Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -129,6 +129,24 @@ webhooks:
failurePolicy: {{ .Values.apiserver.webhook.failurePolicy }}
sideEffects: None
{{- end }}
{{- if $featureGates.Ignite }}
- name: igniteautoscalerwebhook.mutators.autoscaling.kubedb.com
clientConfig:
service:
namespace: {{ .Release.Namespace }}
name: {{ include "kubedb-webhook-server.fullname" . }}
path: /mutate-autoscaling-kubedb-com-v1alpha1-igniteautoscaler
port: 443
{{- include "kubedb-webhook-server.webhook-ca-bundle" $ | nindent 4 }}
rules:
- apiGroups: ["autoscaling.kubedb.com"]
apiVersions: ["*"]
resources: ["igniteautoscalers"]
operations: ["CREATE", "UPDATE"]
admissionReviewVersions: ["v1beta1"]
failurePolicy: {{ .Values.apiserver.webhook.failurePolicy }}
sideEffects: None
{{- end }}
{{- if $featureGates.Kafka }}
- name: kafkaautoscalerwebhook.mutators.autoscaling.kubedb.com
clientConfig:
Expand Down Expand Up @@ -327,6 +345,24 @@ webhooks:
failurePolicy: {{ .Values.apiserver.webhook.failurePolicy }}
sideEffects: None
{{- end }}
{{- if $featureGates.Qdrant }}
- name: qdrantautoscalerwebhook.mutators.autoscaling.kubedb.com
clientConfig:
service:
namespace: {{ .Release.Namespace }}
name: {{ include "kubedb-webhook-server.fullname" . }}
path: /mutate-autoscaling-kubedb-com-v1alpha1-qdrantautoscaler
port: 443
{{- include "kubedb-webhook-server.webhook-ca-bundle" $ | nindent 4 }}
rules:
- apiGroups: ["autoscaling.kubedb.com"]
apiVersions: ["*"]
resources: ["qdrantautoscalers"]
operations: ["CREATE", "UPDATE"]
admissionReviewVersions: ["v1beta1"]
failurePolicy: {{ .Values.apiserver.webhook.failurePolicy }}
sideEffects: None
{{- end }}
{{- if $featureGates.RabbitMQ }}
- name: rabbitmqautoscalerwebhook.mutators.autoscaling.kubedb.com
clientConfig:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -129,6 +129,25 @@ webhooks:
failurePolicy: {{ .Values.apiserver.webhook.failurePolicy }}
sideEffects: None
{{- end }}

