@@ -9,7 +9,7 @@ echo "Starting cert-manager TLS certificate setup..."
99
1010# Function to check for required environment variables
1111check_required_vars () {
12- local required_vars=(" MDB_RESOURCE_NAME" " MDB_NS" " K8S_CTX" " MDB_TLS_CA_SECRET " " MDB_TLS_CERT_SECRET " " MDB_SEARCH_TLS_SECRET " )
12+ local required_vars=(" MDB_RESOURCE_NAME" " MDB_NS" " K8S_CTX" " MDB_TLS_CA_SECRET_NAME " " MDB_TLS_SERVER_CERT_SECRET_NAME " " MDB_SEARCH_TLS_SECRET_NAME " )
1313 local missing_vars=()
1414
1515 for var in " ${required_vars[@]} " ; do
@@ -30,7 +30,7 @@ force_cleanup_cert_manager_resources() {
3030 echo " Force cleaning up cert-manager resources to prevent conflicts..."
3131
3232 # Force delete certificates (remove finalizers if stuck)
33- for cert in " ${MDB_SEARCH_TLS_SECRET } " " ${MDB_TLS_CERT_SECRET } " " ${MDB_TLS_CA_SECRET } " ; do
33+ for cert in " ${MDB_SEARCH_TLS_SECRET_NAME } " " ${MDB_TLS_SERVER_CERT_SECRET_NAME } " " ${MDB_TLS_CA_SECRET_NAME } " ; do
3434 if kubectl get certificate " ${cert} " --context " ${K8S_CTX} " -n " ${MDB_NS} " > /dev/null 2>&1 ; then
3535 echo " Force deleting certificate ${cert} ..."
3636 kubectl patch certificate " ${cert} " --context " ${K8S_CTX} " -n " ${MDB_NS} " -p ' {"metadata":{"finalizers":null}}' --type=merge || true
@@ -48,7 +48,7 @@ force_cleanup_cert_manager_resources() {
4848 done
4949
5050 # Delete related secrets if they exist in bad state
51- for secret in " ${MDB_SEARCH_TLS_SECRET } " " ${MDB_TLS_CERT_SECRET } " " ${MDB_TLS_CA_SECRET } " ; do
51+ for secret in " ${MDB_SEARCH_TLS_SECRET_NAME } " " ${MDB_TLS_SERVER_CERT_SECRET_NAME } " " ${MDB_TLS_CA_SECRET_NAME } " ; do
5252 if kubectl get secret " ${secret} " --context " ${K8S_CTX} " -n " ${MDB_NS} " > /dev/null 2>&1 ; then
5353 echo " Cleaning up secret ${secret} ..."
5454 kubectl delete secret " ${secret} " --context " ${K8S_CTX} " -n " ${MDB_NS} " --ignore-not-found=true
@@ -60,7 +60,7 @@ force_cleanup_cert_manager_resources() {
6060
6161 # Verify cleanup completed
6262 local cleanup_failed=false
63- for resource in " ${MDB_SEARCH_TLS_SECRET } " " ${MDB_TLS_CERT_SECRET } " " ${MDB_TLS_CA_SECRET } " ; do
63+ for resource in " ${MDB_SEARCH_TLS_SECRET_NAME } " " ${MDB_TLS_SERVER_CERT_SECRET_NAME } " " ${MDB_TLS_CA_SECRET_NAME } " ; do
6464 if kubectl get certificate " ${resource} " --context " ${K8S_CTX} " -n " ${MDB_NS} " > /dev/null 2>&1 ; then
6565 echo " WARNING: Certificate ${resource} still exists after cleanup"
6666 cleanup_failed=true
@@ -391,13 +391,13 @@ kubectl apply --context "${K8S_CTX}" -n "${MDB_NS}" -f - <<EOF_CA_CERT
391391apiVersion: cert-manager.io/v1
392392kind: Certificate
393393metadata:
394- name: ${MDB_TLS_CA_SECRET }
394+ name: ${MDB_TLS_CA_SECRET_NAME }
395395 namespace: ${MDB_NS}
396396 annotations:
397397 cert-manager.io/revision: "$( date +%s) "
398398spec:
399399 isCA: true
400- secretName: ${MDB_TLS_CA_SECRET }
400+ secretName: ${MDB_TLS_CA_SECRET_NAME }
401401 commonName: "${ca_common_name} "
402402 duration: 240h
403403 renewBefore: 120h
@@ -413,8 +413,8 @@ spec:
413413 kind: Issuer
414414EOF_CA_CERT
415415
416- wait_for_certificate " ${MDB_TLS_CA_SECRET } "
417- ensure_ca_secret_has_ca_crt " ${MDB_TLS_CA_SECRET } "
416+ wait_for_certificate " ${MDB_TLS_CA_SECRET_NAME } "
417+ ensure_ca_secret_has_ca_crt " ${MDB_TLS_CA_SECRET_NAME } "
418418
419419# Step 3: Create CA issuer
420420echo " Step 3: Creating CA issuer..."
