apiVersion: v1 kind: ConfigMap metadata: name: {{ printf "%s-scripts" (include "common.names.fullname" .) }} namespace: {{ .Release.Namespace | quote }} labels: {{- include "common.labels.standard" . | nindent 4 }} {{- if .Values.commonLabels }} {{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }} {{- end }} {{- if .Values.commonAnnotations }} annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }} {{- end }} data: {{- if and (eq .Values.architecture "replication") .Values.sentinel.enabled }} start-node.sh: | #!/bin/bash . /opt/bitnami/scripts/libos.sh . /opt/bitnami/scripts/liblog.sh . /opt/bitnami/scripts/libvalidations.sh get_port() { hostname="$1" type="$2" port_var=$(echo "${hostname^^}_SERVICE_PORT_$type" | sed "s/-/_/g") port=${!port_var} if [ -z "$port" ]; then case $type in "SENTINEL") echo {{ .Values.sentinel.containerPort }} ;; "REDIS") echo {{ .Values.master.containerPort }} ;; esac else echo $port fi } get_full_hostname() { hostname="$1" {{- if eq .Values.sentinel.service.type "NodePort" }} echo "${hostname}.{{- .Release.Namespace }}" {{- else }} echo "${hostname}.${HEADLESS_SERVICE}" {{- end}} } REDISPORT=$(get_port "$HOSTNAME" "REDIS") myip=$(hostname -i) # If there are more than one IP, use the first IPv4 address if [[ "$myip" = *" "* ]]; then myip=$(echo $myip | awk '{if ( match($0,/([0-9]+\.)([0-9]+\.)([0-9]+\.)[0-9]+/) ) { print substr($0,RSTART,RLENGTH); } }') fi HEADLESS_SERVICE="{{ template "common.names.fullname" . }}-headless.{{ .Release.Namespace }}.svc.{{ .Values.clusterDomain }}" REDIS_SERVICE="{{ template "common.names.fullname" . }}.{{ .Release.Namespace }}.svc.{{ .Values.clusterDomain }}" SENTINEL_SERVICE_PORT=$(get_port "{{ include "common.names.fullname" . }}" "TCP_SENTINEL") not_exists_dns_entry() { if [[ -z "$(getent ahosts "$HEADLESS_SERVICE" | grep "^${myip}" )" ]]; then warn "$HEADLESS_SERVICE does not contain the IP of this pod: ${myip}" return 1 fi debug "$HEADLESS_SERVICE has my IP: ${myip}" return 0 } validate_quorum() { if is_boolean_yes "$REDIS_TLS_ENABLED"; then quorum_info_command="{{- if and .Values.auth.enabled .Values.auth.sentinel }}REDISCLI_AUTH="\$REDIS_PASSWORD" {{ end }}redis-cli -h $REDIS_SERVICE -p $SENTINEL_SERVICE_PORT --tls --cert ${REDIS_TLS_CERT_FILE} --key ${REDIS_TLS_KEY_FILE} --cacert ${REDIS_TLS_CA_FILE} sentinel master {{ .Values.sentinel.masterSet }}" else quorum_info_command="{{- if and .Values.auth.enabled .Values.auth.sentinel }}REDISCLI_AUTH="\$REDIS_PASSWORD" {{ end }}redis-cli -h $REDIS_SERVICE -p $SENTINEL_SERVICE_PORT sentinel master {{ .Values.sentinel.masterSet }}" fi info "about to run the command: $quorum_info_command" eval $quorum_info_command | grep -Fq "s_down" } trigger_manual_failover() { if is_boolean_yes "$REDIS_TLS_ENABLED"; then failover_command="{{- if and .Values.auth.enabled .Values.auth.sentinel }}REDISCLI_AUTH="\$REDIS_PASSWORD" {{ end }}redis-cli -h $REDIS_SERVICE -p $SENTINEL_SERVICE_PORT --tls --cert ${REDIS_TLS_CERT_FILE} --key ${REDIS_TLS_KEY_FILE} --cacert ${REDIS_TLS_CA_FILE} sentinel failover {{ .Values.sentinel.masterSet }}" else failover_command="{{- if and .Values.auth.enabled .Values.auth.sentinel }}REDISCLI_AUTH="\$REDIS_PASSWORD" {{ end }}redis-cli -h $REDIS_SERVICE -p $SENTINEL_SERVICE_PORT sentinel failover {{ .Values.sentinel.masterSet }}" fi info "about to run the command: $failover_command" eval $failover_command } get_sentinel_master_info() { if is_boolean_yes "$REDIS_TLS_ENABLED"; then sentinel_info_command="{{- if and .Values.auth.enabled .Values.auth.sentinel }}REDISCLI_AUTH="\$REDIS_PASSWORD" {{ end }}redis-cli -h $REDIS_SERVICE -p $SENTINEL_SERVICE_PORT --tls --cert ${REDIS_TLS_CERT_FILE} --key ${REDIS_TLS_KEY_FILE} --cacert ${REDIS_TLS_CA_FILE} sentinel get-master-addr-by-name {{ .Values.sentinel.masterSet }}" else sentinel_info_command="{{- if and .Values.auth.enabled .Values.auth.sentinel }}REDISCLI_AUTH="\$REDIS_PASSWORD" {{ end }}redis-cli -h $REDIS_SERVICE -p $SENTINEL_SERVICE_PORT sentinel get-master-addr-by-name {{ .Values.sentinel.masterSet }}" fi info "about to run the command: $sentinel_info_command" eval $sentinel_info_command } {{- if and .Values.replica.containerSecurityContext.runAsUser (eq (.Values.replica.containerSecurityContext.runAsUser | int) 0) }} useradd redis chown -R redis {{ .Values.replica.persistence.path }} {{- end }} [[ -f $REDIS_PASSWORD_FILE ]] && export REDIS_PASSWORD="$(< "${REDIS_PASSWORD_FILE}")" [[ -f $REDIS_MASTER_PASSWORD_FILE ]] && export REDIS_MASTER_PASSWORD="$(< "${REDIS_MASTER_PASSWORD_FILE}")" # Waits for DNS to add this ip to the service DNS entry retry_while not_exists_dns_entry if [[ -z "$(getent ahosts "$HEADLESS_SERVICE" | grep -v "^${myip}")" ]]; then # Only node available on the network, master by default export REDIS_REPLICATION_MODE="master" else export REDIS_REPLICATION_MODE="slave" {{- if and .Values.sentinel.automateClusterRecovery (le (int .Values.sentinel.downAfterMilliseconds) 2000) }} retry_count=1 while validate_quorum do info "sleeping, waiting for Redis master to come up" sleep 1s if ! ((retry_count % 11)); then info "Trying to manually failover" failover_result=$(trigger_manual_failover) debug "Failover result: $failover_result" fi ((retry_count+=1)) done info "Redis master is up now" {{- end }} # Fetches current master's host and port REDIS_SENTINEL_INFO=($(get_sentinel_master_info)) info "printing REDIS_SENTINEL_INFO=(${REDIS_SENTINEL_INFO[0]},${REDIS_SENTINEL_INFO[1]})" REDIS_MASTER_HOST=${REDIS_SENTINEL_INFO[0]} REDIS_MASTER_PORT_NUMBER=${REDIS_SENTINEL_INFO[1]} fi if [[ "$REDIS_REPLICATION_MODE" = "master" ]]; then debug "Starting as master node" if [[ ! -f /opt/bitnami/redis/etc/master.conf ]]; then cp /opt/bitnami/redis/mounted-etc/master.conf /opt/bitnami/redis/etc/master.conf fi else debug "Starting as replica node" if [[ ! -f /opt/bitnami/redis/etc/replica.conf ]];then cp /opt/bitnami/redis/mounted-etc/replica.conf /opt/bitnami/redis/etc/replica.conf fi fi if [[ ! -f /opt/bitnami/redis/etc/redis.conf ]];then cp /opt/bitnami/redis/mounted-etc/redis.conf /opt/bitnami/redis/etc/redis.conf fi echo "" >> /opt/bitnami/redis/etc/replica.conf