Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions apis/kubedb/constants.go
Original file line number Diff line number Diff line change
Expand Up @@ -998,6 +998,7 @@ const (
SolrInitContainerName = "init-solr"
SolrAdmin = "admin"
SecurityJSON = "security.json"
GcsCredJSON = "cred.json"
SolrZkDigest = "zk-digest"
SolrZkReadonlyDigest = "zk-digest-readonly"

Expand All @@ -1006,6 +1007,7 @@ const (
SolrVolumeAuthConfig = "auth-config"
SolrVolumeData = "data"
SolrVolumeConfig = "slconfig"
SolrVolumeGcsCred = "gcs-cred"

DistLibs = "/opt/solr/dist"
ContribLibs = "/opt/solr/contrib/%s/lib"
Expand Down Expand Up @@ -1064,6 +1066,7 @@ const (
SolrServerKeystorePath = "/var/solr/etc/keystore.p12"
SolrServerTruststorePath = "/var/solr/etc/truststore.p12"
SolrTLSMountPath = "/var/solr/etc"
SolrGcsCredMountPath = "/var/solr/backup"

ProxyDeploymentName = "s3proxy"
ProxyServiceName = "proxy-svc"
Expand Down
12 changes: 12 additions & 0 deletions apis/kubedb/v1alpha2/openapi_generated.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

14 changes: 10 additions & 4 deletions apis/kubedb/v1alpha2/solr_helpers.go
Original file line number Diff line number Diff line change
Expand Up @@ -109,17 +109,23 @@ func (s *Solr) SolrSecretKey() string {
return kubedb.SolrSecretKey
}

func (s *Solr) Merge(opt map[string]string) map[string]string {
if len(s.Spec.SolrOpts) == 0 {
return opt
}
func (s *Solr) Merge(opt map[string]string, secret *v1.Secret) map[string]string {
for _, y := range s.Spec.SolrOpts {
sr := strings.Split(y, "=")
_, ok := opt[sr[0]]
if !ok || sr[0] != "-Dsolr.node.roles" {
opt[sr[0]] = sr[1]
}
}
if secret != nil {
if val, exist := secret.Data["AWS_ACCESS_KEY_ID"]; exist {
opt["-Daws.accessKeyId"] = string(val)
}

if val, exist := secret.Data["AWS_SECRET_ACCESS_KEY"]; exist {
opt["-Daws.secretAccessKey"] = string(val)
}
}
return opt
}

Expand Down
8 changes: 8 additions & 0 deletions apis/kubedb/v1alpha2/solr_types.go
Original file line number Diff line number Diff line change
Expand Up @@ -137,6 +137,14 @@ type SolrSpec struct {
// Monitor is used monitor database instance
// +optional
Monitor *mona.AgentSpec `json:"monitor,omitempty"`

// GCS cred for solr backup
// +optional
GcsCredSecret *core.LocalObjectReference `json:"gcsCredSecret,omitempty"`

// S3 cred for solr backup
// +optional
S3CredSecret *core.LocalObjectReference `json:"s3CredSecret,omitempty"`
}

type SolrClusterTopology struct {
Expand Down
10 changes: 10 additions & 0 deletions apis/kubedb/v1alpha2/zz_generated.deepcopy.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

14 changes: 14 additions & 0 deletions crds/gitops.kubedb.com_solrs.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -76,6 +76,13 @@ spec:
type: boolean
enableSSL:
type: boolean
gcsCredSecret:
properties:
name:
default: ""
type: string
type: object
x-kubernetes-map-type: atomic
healthChecker:
default:
failureThreshold: 3
Expand Down Expand Up @@ -3401,6 +3408,13 @@ spec:
replicas:
format: int32
type: integer
s3CredSecret:
properties:
name:
default: ""
type: string
type: object
x-kubernetes-map-type: atomic
serviceTemplates:
items:
properties:
Expand Down
14 changes: 14 additions & 0 deletions crds/kubedb.com_solrs.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -101,6 +101,13 @@ spec:
type: boolean
enableSSL:
type: boolean
gcsCredSecret:
properties:
name:
default: ""
type: string
type: object
x-kubernetes-map-type: atomic
healthChecker:
default:
failureThreshold: 3
Expand Down Expand Up @@ -3426,6 +3433,13 @@ spec:
replicas:
format: int32
type: integer
s3CredSecret:
properties:
name:
default: ""
type: string
type: object
x-kubernetes-map-type: atomic
serviceTemplates:
items:
properties:
Expand Down