Skip to content

Commit 63813e3

Browse files
committed
env var unification
1 parent 0c6fd48 commit 63813e3

File tree

11 files changed

+50
-35
lines changed

11 files changed

+50
-35
lines changed

docs/search/01-search-community-deploy/code_snippets/01_0306_create_mongodb_tls_secrets.sh

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -168,8 +168,8 @@ create_tls_secret() {
168168

169169
# Create all secrets
170170
echo "Creating Kubernetes secrets..."
171-
create_tls_secret "${MDB_TLS_CA_SECRET}" "${tmpdir}/ca.crt" "" "generic"
172-
create_tls_secret "${MDB_TLS_CERT_SECRET}" "${tmpdir}/mongodb.crt" "${tmpdir}/mongodb.key"
173-
create_tls_secret "${MDB_SEARCH_TLS_SECRET}" "${tmpdir}/mongot.crt" "${tmpdir}/mongot.key"
171+
create_tls_secret "${MDB_TLS_CA_SECRET_NAME}" "${tmpdir}/ca.crt" "" "generic"
172+
create_tls_secret "${MDB_TLS_SERVER_CERT_SECRET_NAME}" "${tmpdir}/mongodb.crt" "${tmpdir}/mongodb.key"
173+
create_tls_secret "${MDB_SEARCH_TLS_SECRET_NAME}" "${tmpdir}/mongot.crt" "${tmpdir}/mongot.key"
174174

175175
echo "TLS certificates and secrets created successfully"

docs/search/01-search-community-deploy/code_snippets/01_0307_optional_cert_manager_tls.sh

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ echo "Starting cert-manager TLS certificate setup..."
99

1010
# Function to check for required environment variables
1111
check_required_vars() {
12-
local required_vars=("MDB_RESOURCE_NAME" "MDB_NS" "K8S_CTX" "MDB_TLS_CA_SECRET" "MDB_TLS_CERT_SECRET" "MDB_SEARCH_TLS_SECRET")
12+
local required_vars=("MDB_RESOURCE_NAME" "MDB_NS" "K8S_CTX" "MDB_TLS_CA_SECRET_NAME" "MDB_TLS_SERVER_CERT_SECRET_NAME" "MDB_SEARCH_TLS_SECRET_NAME")
1313
local missing_vars=()
1414

1515
for var in "${required_vars[@]}"; do
@@ -30,7 +30,7 @@ force_cleanup_cert_manager_resources() {
3030
echo "Force cleaning up cert-manager resources to prevent conflicts..."
3131

3232
# Force delete certificates (remove finalizers if stuck)
33-
for cert in "${MDB_SEARCH_TLS_SECRET}" "${MDB_TLS_CERT_SECRET}" "${MDB_TLS_CA_SECRET}"; do
33+
for cert in "${MDB_SEARCH_TLS_SECRET_NAME}" "${MDB_TLS_SERVER_CERT_SECRET_NAME}" "${MDB_TLS_CA_SECRET_NAME}"; do
3434
if kubectl get certificate "${cert}" --context "${K8S_CTX}" -n "${MDB_NS}" >/dev/null 2>&1; then
3535
echo "Force deleting certificate ${cert}..."
3636
kubectl patch certificate "${cert}" --context "${K8S_CTX}" -n "${MDB_NS}" -p '{"metadata":{"finalizers":null}}' --type=merge || true
@@ -48,7 +48,7 @@ force_cleanup_cert_manager_resources() {
4848
done
4949

5050
# Delete related secrets if they exist in bad state
51-
for secret in "${MDB_SEARCH_TLS_SECRET}" "${MDB_TLS_CERT_SECRET}" "${MDB_TLS_CA_SECRET}"; do
51+
for secret in "${MDB_SEARCH_TLS_SECRET_NAME}" "${MDB_TLS_SERVER_CERT_SECRET_NAME}" "${MDB_TLS_CA_SECRET_NAME}"; do
5252
if kubectl get secret "${secret}" --context "${K8S_CTX}" -n "${MDB_NS}" >/dev/null 2>&1; then
5353
echo "Cleaning up secret ${secret}..."
5454
kubectl delete secret "${secret}" --context "${K8S_CTX}" -n "${MDB_NS}" --ignore-not-found=true
@@ -60,7 +60,7 @@ force_cleanup_cert_manager_resources() {
6060