echo "replica-announce-port $REDISPORT" >> /opt/bitnami/redis/etc/replica.conf echo "replica-announce-ip $(get_full_hostname "$HOSTNAME")" >> /opt/bitnami/redis/etc/replica.conf {{- if .Values.tls.enabled }} ARGS=("--port" "0") ARGS+=("--tls-port" "${REDIS_TLS_PORT}") ARGS+=("--tls-cert-file" "${REDIS_TLS_CERT_FILE}") ARGS+=("--tls-key-file" "${REDIS_TLS_KEY_FILE}") ARGS+=("--tls-ca-cert-file" "${REDIS_TLS_CA_FILE}") ARGS+=("--tls-auth-clients" "${REDIS_TLS_AUTH_CLIENTS}") ARGS+=("--tls-replication" "yes") {{- if .Values.tls.dhParamsFilename }} ARGS+=("--tls-dh-params-file" "${REDIS_TLS_DH_PARAMS_FILE}") {{- end }} {{- else }} ARGS=("--port" "${REDIS_PORT}") {{- end }} if [[ "$REDIS_REPLICATION_MODE" = "slave" ]]; then ARGS+=("--slaveof" "${REDIS_MASTER_HOST}" "${REDIS_MASTER_PORT_NUMBER}") fi {{- if .Values.auth.enabled }} ARGS+=("--requirepass" "${REDIS_PASSWORD}") ARGS+=("--masterauth" "${REDIS_MASTER_PASSWORD}") {{- else }} ARGS+=("--protected-mode" "no") {{- end }} if [[ "$REDIS_REPLICATION_MODE" = "master" ]]; then ARGS+=("--include" "/opt/bitnami/redis/etc/master.conf") else ARGS+=("--include" "/opt/bitnami/redis/etc/replica.conf") fi ARGS+=("--include" "/opt/bitnami/redis/etc/redis.conf") {{- if .Values.replica.extraFlags }} {{- range .Values.replica.extraFlags }} ARGS+=({{ . | quote }}) {{- end }} {{- end }} {{- if .Values.replica.preExecCmds }} {{- .Values.replica.preExecCmds | nindent 4}} {{- end }} {{- if .Values.replica.command }} exec {{ .Values.replica.command }} "${ARGS[@]}" {{- else }} exec redis-server "${ARGS[@]}" {{- end }} start-sentinel.sh: | #!/bin/bash . /opt/bitnami/scripts/libos.sh . /opt/bitnami/scripts/libvalidations.sh . /opt/bitnami/scripts/libfile.sh HEADLESS_SERVICE="{{ template "common.names.fullname" . }}-headless.{{ .Release.Namespace }}.svc.{{ .Values.clusterDomain }}" REDIS_SERVICE="{{ template "common.names.fullname" . }}.{{ .Release.Namespace }}.svc.{{ .Values.clusterDomain }}" get_port() { hostname="$1" type="$2" port_var=$(echo "${hostname^^}_SERVICE_PORT_$type" | sed "s/-/_/g") port=${!port_var} if [ -z "$port" ]; then case $type in "SENTINEL") echo {{ .Values.sentinel.containerPort }} ;; "REDIS") echo {{ .Values.master.containerPort }} ;; esac else echo $port fi } get_full_hostname() { hostname="$1" {{- if eq .Values.sentinel.service.type "NodePort" }} echo "${hostname}.{{- .Release.Namespace }}" {{- else }} echo "${hostname}.${HEADLESS_SERVICE}" {{- end}} } SERVPORT=$(get_port "$HOSTNAME" "SENTINEL") REDISPORT=$(get_port "$HOSTNAME" "REDIS") SENTINEL_SERVICE_PORT=$(get_port "{{ include "common.names.fullname" . }}" "TCP_SENTINEL") myip=$(hostname -i) # If there are more than one IP, use the first IPv4 address if [[ "$myip" = *" "* ]]; then myip=$(echo $myip | awk '{if ( match($0,/([0-9]+\.)([0-9]+\.)([0-9]+\.)[0-9]+/) ) { print substr($0,RSTART,RLENGTH); } }') fi sentinel_conf_set() { local -r key="${1:?missing key}" local value="${2:-}" # Sanitize inputs value="${value//\\/\\\\}" value="${value//&/\\&}" value="${value//\?/\\?