@@ -428,7 +428,7 @@ metadata:
428428 cert-manager.io/revision: "$( date +%s) "
429429spec:
430430 ca:
431- secretName: ${MDB_TLS_CA_SECRET }
431+ secretName: ${MDB_TLS_CA_SECRET_NAME }
432432EOF_CA_ISSUER
433433
434434wait_for_issuer " ${MDB_TLS_CA_ISSUER} "
@@ -439,12 +439,12 @@ kubectl apply --context "${K8S_CTX}" -n "${MDB_NS}" -f - <<EOF_MONGODB_CERT
439439apiVersion: cert-manager.io/v1
440440kind: Certificate
441441metadata:
442- name: ${MDB_TLS_CERT_SECRET }
442+ name: ${MDB_TLS_SERVER_CERT_SECRET_NAME }
443443 namespace: ${MDB_NS}
444444 annotations:
445445 cert-manager.io/revision: "$( date +%s) "
446446spec:
447- secretName: ${MDB_TLS_CERT_SECRET }
447+ secretName: ${MDB_TLS_SERVER_CERT_SECRET_NAME }
448448 duration: 240h
449449 renewBefore: 120h
450450 usages:
@@ -464,12 +464,12 @@ kubectl apply --context "${K8S_CTX}" -n "${MDB_NS}" -f - <<EOF_SEARCH_CERT
464464apiVersion: cert-manager.io/v1
465465kind: Certificate
466466metadata:
467- name: ${MDB_SEARCH_TLS_SECRET }
467+ name: ${MDB_SEARCH_TLS_SECRET_NAME }
468468 namespace: ${MDB_NS}
469469 annotations:
470470 cert-manager.io/revision: "$( date +%s) "
471471spec:
472- secretName: ${MDB_SEARCH_TLS_SECRET }
472+ secretName: ${MDB_SEARCH_TLS_SECRET_NAME }
473473 duration: 240h
474474 renewBefore: 120h
475475 usages:
@@ -486,14 +486,14 @@ EOF_SEARCH_CERT
486486
487487# Wait for all certificates with enhanced monitoring
488488echo " Waiting for MongoDB certificates to be issued..."
489- wait_for_certificate " ${MDB_TLS_CERT_SECRET } "
490- wait_for_certificate " ${MDB_SEARCH_TLS_SECRET } "
489+ wait_for_certificate " ${MDB_TLS_SERVER_CERT_SECRET_NAME } "
490+ wait_for_certificate " ${MDB_SEARCH_TLS_SECRET_NAME } "
491491
492492echo " All TLS certificates have been successfully created by cert-manager"
493493echo " Performing final verification..."
494494
495495# Enhanced verification with SSL certificate details
496- for secret in " ${MDB_TLS_CA_SECRET } " " ${MDB_TLS_CERT_SECRET } " " ${MDB_SEARCH_TLS_SECRET } " ; do
496+ for secret in " ${MDB_TLS_CA_SECRET_NAME } " " ${MDB_TLS_SERVER_CERT_SECRET_NAME } " " ${MDB_SEARCH_TLS_SECRET_NAME } " ; do
497497 if kubectl get secret " ${secret} " --context " ${K8S_CTX} " -n " ${MDB_NS} " > /dev/null 2>&1 ; then
498498 echo " ✓ Secret ${secret} exists"
499499
@@ -520,9 +520,9 @@ metadata:
520520 namespace: ${MDB_NS}
521521data:
522522 status: "ready"
523- ca-secret: "${MDB_TLS_CA_SECRET } "
524- mongodb-secret: "${MDB_TLS_CERT_SECRET } "
525- search-secret: "${MDB_SEARCH_TLS_SECRET } "
523+ ca-secret: "${MDB_TLS_CA_SECRET_NAME } "
524+ mongodb-secret: "${MDB_TLS_SERVER_CERT_SECRET_NAME } "
525+ search-secret: "${MDB_SEARCH_TLS_SECRET_NAME } "
526526 created: "$( date -u +%Y-%m-%dT%H:%M:%SZ) "
527527EOF_STATUS
528528
0 commit comments