6161
# Verify cleanup completed
6262
local cleanup_failed=false
63-
for resource in "${MDB_SEARCH_TLS_SECRET}" "${MDB_TLS_CERT_SECRET}" "${MDB_TLS_CA_SECRET}"; do
63+
for resource in "${MDB_SEARCH_TLS_SECRET_NAME}" "${MDB_TLS_SERVER_CERT_SECRET_NAME}" "${MDB_TLS_CA_SECRET_NAME}"; do
6464
if kubectl get certificate "${resource}" --context "${K8S_CTX}" -n "${MDB_NS}" >/dev/null 2>&1; then
6565
echo "WARNING: Certificate ${resource} still exists after cleanup"
6666
cleanup_failed=true
@@ -391,13 +391,13 @@ kubectl apply --context "${K8S_CTX}" -n "${MDB_NS}" -f - <<EOF_CA_CERT
391391
apiVersion: cert-manager.io/v1
392392
kind: Certificate
393393
metadata:
394-
name: ${MDB_TLS_CA_SECRET}
394+
name: ${MDB_TLS_CA_SECRET_NAME}
395395
namespace: ${MDB_NS}
396396
annotations:
397397
cert-manager.io/revision: "$(date +%s)"
398398
spec:
399399
isCA: true
400-
secretName: ${MDB_TLS_CA_SECRET}
400+
secretName: ${MDB_TLS_CA_SECRET_NAME}
401401
commonName: "${ca_common_name}"
402402
duration: 240h
403403
renewBefore: 120h
@@ -413,8 +413,8 @@ spec:
413413
kind: Issuer
414414
EOF_CA_CERT
415415

416-
wait_for_certificate "${MDB_TLS_CA_SECRET}"
417-
ensure_ca_secret_has_ca_crt "${MDB_TLS_CA_SECRET}"
416+
wait_for_certificate "${MDB_TLS_CA_SECRET_NAME}"
417+
ensure_ca_secret_has_ca_crt "${MDB_TLS_CA_SECRET_NAME}"
418418

419419
# Step 3: Create CA issuer
420420
echo "Step 3: Creating CA issuer..."
@@ -428,7 +428,7 @@ metadata:
428428
cert-manager.io/revision: "$(date +%s)"
429429
spec:
430430
ca:
431-
secretName: ${MDB_TLS_CA_SECRET}
431+
secretName: ${MDB_TLS_CA_SECRET_NAME}
432432
EOF_CA_ISSUER
433433

434434
wait_for_issuer "${MDB_TLS_CA_ISSUER}"
@@ -439,12 +439,12 @@ kubectl apply --context "${K8S_CTX}" -n "${MDB_NS}" -f - <<EOF_MONGODB_CERT
439439
apiVersion: cert-manager.io/v1
440440
kind: Certificate
441441
metadata:
442-
name: ${MDB_TLS_CERT_SECRET}
442+
name: ${MDB_TLS_SERVER_CERT_SECRET_NAME}
443443
namespace: ${MDB_NS}
444444
annotations:
445445
cert-manager.io/revision: "$(date +%s)"
446446
spec:
447-
secretName: ${MDB_TLS_CERT_SECRET}
447+
secretName: ${MDB_TLS_SERVER_CERT_SECRET_NAME}
448448
duration: 240h
449449
renewBefore: 120h
450450
usages:
@@ -464,12 +464,12 @@ kubectl apply --context "${K8S_CTX}" -n "${MDB_NS}" -f - <<EOF_SEARCH_CERT
464464
apiVersion: cert-manager.io/v1
465465
kind: Certificate
466466
metadata:
467-
name: ${MDB_SEARCH_TLS_SECRET}
467+
name: ${MDB_SEARCH_TLS_SECRET_NAME}
468468
namespace: ${MDB_NS}
469469
annotations:
470470
cert-manager.io/revision: "$(date +%s)"
471471
spec:
472-
secretName: ${MDB_SEARCH_TLS_SECRET}
472+
secretName: ${MDB_SEARCH_TLS_SECRET_NAME}
473473
duration: 240h
474474
renewBefore: 120h
475475
usages:
@@ -486,14 +486,14 @@ EOF_SEARCH_CERT
486486

487487
# Wait for all certificates with enhanced monitoring
488488
echo "Waiting for MongoDB certificates to be issued..."
489-
wait_for_certificate "${MDB_TLS_CERT_SECRET}"
490-
wait_for_certificate "${MDB_SEARCH_TLS_SECRET}"
489+
wait_for_certificate "${MDB_TLS_SERVER_CERT_SECRET_NAME}"
490+
wait_for_certificate "${MDB_SEARCH_TLS_SECRET_NAME}"
491491

492492
echo "All TLS certificates have been successfully created by cert-manager"
493493
echo "Performing final verification..."
494494

495495
# Enhanced verification with SSL certificate details
496-
for secret in "${MDB_TLS_CA_SECRET}" "${MDB_TLS_CERT_SECRET}" "${MDB_SEARCH_TLS_SECRET}"; do
496+
for secret in "${MDB_TLS_CA_SECRET_NAME}" "${MDB_TLS_SERVER_CERT_SECRET_NAME}" "${MDB_SEARCH_TLS_SECRET_NAME}"; do
497497
if kubectl get secret "${secret}" --context "${K8S_CTX}" -n "${MDB_NS}" >/dev/null 2>&1; then
498498
echo "✓ Secret ${secret} exists"
499499

