|
10 | 10 | package resource |
11 | 11 |
|
12 | 12 | import ( |
13 | | - "bytes" |
14 | 13 | "fmt" |
| 14 | + "strings" |
| 15 | + |
15 | 16 | "sigs.k8s.io/controller-runtime/pkg/client" |
16 | 17 |
|
17 | 18 | "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil" |
@@ -80,135 +81,146 @@ func (builder *ServerConfigMapBuilder) Update(object client.Object) error { |
80 | 81 | configMap := object.(*corev1.ConfigMap) |
81 | 82 |
|
82 | 83 | ini.PrettySection = false // Remove trailing new line because rabbitmq.conf has only a default section. |
83 | | - cfg, err := ini.Load([]byte(defaultRabbitmqConf)) |
| 84 | + operatorConfiguration, err := ini.Load([]byte(defaultRabbitmqConf)) |
84 | 85 | if err != nil { |
85 | 86 | return err |
86 | 87 | } |
87 | | - defaultSection := cfg.Section("") |
| 88 | + defaultSection := operatorConfiguration.Section("") |
88 | 89 |
|
89 | 90 | if _, err := defaultSection.NewKey("cluster_name", builder.Instance.Name); err != nil { |
90 | 91 | return err |
91 | 92 | } |
92 | 93 |
|
| 94 | + userConfiguration := ini.Empty(ini.LoadOptions{}) |
| 95 | + userConfigurationSection := userConfiguration.Section("") |
| 96 | + |
93 | 97 | if builder.Instance.TLSEnabled() { |
94 | | - if err := cfg.Append([]byte(defaultTLSConf)); err != nil { |
| 98 | + if err := userConfiguration.Append([]byte(defaultTLSConf)); err != nil { |
95 | 99 | return err |
96 | 100 | } |
97 | 101 | if builder.Instance.DisableNonTLSListeners() { |
98 | | - if _, err := defaultSection.NewKey("listeners.tcp", "none"); err != nil { |
| 102 | + if _, err := userConfigurationSection.NewKey("listeners.tcp", "none"); err != nil { |
99 | 103 | return err |
100 | 104 | } |
101 | 105 | } else { |
102 | 106 | // management plugin does not have a *.listeners.tcp settings like other plugins |
103 | 107 | // management tcp listener can be disabled by setting management.ssl.port without setting management.tcp.port |
104 | 108 | // we set management tcp listener only if tls is enabled and disableNonTLSListeners is false |
105 | | - if _, err := defaultSection.NewKey("management.tcp.port", "15672"); err != nil { |
| 109 | + if _, err := userConfigurationSection.NewKey("management.tcp.port", "15672"); err != nil { |
106 | 110 | return err |
107 | 111 | } |
108 | 112 |
|
109 | | - if _, err := defaultSection.NewKey("prometheus.tcp.port", "15692"); err != nil { |
| 113 | + if _, err := userConfigurationSection.NewKey("prometheus.tcp.port", "15692"); err != nil { |
110 | 114 | return err |
111 | 115 | } |
112 | 116 | } |
113 | 117 | if builder.Instance.AdditionalPluginEnabled("rabbitmq_mqtt") { |
114 | | - if _, err := defaultSection.NewKey("mqtt.listeners.ssl.default", "8883"); err != nil { |
| 118 | + if _, err := userConfigurationSection.NewKey("mqtt.listeners.ssl.default", "8883"); err != nil { |
115 | 119 | return err |
116 | 120 | } |
117 | 121 | if builder.Instance.DisableNonTLSListeners() { |
118 | | - if _, err := defaultSection.NewKey("mqtt.listeners.tcp", "none"); err != nil { |
| 122 | + if _, err := userConfigurationSection.NewKey("mqtt.listeners.tcp", "none"); err != nil { |
119 | 123 | return err |
120 | 124 | } |
121 | 125 | } |
122 | 126 | } |
123 | 127 | if builder.Instance.AdditionalPluginEnabled("rabbitmq_stomp") { |
