|
|
if [[ $pod_id -ge {{ .Values.replicaCount }} ]]; then
|
|
|
|
break
|
|
|
|
else
|
|
|
|
VOTERS="$VOTERS,"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
export KAFKA_CFG_CONTROLLER_QUORUM_VOTERS=$VOTERS
|
|
|
|
fi
|
2022-11-04 19:43:29 +00:00
|
|
|
{{- if eq .Values.brokerRackAssignment "aws-az" }}
|
|
|
|
export KAFKA_CFG_BROKER_RACK=$(curl "http://169.254.169.254/latest/meta-data/placement/availability-zone-id")
|
|
|
|
{{- end }}
|
|
|
|
|
|
|
|
{{- if .Values.externalAccess.enabled }}
|
|
|
|
# Configure external ip and port
|
|
|
|
{{- if eq .Values.externalAccess.service.type "LoadBalancer" }}
|
|
|
|
{{- if .Values.externalAccess.autoDiscovery.enabled }}
|
|
|
|
export EXTERNAL_ACCESS_HOST="$(<${SHARED_FILE})"
|
|
|
|
{{- else }}
|
|
|
|
export EXTERNAL_ACCESS_HOST=$(echo '{{ .Values.externalAccess.service.loadBalancerNames | default .Values.externalAccess.service.loadBalancerIPs }}' | tr -d '[]' | cut -d ' ' -f "$(($ID + 1))")
|
|
|
|
{{- end }}
|
|
|
|
export EXTERNAL_ACCESS_PORT={{ .Values.externalAccess.service.ports.external }}
|
|
|
|
{{- else if eq .Values.externalAccess.service.type "NodePort" }}
|
|
|
|
{{- if and .Values.externalAccess.service.usePodIPs .Values.externalAccess.autoDiscovery.enabled }}
|
|
|
|
export EXTERNAL_ACCESS_HOST="${MY_POD_IP}"
|
|
|
|
{{- else if or .Values.externalAccess.service.useHostIPs .Values.externalAccess.autoDiscovery.enabled }}
|
|
|
|
export EXTERNAL_ACCESS_HOST="${HOST_IP}"
|
2023-03-14 21:10:14 +00:00
|
|
|
{{- else if and .Values.externalAccess.service.externalIPs (not .Values.externalAccess.autoDiscovery.enabled) }}
|
|
|
|
export EXTERNAL_ACCESS_HOST=$(echo '{{ .Values.externalAccess.service.externalIPs }}' | tr -d '[]' | cut -d ' ' -f "$(($ID + 1))")
|
2022-11-04 19:43:29 +00:00
|
|
|
{{- else if .Values.externalAccess.service.domain }}
|
|
|
|
export EXTERNAL_ACCESS_HOST={{ .Values.externalAccess.service.domain }}
|
|
|
|
{{- else }}
|
|
|
|
export EXTERNAL_ACCESS_HOST=$(curl -s https://ipinfo.io/ip)
|
|
|
|
{{- end }}
|
|
|
|
{{- if .Values.externalAccess.autoDiscovery.enabled }}
|
|
|
|
export EXTERNAL_ACCESS_PORT="$(<${SHARED_FILE})"
|
2023-03-14 21:10:14 +00:00
|
|
|
{{- else if and .Values.externalAccess.service.externalIPs (empty .Values.externalAccess.service.nodePorts)}}
|
|
|
|
export EXTERNAL_ACCESS_PORT="{{ .Values.externalAccess.service.ports.external }}"
|
2022-11-04 19:43:29 +00:00
|
|
|
{{- else }}
|
|
|
|
export EXTERNAL_ACCESS_PORT=$(echo '{{ .Values.externalAccess.service.nodePorts }}' | tr -d '[]' | cut -d ' ' -f "$(($ID + 1))")