}" [[ "$value" = "" ]] && value="\"$value\"" replace_in_file "/opt/bitnami/redis-sentinel/etc/sentinel.conf" "^#*\s*${key} .*" "${key} ${value}" false } sentinel_conf_add() { echo $'\n'"$@" >> "/opt/bitnami/redis-sentinel/etc/sentinel.conf" } host_id() { echo "$1" | openssl sha1 | awk '{print $2}' } not_exists_dns_entry() { if [[ -z "$(getent ahosts "$HEADLESS_SERVICE" | grep "^${myip}" )" ]]; then warn "$HEADLESS_SERVICE does not contain the IP of this pod: ${myip}" return 1 fi debug "$HEADLESS_SERVICE has my IP: ${myip}" return 0 } get_sentinel_master_info() { if is_boolean_yes "$REDIS_TLS_ENABLED"; then sentinel_info_command="{{- if and .Values.auth.enabled .Values.auth.sentinel }}REDISCLI_AUTH="\$REDIS_PASSWORD" {{ end }}redis-cli -h $REDIS_SERVICE -p $SENTINEL_SERVICE_PORT --tls --cert ${REDIS_TLS_CERT_FILE} --key ${REDIS_TLS_KEY_FILE} --cacert ${REDIS_TLS_CA_FILE} sentinel get-master-addr-by-name {{ .Values.sentinel.masterSet }}" else sentinel_info_command="{{- if and .Values.auth.enabled .Values.auth.sentinel }}REDISCLI_AUTH="\$REDIS_PASSWORD" {{ end }}redis-cli -h $REDIS_SERVICE -p $SENTINEL_SERVICE_PORT sentinel get-master-addr-by-name {{ .Values.sentinel.masterSet }}" fi info "about to run the command: $sentinel_info_command" eval $sentinel_info_command } # Waits for DNS to add this ip to the service DNS entry retry_while not_exists_dns_entry [[ -f $REDIS_PASSWORD_FILE ]] && export REDIS_PASSWORD="$(< "${REDIS_PASSWORD_FILE}")" cp /opt/bitnami/redis-sentinel/mounted-etc/sentinel.conf /opt/bitnami/redis-sentinel/etc/sentinel.conf {{- if .Values.auth.enabled }} printf "\nsentinel auth-pass %s %s" "{{ .Values.sentinel.masterSet }}" "$REDIS_PASSWORD" >> /opt/bitnami/redis-sentinel/etc/sentinel.conf {{- if and .Values.auth.enabled .Values.auth.sentinel }} printf "\nrequirepass %s" "$REDIS_PASSWORD" >> /opt/bitnami/redis-sentinel/etc/sentinel.conf {{- end }} {{- end }} printf "\nsentinel myid %s" "$(host_id "$HOSTNAME")" >> /opt/bitnami/redis-sentinel/etc/sentinel.conf if ! $(get_sentinel_master_info); then # No master found, lets create a master node export REDIS_REPLICATION_MODE="master" REDIS_MASTER_HOST=$(get_full_hostname "$HOSTNAME") REDIS_MASTER_PORT_NUMBER="$REDISPORT" else export REDIS_REPLICATION_MODE="slave" # Fetches current master's host and port REDIS_SENTINEL_INFO=($(get_sentinel_master_info)) info "printing REDIS_SENTINEL_INFO=(${REDIS_SENTINEL_INFO[0]},${REDIS_SENTINEL_INFO[1]})" REDIS_MASTER_HOST=${REDIS_SENTINEL_INFO[0]} REDIS_MASTER_PORT_NUMBER=${REDIS_SENTINEL_INFO[1]} fi sentinel_conf_set "sentinel monitor" "{{ .Values.sentinel.masterSet }} "$REDIS_MASTER_HOST" "$REDIS_MASTER_PORT_NUMBER" {{ .Values.sentinel.quorum }}" add_known_sentinel() { hostname="$1" ip="$2" if [[ -n "$hostname" && -n "$ip" && "$hostname" != "$HOSTNAME" ]]; then sentinel_conf_add "sentinel known-sentinel {{ .Values.sentinel.masterSet }} $(get_full_hostname "$hostname") $(get_port "$hostname" "SENTINEL") $(host_id "$hostname")" fi } add_known_replica() { hostname="$1" ip="$2" if [[ -n "$ip" && "$(get_full_hostname "$hostname")" != "$REDIS_MASTER_HOST" ]]; then sentinel_conf_add "sentinel known-replica {{ .Values.sentinel.masterSet }} $(get_full_hostname "$hostname") $(get_port "$hostname" "REDIS")" fi } # Add available hosts on the network as known replicas & sentinels for node in $(seq 0 $(({{ .Values.replica.replicaCount }}-1))); do hostname="{{ template "common.names.fullname" . }}-node-$node" ip="$(getent hosts "$hostname.