{{- if $featureGates.Ignite }}
- name: igniteautoscalerwebhook.validators.autoscaling.kubedb.com
clientConfig:
service:
namespace: {{ .Release.Namespace }}
name: {{ include "kubedb-webhook-server.fullname" . }}
path: /validate-autoscaling-kubedb-com-v1alpha1-igniteautoscaler
port: 443
{{- include "kubedb-webhook-server.webhook-ca-bundle" $ | nindent 4 }}
rules:
- apiGroups: ["autoscaling.kubedb.com"]
apiVersions: ["*"]
resources: ["igniteautoscalers"]
operations: ["CREATE", "UPDATE", "DELETE"]
admissionReviewVersions: ["v1beta1"]
failurePolicy: {{ .Values.apiserver.webhook.failurePolicy }}
sideEffects: None
{{- end }}
{{- if $featureGates.Kafka }}
- name: kafkaautoscalerwebhook.validators.autoscaling.kubedb.com
clientConfig:
Expand Down Expand Up @@ -327,6 +346,24 @@ webhooks:
failurePolicy: {{ .Values.apiserver.webhook.failurePolicy }}
sideEffects: None
{{- end }}
{{- if $featureGates.Qdrant }}
- name: qdrantautoscalerwebhook.validators.autoscaling.kubedb.com
clientConfig:
service:
namespace: {{ .Release.Namespace }}
name: {{ include "kubedb-webhook-server.fullname" . }}
path: /validate-autoscaling-kubedb-com-v1alpha1-qdrantautoscaler
port: 443
{{- include "kubedb-webhook-server.webhook-ca-bundle" $ | nindent 4 }}
rules:
- apiGroups: ["autoscaling.kubedb.com"]
apiVersions: ["*"]
resources: ["qdrantautoscalers"]
operations: ["CREATE", "UPDATE", "DELETE"]
admissionReviewVersions: ["v1beta1"]
failurePolicy: {{ .Values.apiserver.webhook.failurePolicy }}
sideEffects: None
{{- end }}
{{- if $featureGates.RabbitMQ }}
- name: rabbitmqautoscalerwebhook.validators.autoscaling.kubedb.com
clientConfig:
Expand Down
2 changes: 1 addition & 1 deletion go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ require (
kmodules.xyz/image-packer v0.0.0-20260417111715-79b725e3dbf6
kmodules.xyz/resource-metadata v0.43.0
kmodules.xyz/schema-checker v0.4.2
kubedb.dev/apimachinery v0.64.0
kubedb.dev/apimachinery v0.64.0-rc.0.0.20260417065604-9b9f8be7911a
kubeops.dev/installer v0.0.0-20260409180749-66bc29c4e4c9
sigs.k8s.io/yaml v1.6.0
stash.appscode.dev/installer v0.12.2-0.20260224175756-ac464b38bf6c
Expand Down
4 changes: 2 additions & 2 deletions go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -345,8 +345,8 @@ kmodules.xyz/resource-metadata v0.43.0 h1:MSUeMku47f1NhpTptkbWZbyGqp1oASTh/I2sBJ
kmodules.xyz/resource-metadata v0.43.0/go.mod h1:bqm4/ZqHxA04H1/Mz79YhHgrePSKJfUVL7cpG8teKsA=
kmodules.xyz/schema-checker v0.4.2 h1:tAbxEtM759GxDM/3sQi/+OKKwUsEF+Ih4KReV3Eb/Xw=
kmodules.xyz/schema-checker v0.4.2/go.mod h1:N7ETPwfY4LbTHbydC9jjssPmYKKgZ8DC0IuLCU55wwc=
kubedb.dev/apimachinery v0.64.0 h1:JWxE5ael0PK64QMozFTxL6qmIJDDK1CEvZcGZ0qpCyM=
kubedb.dev/apimachinery v0.64.0/go.mod h1:fUQDWDXkc9bwcHCkao//SfHBpSSFwbvM+UNQmcsxUDI=
kubedb.dev/apimachinery v0.64.0-rc.0.0.20260417065604-9b9f8be7911a h1:eiZP/o08UsrCRNUpxmztVnY4s/GYjuHs6skF2Y7pb6A=
kubedb.dev/apimachinery v0.64.0-rc.0.0.20260417065604-9b9f8be7911a/go.mod h1:6gtNaMwCx/E/N9EKwB/Zi96/+pNeGebzOadzW52zY8s=
kubeops.dev/installer v0.0.0-20260409180749-66bc29c4e4c9 h1:6zligiJXlXUMGaEgm5CF/TmVMnKORRXwQa8KnNMlVLQ=
kubeops.dev/installer v0.0.0-20260409180749-66bc29c4e4c9/go.mod h1:8X06Mr3+df3YsE1PMRSDBPaplOOS4js7tBBFK3Sx1Ug=
kubeops.dev/operator-shard-manager v0.0.5 h1:i7VnyUfIa9u3RQhSTVWNsooXcgmrWWxJyI9gJ10onE8=
Expand Down
14 changes: 4 additions & 10 deletions vendor/kubedb.dev/apimachinery/apis/kubedb/v1/mariadb_helpers.go
Original file line number Diff line number Diff line change
Expand Up @@ -368,7 +368,7 @@ func (m *MariaDB) SetDefaults(mdVersion *v1alpha1.MariaDBVersion) {

func (m *MariaDB) SetDefaultsMaxscale(mdVersion *v1alpha1.MariaDBVersion, maxscale *MaxScaleSpec) {
if maxscale == nil {
maxscale = &MaxScaleSpec{}
return
}
if maxscale.StorageType == "" {
maxscale.StorageType = StorageTypeDurable
Expand Down Expand Up @@ -569,21 +569,15 @@ func (m *MariaDB) SetTLSDefaults() {
m.Spec.TLS.Certificates = kmapi.SetMissingSecretNameForCertificate(m.Spec.TLS.Certificates, string(MariaDBExporterCert), m.CertificateName(MariaDBExporterCert))
}