|
|
|
|
{{- end }}
|
|
|
|
{{- else }}
|
|
|
|
export EXTERNAL_ACCESS_HOST={{ .Values.externalAccess.service.domain }}
|
|
|
|
export EXTERNAL_ACCESS_PORT="$((ID + {{ .Values.externalAccess.service.ports.external }}))"
|
|
|
|
{{- end }}
|
|
|
|
|
|
|
|
# Configure Kafka advertised listeners
|
|
|
|
{{- if .Values.advertisedListeners }}
|
|
|
|
export KAFKA_CFG_ADVERTISED_LISTENERS={{ join "," .Values.advertisedListeners }}
|
|
|
|
{{- else }}
|
|
|
|
export KAFKA_CFG_ADVERTISED_LISTENERS="INTERNAL://${MY_POD_NAME}.{{ $fullname }}-headless.{{ $releaseNamespace }}.svc.{{ $clusterDomain }}:{{ $interBrokerPort }},CLIENT://${MY_POD_NAME}.{{ $fullname }}-headless.{{ $releaseNamespace }}.svc.{{ $clusterDomain }}:{{ $clientPort }},EXTERNAL://${EXTERNAL_ACCESS_HOST}:${EXTERNAL_ACCESS_PORT}"
|
|
|
|
{{- end }}
|
|
|
|
{{- end }}
|
|
|
|
|
|
|
|
{{- if (include "kafka.tlsEncryption" .) }}
|
|
|
|
mkdir -p /opt/bitnami/kafka/config/certs
|
|
|
|
{{- if eq .Values.auth.tls.type "jks" }}
|
|
|
|
{{- if not (empty .Values.auth.tls.existingSecrets) }}
|
|
|
|
JKS_TRUSTSTORE={{ printf "/%s/%s" (ternary "certs-${ID}" "truststore" (empty $jksTruststoreSecret)) (default "kafka.truststore.jks" $jksTruststore) | quote }}
|
|
|
|
JKS_KEYSTORE={{ printf "/certs-${ID}/%s" (default "kafka.keystore.jks" $jksKeystoreSAN) | quote }}
|
|
|
|
{{- else }}
|
|
|
|
JKS_TRUSTSTORE={{ printf "/%s/%s" (ternary "certs" "truststore" (empty $jksTruststoreSecret)) (default "kafka.truststore.jks" $jksTruststore) | quote }}
|
|
|
|
JKS_KEYSTORE={{ printf "/certs/%s" (default "kafka-${ID}.keystore.jks" $jksKeystoreSAN) | quote }}
|
|
|
|
{{- end }}
|
|
|
|
if [[ -f "$JKS_TRUSTSTORE" ]] && [[ -f "$JKS_KEYSTORE" ]]; then
|
|
|
|
cp "$JKS_TRUSTSTORE" "/opt/bitnami/kafka/config/certs/kafka.truststore.jks"
|
|
|
|
cp "$JKS_KEYSTORE" "/opt/bitnami/kafka/config/certs/kafka.keystore.jks"
|
|
|
|
else
|
|
|
|
echo "Couldn't find the expected Java Key Stores (JKS) files! They are mandatory when encryption via TLS is enabled."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
export KAFKA_TLS_TRUSTSTORE_FILE="/opt/bitnami/kafka/config/certs/kafka.truststore.jks"
|
|
|
|
|
|
|
|
{{- else if eq .Values.auth.tls.type "pem" }}
|
|
|
|
|
|
|
|
{{- if or (not (empty .Values.auth.tls.existingSecrets)) .Values.auth.tls.autoGenerated }}
|
|
|
|
PEM_CA="/certs-${ID}/ca.crt"
|
|
|
|
PEM_CERT="/certs-${ID}/tls.crt"
|
|
|
|
PEM_KEY="/certs-${ID}/tls.key"
|
|
|
|
{{- else }}
|
|
|
|
PEM_CA="/certs/kafka.truststore.pem"
|
|
|
|