124 | | - if _, err := defaultSection.NewKey("stomp.listeners.ssl.1", "61614"); err != nil { |
| 128 | + if _, err := userConfigurationSection.NewKey("stomp.listeners.ssl.1", "61614"); err != nil { |
125 | 129 | return err |
126 | 130 | } |
127 | 131 | if builder.Instance.DisableNonTLSListeners() { |
128 | | - if _, err := defaultSection.NewKey("stomp.listeners.tcp", "none"); err != nil { |
| 132 | + if _, err := userConfigurationSection.NewKey("stomp.listeners.tcp", "none"); err != nil { |
129 | 133 | return err |
130 | 134 | } |
131 | 135 | } |
132 | 136 | } |
133 | 137 | } |
134 | 138 |
|
135 | 139 | if builder.Instance.MutualTLSEnabled() { |
136 | | - if _, err := defaultSection.NewKey("ssl_options.cacertfile", caCertPath); err != nil { |
| 140 | + if _, err := userConfigurationSection.NewKey("ssl_options.cacertfile", caCertPath); err != nil { |
137 | 141 | return err |
138 | 142 | } |
139 | | - if _, err := defaultSection.NewKey("ssl_options.verify", "verify_peer"); err != nil { |
| 143 | + if _, err := userConfigurationSection.NewKey("ssl_options.verify", "verify_peer"); err != nil { |
140 | 144 | return err |
141 | 145 | } |
142 | 146 |
|
143 | | - if _, err := defaultSection.NewKey("management.ssl.cacertfile", caCertPath); err != nil { |
| 147 | + if _, err := userConfigurationSection.NewKey("management.ssl.cacertfile", caCertPath); err != nil { |
144 | 148 | return err |
145 | 149 | } |
146 | 150 |
|
147 | | - if _, err := defaultSection.NewKey("prometheus.ssl.cacertfile", caCertPath); err != nil { |
| 151 | + if _, err := userConfigurationSection.NewKey("prometheus.ssl.cacertfile", caCertPath); err != nil { |
148 | 152 | return err |
149 | 153 | } |
150 | 154 |
|
151 | 155 | if builder.Instance.AdditionalPluginEnabled("rabbitmq_web_mqtt") { |
152 | | - if _, err := defaultSection.NewKey("web_mqtt.ssl.port", "15676"); err != nil { |
| 156 | + if _, err := userConfigurationSection.NewKey("web_mqtt.ssl.port", "15676"); err != nil { |
153 | 157 | return err |
154 | 158 | } |
155 | | - if _, err := defaultSection.NewKey("web_mqtt.ssl.cacertfile", caCertPath); err != nil { |
| 159 | + if _, err := userConfigurationSection.NewKey("web_mqtt.ssl.cacertfile", caCertPath); err != nil { |
156 | 160 | return err |
157 | 161 | } |
158 | | - if _, err := defaultSection.NewKey("web_mqtt.ssl.certfile", tlsCertPath); err != nil { |
| 162 | + if _, err := userConfigurationSection.NewKey("web_mqtt.ssl.certfile", tlsCertPath); err != nil { |
159 | 163 | return err |
160 | 164 | } |
161 | | - if _, err := defaultSection.NewKey("web_mqtt.ssl.keyfile", tlsKeyPath); err != nil { |
| 165 | + if _, err := userConfigurationSection.NewKey("web_mqtt.ssl.keyfile", tlsKeyPath); err != nil { |
162 | 166 | return err |
163 | 167 | } |
164 | 168 | if builder.Instance.DisableNonTLSListeners() { |
165 | | - if _, err := defaultSection.NewKey("web_mqtt.tcp.listener", "none"); err != nil { |
| 169 | + if _, err := userConfigurationSection.NewKey("web_mqtt.tcp.listener", "none"); err != nil { |
166 | 170 | return err |
167 | 171 | } |
168 | 172 | } |
169 | 173 | } |
170 | 174 | if builder.Instance.AdditionalPluginEnabled("rabbitmq_web_stomp") { |
171 | | - if _, err := defaultSection.NewKey("web_stomp.ssl.port", "15673"); err != nil { |
| 175 | + if _, err := userConfigurationSection.NewKey("web_stomp.ssl.port", "15673"); err != nil { |