func (m *MariaDB) GetPersistentSecrets() []string {
func (m *MariaDBSpec) GetPersistentSecrets() []string {
if m == nil {
return nil
}

var secrets []string
if m.Spec.AuthSecret != nil {
secrets = append(secrets, m.Spec.AuthSecret.Name)
}

if m.Spec.Monitor != nil && m.Spec.TLS != nil {
name := meta_util.NameWithSuffix(m.Name, kubedb.MySQLMetricsExporterConfigSecretSuffix)
secrets = append(secrets, name)
if m.AuthSecret != nil {
secrets = append(secrets, m.AuthSecret.Name)
}

return secrets
}

Expand Down
10 changes: 3 additions & 7 deletions vendor/kubedb.dev/apimachinery/apis/kubedb/v1/mysql_helpers.go
Original file line number Diff line number Diff line change
Expand Up @@ -412,18 +412,14 @@ func (m *MySQL) SetHealthCheckerDefaults() {
}
}

func (m *MySQL) GetPersistentSecrets() []string {
func (m *MySQLSpec) GetPersistentSecrets() []string {
if m == nil {
return nil
}

var secrets []string
if m.Spec.AuthSecret != nil {
secrets = append(secrets, m.Spec.AuthSecret.Name)
}
if m.Spec.Monitor != nil && m.Spec.TLS != nil {
name := meta_util.NameWithSuffix(m.Name, kubedb.MySQLMetricsExporterConfigSecretSuffix)
secrets = append(secrets, name)
if m.AuthSecret != nil {
secrets = append(secrets, m.AuthSecret.Name)
}
return secrets
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -369,25 +369,20 @@ func (p *PerconaXtraDB) SetTLSDefaults() {
}

// CertificateName returns the default certificate name and/or certificate secret name for a certificate alias
func (p *PerconaXtraDB) GetPersistentSecrets() []string {
func (p *PerconaXtraDBSpec) GetPersistentSecrets() []string {
if p == nil {
return nil
}

var secrets []string
if p.Spec.AuthSecret != nil {
secrets = append(secrets, p.Spec.AuthSecret.Name)
if p.AuthSecret != nil {
secrets = append(secrets, p.AuthSecret.Name)
}
if p.Spec.SystemUserSecrets != nil && p.Spec.SystemUserSecrets.ReplicationUserSecret != nil {
secrets = append(secrets, p.Spec.SystemUserSecrets.ReplicationUserSecret.Name)
if p.SystemUserSecrets != nil && p.SystemUserSecrets.ReplicationUserSecret != nil {
secrets = append(secrets, p.SystemUserSecrets.ReplicationUserSecret.Name)
}
if p.Spec.SystemUserSecrets != nil && p.Spec.SystemUserSecrets.MonitorUserSecret != nil {
secrets = append(secrets, p.Spec.SystemUserSecrets.MonitorUserSecret.Name)
}

if p.Spec.Monitor != nil && p.Spec.TLS != nil {
name := meta_util.NameWithSuffix(p.Name, kubedb.MySQLMetricsExporterConfigSecretSuffix)
secrets = append(secrets, name)
if p.SystemUserSecrets != nil && p.SystemUserSecrets.MonitorUserSecret != nil {
secrets = append(secrets, p.SystemUserSecrets.MonitorUserSecret.Name)
}
return secrets
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ const (

// +kubebuilder:object:root=true
// +kubebuilder:subresource:status
// +kubebuilder:resource:path=documentdbs,singular=documentdb,shortName=docdb,categories={datastore,kubedb,appscode,all}
// +kubebuilder:resource:path=documentdbs,singular=documentdb,shortName=fr,categories={datastore,kubedb,appscode,all}
// +kubebuilder:printcolumn:name="Namespace",type="string",JSONPath=".metadata.namespace"
// +kubebuilder:printcolumn:name="Version",type="string",JSONPath=".spec.version"
// +kubebuilder:printcolumn:name="Status",type="string",JSONPath=".status.phase"
Expand Down
Loading