mirror of
https://github.com/bitnami/charts.git
synced 2026-03-29 16:27:11 +08:00
* fix: Fix Schema Registry with SCRAM-SHA-512 and external MSK fails due to mandatory jksSecret Signed-off-by: Hansu Choi <comstering@gmail.com> * refactor: Bump the chart version Signed-off-by: Hansu Choi <comstering@gmail.com> * Update CHANGELOG.md Signed-off-by: Bitnami Bot <bitnami.bot@broadcom.com> * fix: Fix certificates volum condition Signed-off-by: Hansu Choi <comstering@gmail.com> --------- Signed-off-by: Hansu Choi <comstering@gmail.com> Signed-off-by: Bitnami Bot <bitnami.bot@broadcom.com> Co-authored-by: Bitnami Bot <bitnami.bot@broadcom.com>
168 lines
5.5 KiB
Smarty
168 lines
5.5 KiB
Smarty
{{/*
|
|
Copyright Broadcom, Inc. All Rights Reserved.
|
|
SPDX-License-Identifier: APACHE-2.0
|
|
*/}}
|
|
|
|
{{/* vim: set filetype=mustache: */}}
|
|
{{/*
|
|
Create a default fully qualified app name for Kafka subchart
|
|
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
|
|
*/}}
|
|
{{- define "schema-registry.kafka.fullname" -}}
|
|
{{- if .Values.kafka.fullnameOverride -}}
|
|
{{- .Values.kafka.fullnameOverride | trunc 63 | trimSuffix "-" -}}
|
|
{{- else -}}
|
|
{{- $name := default "kafka" .Values.kafka.nameOverride -}}
|
|
{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Create chart name and version as used by the chart label.
|
|
*/}}
|
|
{{- define "schema-registry.chart" -}}
|
|
{{- include "common.names.chart" . -}}
|
|
{{- end }}
|
|
|
|
{{/*
|
|
Return the proper Schema Registry image name
|
|
*/}}
|
|
{{- define "schema-registry.image" -}}
|
|
{{ include "common.images.image" (dict "imageRoot" .Values.image "global" .Values.global) }}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the proper Docker Image Registry Secret Names
|
|
*/}}
|
|
{{- define "schema-registry.imagePullSecrets" -}}
|
|
{{ include "common.images.renderPullSecrets" (dict "images" (list .Values.image) "context" $) }}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Create the name of the Service Account to use
|
|
*/}}
|
|
{{- define "schema-registry.serviceAccountName" -}}
|
|
{{- if .Values.serviceAccount.create }}
|
|
{{- default (include "common.names.fullname" .) .Values.serviceAccount.name }}
|
|
{{- else }}
|
|
{{- default "default" .Values.serviceAccount.name }}
|
|
{{- end }}
|
|
{{- end }}
|
|
|
|
{{/*
|
|
Return the Schema Registry Configuration configmap.
|
|
*/}}
|
|
{{- define "schema-registry.configmapName" -}}
|
|
{{- if .Values.existingConfigmap -}}
|
|
{{- printf "%s" (tpl .Values.existingConfigmap $) -}}
|
|
{{- else -}}
|
|
{{- printf "%s" (include "common.names.fullname" .) -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return true if a configmap object should be created for Schema Registry Configuration
|
|
*/}}
|
|
{{- define "schema-registry.createConfigMap" -}}
|
|
{{- if and .Values.configuration (not .Values.existingConfigmap) }}
|
|
{{- true -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the Log4J Configuration configmap.