172 | 176 | return err |
173 | 177 | } |
174 | | - if _, err := defaultSection.NewKey("web_stomp.ssl.cacertfile", caCertPath); err != nil { |
| 178 | + if _, err := userConfigurationSection.NewKey("web_stomp.ssl.cacertfile", caCertPath); err != nil { |
175 | 179 | return err |
176 | 180 | } |
177 | | - if _, err := defaultSection.NewKey("web_stomp.ssl.certfile", tlsCertPath); err != nil { |
| 181 | + if _, err := userConfigurationSection.NewKey("web_stomp.ssl.certfile", tlsCertPath); err != nil { |
178 | 182 | return err |
179 | 183 | } |
180 | | - if _, err := defaultSection.NewKey("web_stomp.ssl.keyfile", tlsKeyPath); err != nil { |
| 184 | + if _, err := userConfigurationSection.NewKey("web_stomp.ssl.keyfile", tlsKeyPath); err != nil { |
181 | 185 | return err |
182 | 186 | } |
183 | 187 | if builder.Instance.DisableNonTLSListeners() { |
184 | | - if _, err := defaultSection.NewKey("web_stomp.tcp.listener", "none"); err != nil { |
| 188 | + if _, err := userConfigurationSection.NewKey("web_stomp.tcp.listener", "none"); err != nil { |
185 | 189 | return err |
186 | 190 | } |
187 | 191 | } |
188 | 192 | } |
189 | 193 | } |
190 | 194 |
|
191 | 195 | if builder.Instance.MemoryLimited() { |
192 | | - if _, err := defaultSection.NewKey("total_memory_available_override_value", fmt.Sprintf("%d", removeHeadroom(builder.Instance.Spec.Resources.Limits.Memory().Value()))); err != nil { |
| 196 | + if _, err := userConfigurationSection.NewKey("total_memory_available_override_value", fmt.Sprintf("%d", removeHeadroom(builder.Instance.Spec.Resources.Limits.Memory().Value()))); err != nil { |
193 | 197 | return err |
194 | 198 | } |
195 | 199 | } |
196 | 200 |
|
197 | | - rmqProperties := builder.Instance.Spec.Rabbitmq |
198 | | - if err := cfg.Append([]byte(rmqProperties.AdditionalConfig)); err != nil { |
199 | | - return fmt.Errorf("failed to append spec.rabbitmq.additionalConfig: %w", err) |
200 | | - } |
201 | | - |
202 | | - var rmqConfBuffer bytes.Buffer |
203 | | - if _, err := cfg.WriteTo(&rmqConfBuffer); err != nil { |
| 201 | + var rmqConfBuffer strings.Builder |
| 202 | + if _, err := operatorConfiguration.WriteTo(&rmqConfBuffer); err != nil { |
204 | 203 | return err |
205 | 204 | } |
206 | 205 |
|
207 | 206 | if configMap.Data == nil { |
208 | 207 | configMap.Data = make(map[string]string) |
209 | 208 | } |
210 | 209 |
|
211 | | - configMap.Data["rabbitmq.conf"] = rmqConfBuffer.String() |
| 210 | + configMap.Data["operatorDefaults.conf"] = rmqConfBuffer.String() |
| 211 | + |
| 212 | + rmqConfBuffer.Reset() |
| 213 | + |
| 214 | + rmqProperties := builder.Instance.Spec.Rabbitmq |
| 215 | + if err := userConfiguration.Append([]byte(rmqProperties.AdditionalConfig)); err != nil { |
| 216 | + return fmt.Errorf("failed to append spec.rabbitmq.additionalConfig: %w", err) |
| 217 | + } |
| 218 | + |
| 219 | + if _, err := userConfiguration.WriteTo(&rmqConfBuffer); err != nil { |
| 220 | + return err |
| 221 | + } |
| 222 | + |
| 223 | + configMap.Data["userDefinedConfiguration.conf"] = rmqConfBuffer.String() |
212 | 224 |
|
213 | 225 | updateProperty(configMap.Data, "advanced.config", rmqProperties.AdvancedConfig) |
214 | 226 | updateProperty(configMap.Data, "rabbitmq-env.conf", rmqProperties.EnvConfig) |
|
0 commit comments