in controllers/util/zk_util.go [402:472]
func AddACLsToEnv(allACL *solrv1beta1.ZookeeperACL, readOnlyACL *solrv1beta1.ZookeeperACL) (hasACLs bool, envVars []corev1.EnvVar) {
if allACL == nil && readOnlyACL == nil {
return false, envVars
}
f := false
var zkDigests []string
if allACL != nil {
envVars = append(envVars,
corev1.EnvVar{
Name: "ZK_ALL_ACL_USERNAME",
ValueFrom: &corev1.EnvVarSource{
SecretKeyRef: &corev1.SecretKeySelector{
LocalObjectReference: corev1.LocalObjectReference{
Name: allACL.SecretRef,
},
Key: allACL.UsernameKey,
Optional: &f,
},
},
},
corev1.EnvVar{
Name: "ZK_ALL_ACL_PASSWORD",
ValueFrom: &corev1.EnvVarSource{
SecretKeyRef: &corev1.SecretKeySelector{
LocalObjectReference: corev1.LocalObjectReference{
Name: allACL.SecretRef,
},
Key: allACL.PasswordKey,
Optional: &f,
},
},
})
zkDigests = append(zkDigests, "-DzkDigestUsername=$(ZK_ALL_ACL_USERNAME)", "-DzkDigestPassword=$(ZK_ALL_ACL_PASSWORD)")
}
if readOnlyACL != nil {
envVars = append(envVars,
corev1.EnvVar{
Name: "ZK_READ_ACL_USERNAME",
ValueFrom: &corev1.EnvVarSource{
SecretKeyRef: &corev1.SecretKeySelector{
LocalObjectReference: corev1.LocalObjectReference{
Name: readOnlyACL.SecretRef,
},
Key: readOnlyACL.UsernameKey,
Optional: &f,
},
},
},
corev1.EnvVar{
Name: "ZK_READ_ACL_PASSWORD",
ValueFrom: &corev1.EnvVarSource{
SecretKeyRef: &corev1.SecretKeySelector{
LocalObjectReference: corev1.LocalObjectReference{
Name: readOnlyACL.SecretRef,
},
Key: readOnlyACL.PasswordKey,
Optional: &f,
},
},
})
zkDigests = append(zkDigests, "-DzkDigestReadonlyUsername=$(ZK_READ_ACL_USERNAME)", "-DzkDigestReadonlyPassword=$(ZK_READ_ACL_PASSWORD)")
}
envVars = append(envVars,
corev1.EnvVar{
Name: "SOLR_ZK_CREDS_AND_ACLS",
Value: "-DzkACLProvider=org.apache.solr.common.cloud.VMParamsAllAndReadonlyDigestZkACLProvider -DzkCredentialsProvider=org.apache.solr.common.cloud.VMParamsSingleSetCredentialsDigestZkCredentialsProvider " + strings.Join(zkDigests, " "),
})
return true, envVars
}