@@ -520,9 +520,9 @@ metadata:
520520
namespace: ${MDB_NS}
521521
data:
522522
status: "ready"
523-
ca-secret: "${MDB_TLS_CA_SECRET}"
524-
mongodb-secret: "${MDB_TLS_CERT_SECRET}"
525-
search-secret: "${MDB_SEARCH_TLS_SECRET}"
523+
ca-secret: "${MDB_TLS_CA_SECRET_NAME}"
524+
mongodb-secret: "${MDB_TLS_SERVER_CERT_SECRET_NAME}"
525+
search-secret: "${MDB_SEARCH_TLS_SECRET_NAME}"
526526
created: "$(date -u +%Y-%m-%dT%H:%M:%SZ)"
527527
EOF_STATUS
528528

docs/search/01-search-community-deploy/code_snippets/01_0310_create_mongodb_community_resource.sh

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ spec:
1111
tls:
1212
enabled: true
1313
certificateKeySecretRef:
14-
name: ${MDB_TLS_CERT_SECRET}
14+
name: ${MDB_TLS_SERVER_CERT_SECRET_NAME}
1515
caCertificateSecretRef:
16-
name: ${MDB_TLS_CA_SECRET}
16+
name: ${MDB_TLS_CA_SECRET_NAME}
1717
authentication:
1818
ignoreUnknownUsers: true
1919
modes:

docs/search/01-search-community-deploy/code_snippets/01_0320_create_mongodb_search_resource.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ spec:
77
security:
88
tls:
99
certificateKeySecretRef:
10-
name: ${MDB_SEARCH_TLS_SECRET}
10+
name: ${MDB_SEARCH_TLS_SECRET_NAME}
1111
resourceRequirements:
1212
limits:
1313
cpu: "3"

docs/search/01-search-community-deploy/env_variables.sh

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ export MDB_RESOURCE_NAME="mdbc-rs"
1010
export MDB_MEMBERS=3
1111

1212
# TLS-related secret names used for MongoDBCommunity and MongoDBSearch
13-
export MDB_TLS_CA_SECRET="${MDB_RESOURCE_NAME}-ca"
14-
export MDB_TLS_CERT_SECRET="${MDB_RESOURCE_NAME}-tls"
15-
export MDB_SEARCH_TLS_SECRET="${MDB_RESOURCE_NAME}-search-tls"
13+
export MDB_TLS_CA_SECRET_NAME="${MDB_RESOURCE_NAME}-ca"
14+
export MDB_TLS_SERVER_CERT_SECRET_NAME="${MDB_RESOURCE_NAME}-tls"
15+
export MDB_SEARCH_TLS_SECRET_NAME="${MDB_RESOURCE_NAME}-search-tls"
1616
# Set to "1" to use cert-manager for TLS certificate management instead of self-managed certificates
1717
export MDB_USE_CERT_MANAGER_TLS="0"
1818

docs/search/02-search-enterprise-deploy/code_snippets/02_0302_configure_tls_prerequisites.sh

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,3 +62,11 @@ fi
6262
kubectl --context "${K8S_CTX}" create configmap "${MDB_TLS_CA_CONFIGMAP}" -n "${MDB_NS}" \
6363
--from-file=ca-pem="${TMP_DIR}/mms-ca.crt" --from-file=mms-ca.crt="${TMP_DIR}/mms-ca.crt" \
6464
--dry-run=client -o yaml | kubectl --context "${K8S_CTX}" apply -f -
65+
66+
# Ensure CA secret also exists in application namespace for mounts expecting a Secret (root-secret)
67+
if ! kubectl --context "${K8S_CTX}" -n "${MDB_NS}" get secret "${MDB_TLS_CA_SECRET_NAME}" >/dev/null 2>&1; then
68+
kubectl --context "${K8S_CTX}" -n "${CERT_MANAGER_NAMESPACE}" get secret "${MDB_TLS_CA_SECRET_NAME}" -o yaml \
69+
| sed 's/namespace: "+${CERT_MANAGER_NAMESPACE}+"/namespace: '"${MDB_NS}"'/' \
70+
| sed 's/namespace: cert-manager/namespace: '"${MDB_NS}"'/' \
71+
| kubectl --context "${K8S_CTX}" apply -n "${MDB_NS}" -f - || echo "Warning: failed to copy ${MDB_TLS_CA_SECRET_NAME} to ${MDB_NS}" >&2
72+
fi

docs/search/02-search-enterprise-deploy/code_snippets/02_0304_generate_tls_certificates.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ kind: Certificate
44
metadata:
55
name: ${MDB_RESOURCE_NAME}-server-tls
66
spec:
7-
secretName: ${MDB_TLS_SERVER_CERT_SECRET}
7+
secretName: ${MDB_TLS_SERVER_CERT_SECRET_NAME}
88
issuerRef:
99
name: ${MDB_TLS_CLUSTER_ISSUER}
1010
kind: ClusterIssuer

docs/search/02-search-enterprise-deploy/env_variables.sh

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,9 @@ export OPERATOR_HELM_CHART="mongodb/mongodb-kubernetes"
3434
export OPERATOR_ADDITIONAL_HELM_VALUES=""
3535