$HEADLESS_SERVICE" | awk '{ print $1 }')" add_known_sentinel "$hostname" "$ip" add_known_replica "$hostname" "$ip" done echo "" >> /opt/bitnami/redis-sentinel/etc/sentinel.conf echo "sentinel announce-hostnames yes" >> /opt/bitnami/redis-sentinel/etc/sentinel.conf echo "sentinel resolve-hostnames yes" >> /opt/bitnami/redis-sentinel/etc/sentinel.conf echo "sentinel announce-port $SERVPORT" >> /opt/bitnami/redis-sentinel/etc/sentinel.conf echo "sentinel announce-ip $(get_full_hostname "$HOSTNAME")" >> /opt/bitnami/redis-sentinel/etc/sentinel.conf {{- if .Values.tls.enabled }} ARGS=("--port" "0") ARGS+=("--tls-port" "${REDIS_SENTINEL_TLS_PORT_NUMBER}") ARGS+=("--tls-cert-file" "${REDIS_SENTINEL_TLS_CERT_FILE}") ARGS+=("--tls-key-file" "${REDIS_SENTINEL_TLS_KEY_FILE}") ARGS+=("--tls-ca-cert-file" "${REDIS_SENTINEL_TLS_CA_FILE}") ARGS+=("--tls-replication" "yes") ARGS+=("--tls-auth-clients" "${REDIS_SENTINEL_TLS_AUTH_CLIENTS}") {{- if .Values.tls.dhParamsFilename }} ARGS+=("--tls-dh-params-file" "${REDIS_SENTINEL_TLS_DH_PARAMS_FILE}") {{- end }} {{- end }} {{- if .Values.sentinel.preExecCmds }} {{ .Values.sentinel.preExecCmds | nindent 4 }} {{- end }} exec redis-server /opt/bitnami/redis-sentinel/etc/sentinel.conf --sentinel {{- if .Values.tls.enabled }} "${ARGS[@]}" {{- end }} prestop-sentinel.sh: | #!/bin/bash . /opt/bitnami/scripts/libvalidations.sh . /opt/bitnami/scripts/libos.sh HEADLESS_SERVICE="{{ template "common.names.fullname" . }}-headless.{{ .Release.Namespace }}.svc.{{ .Values.clusterDomain }}" SENTINEL_SERVICE_ENV_NAME={{ printf "%s%s" (upper (include "common.names.fullname" .)| replace "-" "_") "_SERVICE_PORT_TCP_SENTINEL" }} SENTINEL_SERVICE_PORT=${!SENTINEL_SERVICE_ENV_NAME} get_full_hostname() { hostname="$1" {{- if eq .Values.sentinel.service.type "NodePort" }} echo "${hostname}.{{- .Release.Namespace }}" {{- else }} echo "${hostname}.${HEADLESS_SERVICE}" {{- end}} } run_sentinel_command() { if is_boolean_yes "$REDIS_SENTINEL_TLS_ENABLED"; then redis-cli -h "$REDIS_SERVICE" -p "$SENTINEL_SERVICE_PORT" --tls --cert "$REDIS_SENTINEL_TLS_CERT_FILE" --key "$REDIS_SENTINEL_TLS_KEY_FILE" --cacert "$REDIS_SENTINEL_TLS_CA_FILE" sentinel "$@" else redis-cli -h "$REDIS_SERVICE" -p "$SENTINEL_SERVICE_PORT" sentinel "$@" fi } failover_finished() { REDIS_SENTINEL_INFO=($(run_sentinel_command get-master-addr-by-name "{{ .Values.sentinel.masterSet }}")) REDIS_MASTER_HOST="${REDIS_SENTINEL_INFO[0]}" [[ "$REDIS_MASTER_HOST" != "$(get_full_hostname $HOSTNAME)" ]] } REDIS_SERVICE="{{ include "common.names.fullname" . }}.{{ .Release.Namespace }}.svc.