@@ -3,10 +3,11 @@ package netserv
3
3
import (
4
4
// kafkas "kafka.strimzi.io/kafka/v1beta2"
5
5
kafkausers " kafka.strimzi.io/kafkauser/v1beta2 "
6
- externalsecrets " external-secrets.io/externalsecret/v1beta1 "
7
- issuers " cert-manager.io/issuer/v1 "
8
- corev1 " k8s.io/api/core/v1 "
9
- rbacv1 " k8s.io/api/rbac/v1 "
6
+ kafkanodepools " kafka.strimzi.io/kafkanodepool/v1beta2 "
7
+ // externalsecrets "external-secrets.io/externalsecret/v1beta1"
8
+ // issuers "cert-manager.io/issuer/v1"
9
+ // corev1 "k8s.io/api/core/v1"
10
+ // rbacv1 "k8s.io/api/rbac/v1"
10
11
)
11
12
12
13
appName : " gerrit "
@@ -32,14 +33,27 @@ _affinity: {
32
33
33
34
kustomizations : $default : manifest : {
34
35
ns : #AppNamespace
35
- // "events-broker": kafkas.#Kafka & {
36
+ " events-broker-node-pool " : kafkanodepools .#KafkaNodePool & {
37
+ metadata : labels : " strimzi.io/cluster " : broker .metadata .name
38
+ spec : {
39
+ replicas : 3
40
+ roles : [" controller " , " broker " ]
41
+ storage : {
42
+ type : " persistent-claim "
43
+ class : " local-hostpath "
44
+ size : " 20Gi "
45
+ }
46
+ }
47
+ }
48
+ // broker="events-broker": kafkas.#Kafka & {
36
49
broker =" events-broker " : {
37
50
apiVersion : " kafka.strimzi.io/v1beta2 "
38
51
kind : " Kafka "
52
+ metadata : annotation : " strimzi.io/kraft " : " enabled "
53
+ metadata : annotation : " strimzi.io/node-pools " : " enabled "
39
54
spec : {
40
55
entityOperator : {
41
56
userOperator : {}
42
- topicOperator : {}
43
57
}
44
58
kafka : {
45
59
replicas : 3
@@ -64,6 +78,7 @@ kustomizations: $default: manifest: {
64
78
authentication : type : " tls "
65
79
configuration : useServiceDnsDomain : true
66
80
}]
81
+ // Ignored because of kraft mode
67
82
storage : {
68
83
type : " persistent-claim "
69
84
class : " local-hostpath "
@@ -76,23 +91,14 @@ kustomizations: $default: manifest: {
76
91
}
77
92
}
78
93
}
94
+ // Ignored because of kraft mode
79
95
zookeeper : {
80
96
replicas : 3
81
- logging : {
82
- type : " inline "
83
- // loggers: "zookeeper.root.logger": "INFO"
84
- }
85
97
storage : {
86
98
type : " persistent-claim "
87
99
class : " local-hostpath "
88
100
size : " 10Gi "
89
101
}
90
- template : {
91
- pod : {
92
- metadata : labels : app : " gerrit-zookeeper "
93
- affinity : _affinity & {#label : metadata .labels .app }
94
- }
95
- }
96
102
}
97
103
}
98
104
}
@@ -101,77 +107,7 @@ kustomizations: $default: manifest: {
101
107
spec : authentication : type : " tls "
102
108
}
103
109
104
- storeServiceAccount : corev1 .#ServiceAccount & {
105
- metadata : name : " bucket-secrets-store "
106
- }
107
- // TODO restrict to specific secrets
108
- storeRole : rbacv1 .#Role & {
109
- metadata : name : " gerrit-secrets-store "
110
- rules : [{
111
- apiGroups : [" " ]
112
- resources : [" secrets " ]
113
- verbs : [" get " , " watch " , " list " ]
114
- }]
115
- }
116
- storeRoleBinding : rbacv1 .#RoleBinding & {
117
- metadata : name : " gerrit-secrets-store "
118
- subjects : [{
119
- kind : storeServiceAccount .kind
120
- name : storeServiceAccount .metadata .name
121
- apiGroup : " "
122
- }]
123
- roleRef : {
124
- kind : storeRole .kind
125
- name : storeRole .metadata .name
126
- apiGroup : " rbac.authorization.k8s.io "
127
- }
128
- }
129
- store =" gerrit-secrets-store " : {
130
- // CUE MaxFields is broken so the ES CRD doesn't validate right now
131
- apiVersion : " external-secrets.io/v1beta1 "
132
- kind : " SecretStore "
133
- spec : provider : kubernetes : {
134
- remoteNamespace : store .metadata .namespace
135
- server : caProvider : {
136
- type : " ConfigMap "
137
- name : " kube-root-ca.crt "
138
- key : " ca.crt "
139
- }
140
- auth : serviceAccount : name : storeServiceAccount .metadata .name
141
- }
142
- }
143
- caSecret : externalsecrets .#ExternalSecret & {
144
- metadata : name : " \(broker .metadata .name )-cluster-ca-synced "
145
- spec : {
146
- secretStoreRef : {
147
- name : store .metadata .name
148
- kind : store .kind
149
- }
150
- refreshInterval : " 1h "
151
- target : {
152
- name : metadata .name
153
- deletionPolicy : " Delete "
154
- creationPolicy : " Owner "
155
- }
156
- data : [
157
- {
158
- secretKey : " tls.key "
159
- remoteRef : {
160
- key : " \(broker .metadata .name )-cluster-ca "
161
- property : " ca.key "
162
- }
163
- },
164
- {
165
- secretKey : " tls.crt "
166
- remoteRef : {
167
- key : " \(broker .metadata .name )-cluster-ca-cert "
168
- property : " ca.crt "
169
- }
170
- },
171
- ]
172
- }
173
- }
174
- " cluster-ca " : issuers .#Issuer & {
175
- spec : ca : secretName : caSecret .metadata .name
176
- }
110
+ // "cluster-ca": issuers.#Issuer & {
111
+ // spec: ca: secretName: caSecret.metadata.name
112
+ // }
177
113
}
0 commit comments