PEM_CERT="/certs/kafka-${ID}.keystore.pem"
|
|
|
|
PEM_KEY="/certs/kafka-${ID}.keystore.key"
|
|
|
|
{{- end }}
|
|
|
|
if [[ -f "$PEM_CERT" ]] && [[ -f "$PEM_KEY" ]]; then
|
|
|
|
CERT_DIR="/opt/bitnami/kafka/config/certs"
|
|
|
|
PEM_CA_LOCATION="${CERT_DIR}/kafka.truststore.pem"
|
|
|
|
PEM_CERT_LOCATION="${CERT_DIR}/kafka.keystore.pem"
|
|
|
|
{{- if .Values.auth.tls.pemChainIncluded }}
|
|
|
|
cat $PEM_CERT | csplit - -s -z '/\-*END CERTIFICATE\-*/+1' '{*}' -f ${CERT_DIR}/xx
|
|
|
|
FIND_CA_RESULT=$(find ${CERT_DIR} -not -name 'xx00' -name 'xx*')
|
|
|
|
if [[ $(echo $FIND_CA_RESULT | wc -l) < 1 ]]; then
|
|
|
|
echo "auth.tls.pemChainIncluded was set, but PEM chain only contained 1 cert"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
echo $FIND_CA_RESULT | sort | xargs cat >> "$PEM_CA_LOCATION"
|
|
|
|
cat ${CERT_DIR}/xx00 > "$PEM_CERT_LOCATION"
|
|
|
|
{{- else }}
|
|
|
|
if [[ -f "$PEM_CA" ]]; then
|
|
|
|
cp "$PEM_CA" "$PEM_CA_LOCATION"
|
|
|
|
cp "$PEM_CERT" "$PEM_CERT_LOCATION"
|
|
|
|
else
|
|
|
|
echo "PEM_CA not provided, and auth.tls.pemChainIncluded was not true. One of these values must be set when using PEM type for TLS."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
{{- end }}
|
|
|
|
|
|
|
|
# Ensure the key used PEM format with PKCS#8
|
|
|
|
openssl pkcs8 -topk8 -nocrypt -in "$PEM_KEY" > "/opt/bitnami/kafka/config/certs/kafka.keystore.key"
|
|
|
|
else
|
|
|
|
echo "Couldn't find the expected PEM files! They are mandatory when encryption via TLS is enabled."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
export KAFKA_TLS_TRUSTSTORE_FILE="/opt/bitnami/kafka/config/certs/kafka.truststore.pem"
|
|
|
|
{{- end }}
|
|
|
|
{{- end }}
|
|
|
|
|
|
|
|
# Configure zookeeper client
|
|
|
|
{{- if and (not (empty .Values.auth.zookeeper.tls.existingSecret)) .Values.auth.zookeeper.tls.enabled }}
|
|
|
|
JKS_TRUSTSTORE={{ printf "/kafka-zookeeper-cert/%s" (.Values.auth.zookeeper.tls.existingSecretTruststoreKey) | quote }}
|
|
|
|
JKS_KEYSTORE={{ printf "/kafka-zookeeper-cert/%s" (.Values.auth.zookeeper.tls.existingSecretKeystoreKey) | quote }}
|
|
|
|
if [[ -f "$JKS_TRUSTSTORE" ]] && [[ -f "$JKS_KEYSTORE" ]]; then
|
|
|
|
CERT_DIR="/opt/bitnami/kafka/config/certs"
|
|
|
|
TRUSTSTORE_LOCATION="${CERT_DIR}/zookeeper.truststore.jks"
|
|
|
|
cp "$JKS_TRUSTSTORE" "$TRUSTSTORE_LOCATION"
|
|
|
|
cp "$JKS_KEYSTORE" "${CERT_DIR}/zookeeper.keystore.jks"
|
|
|
|
export KAFKA_ZOOKEEPER_TLS_TRUSTSTORE_FILE="${TRUSTSTORE_LOCATION}"
|
|
|
|
fi
|
|
|
|
{{- end }}
|
|
|
|
|
|
|
|
exec /entrypoint.sh /run.sh
|