fix: moves jgroups.dns.query to a system property (#24057)
* fix: moves jgroups.dns.query to a system property closes #21830 * removing the dns query from import * removing the dns query from import also removing cache-stack
This commit is contained in:
parent
b05b575646
commit
5ff5e12782
5 changed files with 17 additions and 11 deletions
|
@ -65,6 +65,8 @@ import static org.keycloak.operator.crds.v2alpha1.CRDUtils.isTlsConfigured;
|
|||
@KubernetesDependent(labelSelector = Constants.DEFAULT_LABELS_AS_STRING)
|
||||
public class KeycloakDeploymentDependentResource extends CRUDKubernetesDependentResource<StatefulSet, Keycloak> {
|
||||
|
||||
static final String JGROUPS_DNS_QUERY_PARAM = "-Djgroups.dns.query=";
|
||||
|
||||
public static final String OPTIMIZED_ARG = "--optimized";
|
||||
|
||||
@Inject
|
||||
|
@ -209,6 +211,7 @@ public class KeycloakDeploymentDependentResource extends CRUDKubernetesDependent
|
|||
if (customImage.isPresent()) {
|
||||
containerBuilder.addToArgs(OPTIMIZED_ARG);
|
||||
}
|
||||
containerBuilder.addToArgs(0, getJGroupsParameter(keycloakCR));
|
||||
|
||||
// probes
|
||||
var tlsConfigured = isTlsConfigured(keycloakCR);
|
||||
|
@ -271,6 +274,10 @@ public class KeycloakDeploymentDependentResource extends CRUDKubernetesDependent
|
|||
return baseDeployment;
|
||||
}
|
||||
|
||||
private static String getJGroupsParameter(Keycloak keycloakCR) {
|
||||
return JGROUPS_DNS_QUERY_PARAM + KeycloakDiscoveryServiceDependentResource.getName(keycloakCR) +"." + keycloakCR.getMetadata().getNamespace();
|
||||
}
|
||||
|
||||
private void addEnvVarsAndWatchSecrets(StatefulSet baseDeployment, Keycloak keycloakCR) {
|
||||
var firstClasssEnvVars = distConfigurator.configureDistOptions(keycloakCR);
|
||||
|
||||
|
@ -351,12 +358,6 @@ public class KeycloakDeploymentDependentResource extends CRUDKubernetesDependent
|
|||
.endValueFrom()
|
||||
.build());
|
||||
|
||||
envVars.add(
|
||||
new EnvVarBuilder()
|
||||
.withName("jgroups.dns.query")
|
||||
.withValue(getName(keycloakCR) + Constants.KEYCLOAK_DISCOVERY_SERVICE_SUFFIX +"." + keycloakCR.getMetadata().getNamespace())
|
||||
.build());
|
||||
|
||||
return envVars;
|
||||
}
|
||||
|
||||
|
|
|
@ -38,6 +38,7 @@ import org.keycloak.operator.Utils;
|
|||
import org.keycloak.operator.crds.v2alpha1.realmimport.KeycloakRealmImport;
|
||||
|
||||
import java.util.List;
|
||||
import java.util.Set;
|
||||
|
||||
import static org.keycloak.operator.controllers.KeycloakDistConfigurator.getKeycloakOptionEnvVarName;
|
||||
|
||||
|
@ -76,7 +77,9 @@ public class KeycloakRealmImportJobDependentResource extends KubernetesDependent
|
|||
|
||||
var cacheEnvVarName = getKeycloakOptionEnvVarName("cache");
|
||||
var healthEnvVarName = getKeycloakOptionEnvVarName("health-enabled");
|
||||
envvars.removeIf(e -> e.getName().equals(cacheEnvVarName) || e.getName().equals(healthEnvVarName));
|
||||
var cacheStackEnvVarName = getKeycloakOptionEnvVarName("cache-stack");
|
||||
var toRemove = Set.of(cacheEnvVarName, healthEnvVarName, cacheStackEnvVarName);
|
||||
envvars.removeIf(e -> toRemove.contains(e.getName()));
|
||||
|
||||
// The Job should not connect to the cache
|
||||
envvars.add(new EnvVarBuilder().withName(cacheEnvVarName).withValue("local").build());
|
||||
|
|
|
@ -319,6 +319,8 @@ public class BaseOperatorTest implements QuarkusTestAfterEachCallback {
|
|||
logFailed(k8sclient.apps().deployments().withName("keycloak-operator"), Deployment::getStatus);
|
||||
}
|
||||
logFailed(k8sclient.apps().statefulSets().withName(POSTGRESQL_NAME), StatefulSet::getStatus);
|
||||
k8sclient.pods().withLabel("app", "keycloak-realm-import").list().getItems().stream()
|
||||
.forEach(pod -> logFailed(k8sclient.pods().resource(pod), Pod::getStatus));
|
||||
} finally {
|
||||
cleanup();
|
||||
}
|
||||
|
|
|
@ -489,7 +489,7 @@ public class KeycloakDeploymentTest extends BaseOperatorTest {
|
|||
.list()
|
||||
.getItems();
|
||||
|
||||
assertThat(pods.get(0).getSpec().getContainers().get(0).getArgs()).containsExactly("--verbose", "start", "--optimized");
|
||||
assertThat(pods.get(0).getSpec().getContainers().get(0).getArgs()).endsWith("--verbose", "start", "--optimized");
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -512,7 +512,7 @@ public class KeycloakDeploymentTest extends BaseOperatorTest {
|
|||
.list()
|
||||
.getItems();
|
||||
|
||||
assertThat(pods.get(0).getSpec().getContainers().get(0).getArgs()).containsExactly("--verbose", "start", "--optimized");
|
||||
assertThat(pods.get(0).getSpec().getContainers().get(0).getArgs()).endsWith("--verbose", "start", "--optimized");
|
||||
assertThat(pods.get(0).getSpec().getImagePullSecrets().size()).isEqualTo(1);
|
||||
assertThat(pods.get(0).getSpec().getImagePullSecrets().get(0).getName()).isEqualTo(imagePullSecretName);
|
||||
}
|
||||
|
|
|
@ -194,8 +194,8 @@ public class PodTemplateTest {
|
|||
// Assert
|
||||
assertEquals(1, podTemplate.getSpec().getContainers().get(0).getCommand().size());
|
||||
assertEquals(command, podTemplate.getSpec().getContainers().get(0).getCommand().get(0));
|
||||
assertEquals(1, podTemplate.getSpec().getContainers().get(0).getArgs().size());
|
||||
assertEquals(arg, podTemplate.getSpec().getContainers().get(0).getArgs().get(0));
|
||||
assertEquals(2, podTemplate.getSpec().getContainers().get(0).getArgs().size());
|
||||
assertEquals(arg, podTemplate.getSpec().getContainers().get(0).getArgs().get(1));
|
||||
}
|
||||
|
||||
@Test
|
||||
|
|
Loading…
Reference in a new issue