{{ .Values.clusterDomain }}" # redis-cli automatically consumes credentials from the REDISCLI_AUTH variable [[ -n "$REDIS_PASSWORD" ]] && export REDISCLI_AUTH="$REDIS_PASSWORD" [[ -f "$REDIS_PASSWORD_FILE" ]] && export REDISCLI_AUTH="$(< "${REDIS_PASSWORD_FILE}")" if ! failover_finished; then echo "I am the master pod and you are stopping me. Starting sentinel failover" # if I am the master, issue a command to failover once and then wait for the failover to finish run_sentinel_command failover "{{ .Values.sentinel.masterSet }}" if retry_while "failover_finished" "{{ sub .Values.sentinel.terminationGracePeriodSeconds 10 }}" 1; then echo "Master has been successfuly failed over to a different pod." exit 0 else echo "Master failover failed" exit 1 fi else exit 0 fi prestop-redis.sh: | #!/bin/bash . /opt/bitnami/scripts/libvalidations.sh . /opt/bitnami/scripts/libos.sh run_redis_command() { if is_boolean_yes "$REDIS_TLS_ENABLED"; then redis-cli -h 127.0.0.1 -p "$REDIS_TLS_PORT" --tls --cert "$REDIS_TLS_CERT_FILE" --key "$REDIS_TLS_KEY_FILE" --cacert "$REDIS_TLS_CA_FILE" "$@" else redis-cli -h 127.0.0.1 -p ${REDIS_PORT} "$@" fi } failover_finished() { REDIS_ROLE=$(run_redis_command role | head -1) [[ "$REDIS_ROLE" != "master" ]] } # redis-cli automatically consumes credentials from the REDISCLI_AUTH variable [[ -n "$REDIS_PASSWORD" ]] && export REDISCLI_AUTH="$REDIS_PASSWORD" [[ -f "$REDIS_PASSWORD_FILE" ]] && export REDISCLI_AUTH="$(< "${REDIS_PASSWORD_FILE}")" if ! failover_finished; then echo "Waiting for sentinel to run failover for up to {{ sub .Values.sentinel.terminationGracePeriodSeconds 10 }}s" retry_while "failover_finished" "{{ sub .Values.sentinel.terminationGracePeriodSeconds 10 }}" 1 else exit 0 fi {{- else }} start-master.sh: | #!/bin/bash [[ -f $REDIS_PASSWORD_FILE ]] && export REDIS_PASSWORD="$(< "${REDIS_PASSWORD_FILE}")" {{- if and .Values.master.containerSecurityContext.runAsUser (eq (.Values.master.containerSecurityContext.runAsUser | int) 0) }} useradd redis chown -R redis {{ .Values.master.persistence.path }} {{- end }} if [[ ! -f /opt/bitnami/redis/etc/master.conf ]];then cp /opt/bitnami/redis/mounted-etc/master.conf /opt/bitnami/redis/etc/master.conf fi if [[ ! -f /opt/bitnami/redis/etc/redis.conf ]];then cp /opt/bitnami/redis/mounted-etc/redis.conf /opt/bitnami/redis/etc/redis.conf fi {{- if .Values.tls.enabled }} ARGS=("--port" "0") ARGS+=("--tls-port" "${REDIS_TLS_PORT}") ARGS+=("--tls-cert-file" "${REDIS_TLS_CERT_FILE}") ARGS+=("--tls-key-file" "${REDIS_TLS_KEY_FILE}") ARGS+=("--tls-ca-cert-file" "${REDIS_TLS_CA_FILE}") ARGS+=("--tls-auth-clients" "${REDIS_TLS_AUTH_CLIENTS}") {{- if .Values.tls.dhParamsFilename }} ARGS+=("--tls-dh-params-file" "${REDIS_TLS_DH_PARAMS_FILE}") {{- end }} {{- else }} ARGS=("--port" "${REDIS_PORT}") {{- end }} {{- if .Values.auth.enabled }} ARGS+=("--requirepass" "${REDIS_PASSWORD}") ARGS+=("--masterauth" "${REDIS_PASSWORD}") {{- else }} ARGS+=("--protected-mode" "no") {{- end }} ARGS+=("--include" "/opt/bitnami/redis/etc/redis.conf") ARGS+=("--include" "/opt/bitnami/redis/etc/master.conf") {{- if .Values.master.extraFlags }} {{- range .Values.master.extraFlags }} ARGS+=({{ . | quote }}) {{- end }} {{- end }} {{- if .Values.master.preExecCmds }} {{ .Values.master.preExecCmds | nindent 4}} {{- end }} {{- if .Values.master.command }} exec {{ .Values.master.command }} "${ARGS[@]}" {{- else }} exec redis-server "${ARGS[@]}" {{- end }} {{- if eq .Values.architecture "replication" }} start-replica.sh: | #!