|
|
*/}}
|
|
{{- define "schema-registry.log4j.configmapName" -}}
|
|
{{- if .Values.existingLog4jConfigMap -}}
|
|
{{- printf "%s" (tpl .Values.existingLog4jConfigMap $) -}}
|
|
{{- else -}}
|
|
{{- printf "%s-log4j" (include "common.names.fullname" .) -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return true if a configmap object should be created for Log4J Configuration
|
|
*/}}
|
|
{{- define "schema-registry.log4j.createConfigMap" -}}
|
|
{{- if and .Values.log4j (not .Values.existingLog4jConfigMap) }}
|
|
{{- true -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the type of listener
|
|
Usage:
|
|
{{ include "schema-registry.listenerType" ( dict "protocol" .Values.path.to.the.Value ) }}
|
|
*/}}
|
|
{{- define "schema-registry.listenerType" -}}
|
|
{{- if eq .protocol "plaintext" -}}
|
|
PLAINTEXT
|
|
{{- else if or (eq .protocol "tls") (eq .protocol "mtls") -}}
|
|
SSL
|
|
{{- else if eq .protocol "sasl_tls" -}}
|
|
SASL_SSL
|
|
{{- else if eq .protocol "sasl" -}}
|
|
SASL_PLAINTEXT
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return kafka port
|
|
*/}}
|
|
{{- define "schema-registry.kafka.port" -}}
|
|
{{- if .Values.kafka.enabled -}}
|
|
{{- int .Values.kafka.service.ports.client -}}
|
|
{{- else -}}
|
|
{{- regexFind ":[0-9]+" (join "," .Values.externalKafka.brokers) | trimPrefix ":" | default "9092" | int -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Compile all warnings into a single message, and call fail.
|
|
*/}}
|
|
{{- define "schema-registry.validateValues" -}}
|
|
{{- $messages := list -}}
|
|
{{- $messages := append $messages (include "schema-registry.validateValues.authentication.sasl" .) -}}
|
|
{{- $messages := without $messages "" -}}
|
|
{{- $message := join "\n" $messages -}}
|
|
|
|
{{- if $message -}}
|
|
{{- printf "\nVALUES VALIDATION:\n%s" $message | fail -}}
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/* Validate values of Schema Registry - SASL authentication */}}
|
|
{{- define "schema-registry.validateValues.authentication.sasl" -}}
|
|
{{- $kafkaProtocol := upper (ternary .Values.kafka.listeners.client.protocol .Values.externalKafka.listener.protocol .Values.kafka.enabled) -}}
|
|
{{- if .Values.kafka.enabled }}
|
|
{{- if and (contains "SASL" $kafkaProtocol) (or (not .Values.kafka.sasl.client.users) (not .Values.kafka.sasl.client.passwords)) }}
|
|
schema-registry: kafka.sasl.client.users kafka.sasl.client.passwords
|
|
It's mandatory to set the SASL credentials when enabling SASL authentication with Kafka brokers.
|
|
You can specify these credentials setting the parameters below:
|
|
- kafka.sasl.client.users
|
|
- kafka.sasl.client.passwords
|
|
{{- end }}
|
|
{{- else if and (contains "SASL" $kafkaProtocol) (or (not .Values.externalKafka.sasl.user) (not (or (.Values.externalKafka.sasl.password) (.Values.externalKafka.sasl.existingSecret) ) ) ) }}
|
|
schema-registry: externalKafka.sasl.user externalKafka.sasl.password
|
|
It's mandatory to set the SASL credentials when enabling SASL authentication with Kafka brokers.
|
|
You can specify these credentials setting the parameters below:
|
|
- externalKafka.sasl.user
|
|
- externalKafka.sasl.password
|
|
- externalKafka.sasl.existingSecret (takes precedence over password)
|
|
{{- end -}}
|
|
{{- end -}}
|
|
|
|
{{/*
|
|
Return the external Kafka JAAS credentials secret name
|
|
*/}}
|
|
{{- define "schema-registry.secretName" -}}
|
|
{{- $secretName := .Values.externalKafka.sasl.existingSecret -}}
|
|
{{- if .Values.kafka.enabled }}
|
|
{{- printf "%s-user-passwords" (include "schema-registry.kafka.fullname" .) -}}
|
|
{{- else if $secretName -}}
|
|
{{- printf "%s" (tpl $secretName $) -}}
|
|
{{- else -}}
|
|
{{- printf "%s-external-kafka" (include "common.names.fullname" .) -}}
|
|
{{- end -}}
|
|
{{- end -}}
|