3636
## TLS-related secret names used for MongoDB and MongoDBSearch
37-
#export MDB_TLS_CA_SECRET="${MDB_RESOURCE_NAME}-ca" # legacy CA secret (not used by Enterprise CR directly)
38-
#export MDB_TLS_CERT_SECRET="${MDB_RESOURCE_NAME}-tls" # legacy direct cert secret (not used by Enterprise CR directly)
39-
#export MDB_SEARCH_TLS_SECRET="${MDB_RESOURCE_NAME}-search-tls" # used by MongoDBSearch
37+
#export MDB_TLS_CA_SECRET_NAME="${MDB_RESOURCE_NAME}-ca" # legacy CA secret (not used by Enterprise CR directly)
38+
#export MDB_TLS_SERVER_CERT_SECRET_NAME="${MDB_RESOURCE_NAME}-tls" # legacy direct cert secret (not used by Enterprise CR directly)
39+
#export MDB_SEARCH_TLS_SECRET_NAME="${MDB_RESOURCE_NAME}-search-tls" # used by MongoDBSearch
4040
## New variables for Enterprise MongoDB TLS configuration using certsSecretPrefix + tls.ca
4141
export MDB_TLS_CERT_SECRET_PREFIX="certs"
4242
export MDB_TLS_CA_CONFIGMAP="${MDB_RESOURCE_NAME}-ca-configmap"
@@ -48,7 +48,7 @@ export MDB_TLS_SELF_SIGNED_CLUSTER_ISSUER="selfsigned-cluster-issuer"
4848
export MDB_TLS_CA_CERT_NAME="my-selfsigned-ca"
4949
export MDB_TLS_CA_SECRET_NAME="root-secret"
5050
export MDB_TLS_CLUSTER_ISSUER="my-ca-issuer"
51-
export MDB_TLS_SERVER_CERT_SECRET="${MDB_TLS_CERT_SECRET_PREFIX}-${MDB_RESOURCE_NAME}-cert"
51+
export MDB_TLS_SERVER_CERT_SECRET_NAME="${MDB_TLS_CERT_SECRET_PREFIX}-${MDB_RESOURCE_NAME}-cert"
5252
export MDB_SEARCH_TLS_SECRET_NAME="${MDB_RESOURCE_NAME}-search-tls"
5353

5454
export MDB_CONNECTION_STRING="mongodb://mdb-user:${MDB_USER_PASSWORD}@${MDB_RESOURCE_NAME}-svc.${MDB_NS}.svc.cluster.local:27017/?replicaSet=${MDB_RESOURCE_NAME}&tls=true"

docs/search/03-search-query-usage/code_snippets/03_0410_run_mongodb_tools_pod.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ spec:
1919
volumes:
2020
- name: mongo-ca
2121
secret:
22-
secretName: ${MDB_TLS_CA_SECRET}
22+
secretName: ${MDB_TLS_CA_SECRET_NAME}
2323
EOF
2424

2525
echo "Waiting for the mongodb-tools to be ready..."

docs/search/03-search-query-usage/env_variables.sh

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,11 @@
1515
# user only for the connection string in MDB_CONNECTION_STRING env var below
1616
#export MDB_RESOURCE_NAME="mdbc-rs"
1717

18+
# TLS-related secret names used by the snippets in this module
19+
#export MDB_TLS_CA_SECRET_NAME="${MDB_RESOURCE_NAME}-ca"
20+
#export MDB_TLS_SERVER_CERT_SECRET_NAME="${MDB_RESOURCE_NAME}-tls"
21+
#export MDB_SEARCH_TLS_SECRET_NAME="${MDB_RESOURCE_NAME}-search-tls"
22+
1823
# default connection string if MongoDB database is deployed using the operator
1924
#export MDB_CONNECTION_STRING="mongodb://mdb-user:${MDB_USER_PASSWORD}@${MDB_RESOURCE_NAME}-0.${MDB_RESOURCE_NAME}-svc.${MDB_NS}.svc.cluster.local:27017/?replicaSet=${MDB_RESOURCE_NAME}"
2025

0 commit comments

Comments
 (0)