/bin/bash get_port() { hostname="$1" type="$2" port_var=$(echo "${hostname^^}_SERVICE_PORT_$type" | sed "s/-/_/g") port=${!port_var} if [ -z "$port" ]; then case $type in "SENTINEL") echo {{ .Values.sentinel.containerPort }} ;; "REDIS") echo {{ .Values.master.containerPort }} ;; esac else echo $port fi } get_full_hostname() { hostname="$1" {{- if eq .Values.sentinel.service.type "NodePort" }} echo "${hostname}.{{- .Release.Namespace }}" {{- else }} echo "${hostname}.${HEADLESS_SERVICE}" {{- end}} } REDISPORT=$(get_port "$HOSTNAME" "REDIS") [[ -f $REDIS_PASSWORD_FILE ]] && export REDIS_PASSWORD="$(< "${REDIS_PASSWORD_FILE}")" [[ -f $REDIS_MASTER_PASSWORD_FILE ]] && export REDIS_MASTER_PASSWORD="$(< "${REDIS_MASTER_PASSWORD_FILE}")" {{- if and .Values.replica.containerSecurityContext.runAsUser (eq (.Values.replica.containerSecurityContext.runAsUser | int) 0) }} useradd redis chown -R redis {{ .Values.replica.persistence.path }} {{- end }} if [[ ! -f /opt/bitnami/redis/etc/replica.conf ]];then cp /opt/bitnami/redis/mounted-etc/replica.conf /opt/bitnami/redis/etc/replica.conf fi if [[ ! -f /opt/bitnami/redis/etc/redis.conf ]];then cp /opt/bitnami/redis/mounted-etc/redis.conf /opt/bitnami/redis/etc/redis.conf fi echo "" >> /opt/bitnami/redis/etc/replica.conf echo "replica-announce-port $REDISPORT" >> /opt/bitnami/redis/etc/replica.conf echo "replica-announce-ip $(get_full_hostname "$HOSTNAME")" >> /opt/bitnami/redis/etc/replica.conf {{- if .Values.tls.enabled }} ARGS=("--port" "0") ARGS+=("--tls-port" "${REDIS_TLS_PORT}") ARGS+=("--tls-cert-file" "${REDIS_TLS_CERT_FILE}") ARGS+=("--tls-key-file" "${REDIS_TLS_KEY_FILE}") ARGS+=("--tls-ca-cert-file" "${REDIS_TLS_CA_FILE}") ARGS+=("--tls-auth-clients" "${REDIS_TLS_AUTH_CLIENTS}") ARGS+=("--tls-replication" "yes") {{- if .Values.tls.dhParamsFilename }} ARGS+=("--tls-dh-params-file" "${REDIS_TLS_DH_PARAMS_FILE}") {{- end }} {{- else }} ARGS=("--port" "${REDIS_PORT}") {{- end }} ARGS+=("--slaveof" "${REDIS_MASTER_HOST}" "${REDIS_MASTER_PORT_NUMBER}") {{- if .Values.auth.enabled }} ARGS+=("--requirepass" "${REDIS_PASSWORD}") ARGS+=("--masterauth" "${REDIS_MASTER_PASSWORD}") {{- else }} ARGS+=("--protected-mode" "no") {{- end }} ARGS+=("--include" "/opt/bitnami/redis/etc/redis.conf") ARGS+=("--include" "/opt/bitnami/redis/etc/replica.conf") {{- if .Values.replica.extraFlags }} {{- range .Values.replica.extraFlags }} ARGS+=({{ . | quote }}) {{- end }} {{- end }} {{- if .Values.replica.preExecCmds }} {{ .Values.replica.preExecCmds | nindent 4}} {{- end }} {{- if .Values.replica.command }} exec {{ .Values.replica.command }} "${ARGS[@]}" {{- else }} exec redis-server "${ARGS[@]}" {{- end }} {{- end }} {{- end }}