@@ -336,8 +336,6 @@ pub async fn reconcile_hbase(
336336
337337 let client = & ctx. client ;
338338
339- validate_cr ( hbase) ?;
340-
341339 let resolved_product_image = hbase
342340 . spec
343341 . image
@@ -515,7 +513,7 @@ pub fn build_region_server_role_service(
515513 . server_role_service_name ( )
516514 . context ( GlobalServiceNameNotFoundSnafu ) ?;
517515 let ports = hbase
518- . ports ( & role, & resolved_product_image . product_version )
516+ . ports ( & role)
519517 . into_iter ( )
520518 . map ( |( name, value) | ServicePort {
521519 name : Some ( name) ,
@@ -601,13 +599,8 @@ fn build_rolegroup_config_map(
601599 ) ;
602600 }
603601 PropertyNameKind :: File ( file_name) if file_name == HBASE_ENV_SH => {
604- let mut hbase_env_config = build_hbase_env_sh (
605- hbase,
606- merged_config,
607- & hbase_role,
608- & rolegroup. role_group ,
609- & resolved_product_image. product_version ,
610- ) ?;
602+ let mut hbase_env_config =
603+ build_hbase_env_sh ( hbase, merged_config, & hbase_role, & rolegroup. role_group ) ?;
611604
612605 // configOverride come last
613606 hbase_env_config. extend ( config. clone ( ) ) ;
@@ -691,15 +684,11 @@ fn build_rolegroup_config_map(
691684 builder. add_data ( SSL_CLIENT_XML , ssl_client_xml) ;
692685 }
693686
694- extend_role_group_config_map (
695- rolegroup,
696- merged_config. logging ( ) ,
697- & mut builder,
698- & resolved_product_image. product_version ,
699- )
700- . context ( InvalidLoggingConfigSnafu {
701- cm_name : rolegroup. object_name ( ) ,
702- } ) ?;
687+ extend_role_group_config_map ( rolegroup, merged_config. logging ( ) , & mut builder) . context (
688+ InvalidLoggingConfigSnafu {
689+ cm_name : rolegroup. object_name ( ) ,
690+ } ,
691+ ) ?;
703692
704693 builder. build ( ) . map_err ( |e| Error :: BuildRoleGroupConfig {
705694 source : e,
@@ -717,7 +706,7 @@ fn build_rolegroup_service(
717706 resolved_product_image : & ResolvedProductImage ,
718707) -> Result < Service > {
719708 let ports = hbase
720- . ports ( hbase_role, & resolved_product_image . product_version )
709+ . ports ( hbase_role)
721710 . into_iter ( )
722711 . map ( |( name, value) | ServicePort {
723712 name : Some ( name) ,
@@ -783,7 +772,7 @@ fn build_rolegroup_statefulset(
783772 let hbase_version = & resolved_product_image. app_version_label ;
784773
785774 let ports = hbase
786- . ports ( hbase_role, & resolved_product_image . product_version )
775+ . ports ( hbase_role)
787776 . into_iter ( )
788777 . map ( |( name, value) | ContainerPort {
789778 name : Some ( name) ,
@@ -1099,7 +1088,6 @@ fn build_hbase_env_sh(
10991088 merged_config : & AnyServiceConfig ,
11001089 hbase_role : & HbaseRole ,
11011090 role_group : & str ,
1102- product_version : & str ,
11031091) -> Result < BTreeMap < String , String > , Error > {
11041092 let mut result = BTreeMap :: new ( ) ;
11051093
@@ -1114,7 +1102,7 @@ fn build_hbase_env_sh(
11141102 construct_global_jvm_args ( hbase. has_kerberos_enabled ( ) ) ,
11151103 ) ;
11161104 let role_specific_non_heap_jvm_args =
1117- construct_role_specific_non_heap_jvm_args ( hbase, hbase_role, role_group, product_version )
1105+ construct_role_specific_non_heap_jvm_args ( hbase, hbase_role, role_group)
11181106 . context ( ConstructJvmArgumentSnafu ) ?;
11191107 match hbase_role {
11201108 HbaseRole :: Master => {
@@ -1140,24 +1128,6 @@ fn build_hbase_env_sh(
11401128 Ok ( result)
11411129}
11421130
1143- /// Ensures that no authorization is configured for HBase versions that do not support it.
1144- /// In the future, such validations should be moved to the CRD CEL rules which are much more flexible
1145- /// and have to added benefit that invalid CRs are rejected by the API server.
1146- /// A requirement for this is that the minimum supported Kubernetes version is 1.29.
1147- fn validate_cr ( hbase : & v1alpha1:: HbaseCluster ) -> Result < ( ) > {
1148- tracing:: info!( "Begin CR validation" ) ;
1149-
1150- let hbase_version = hbase. spec . image . product_version ( ) ;
1151- let authorization = hbase. spec . cluster_config . authorization . is_some ( ) ;
1152-
1153- if hbase_version. starts_with ( "2.4" ) && authorization {
1154- tracing:: error!( "Invalid custom resource" ) ;
1155- return Err ( Error :: AuthorizationNotSupported ) ;
1156- }
1157- tracing:: info!( "End CR validation" ) ;
1158- Ok ( ( ) )
1159- }
1160-
11611131/// Build the domain name of an HBase service pod.
11621132/// The hbase-entrypoint.sh script uses this to build the fully qualified name of a pod
11631133/// by appending it to the `HOSTNAME` environment variable.
0 commit comments