[bitnami/kafka] Release 3.2.3-debian-11-r230 (#55250)
Signed-off-by: Bitnami Containers <bitnami-bot@vmware.com>
This commit is contained in:
parent
2b1eaed3df
commit
67801aa1d6
|
|
@ -8,10 +8,10 @@ ARG TARGETARCH
|
|||
|
||||
LABEL com.vmware.cp.artifact.flavor="sha256:1e1b4657a77f0d47e9220f0c37b9bf7802581b93214fff7d1bd2364c8bf22e8e" \
|
||||
org.opencontainers.image.base.name="docker.io/bitnami/minideb:bullseye" \
|
||||
org.opencontainers.image.created="2023-12-24T07:45:22Z" \
|
||||
org.opencontainers.image.created="2024-01-22T10:32:35Z" \
|
||||
org.opencontainers.image.description="Application packaged by VMware, Inc" \
|
||||
org.opencontainers.image.licenses="Apache-2.0" \
|
||||
org.opencontainers.image.ref.name="3.2.3-debian-11-r229" \
|
||||
org.opencontainers.image.ref.name="3.2.3-debian-11-r230" \
|
||||
org.opencontainers.image.title="kafka" \
|
||||
org.opencontainers.image.vendor="VMware, Inc." \
|
||||
org.opencontainers.image.version="3.2.3"
|
||||
|
|
@ -27,9 +27,9 @@ SHELL ["/bin/bash", "-o", "errexit", "-o", "nounset", "-o", "pipefail", "-c"]
|
|||
RUN install_packages ca-certificates curl procps zlib1g
|
||||
RUN mkdir -p /tmp/bitnami/pkg/cache/ ; cd /tmp/bitnami/pkg/cache/ ; \
|
||||
COMPONENTS=( \
|
||||
"wait-for-port-1.0.7-4-linux-${OS_ARCH}-debian-11" \
|
||||
"java-17.0.9-11-6-linux-${OS_ARCH}-debian-11" \
|
||||
"render-template-1.0.6-4-linux-${OS_ARCH}-debian-11" \
|
||||
"wait-for-port-1.0.7-5-linux-${OS_ARCH}-debian-11" \
|
||||
"render-template-1.0.6-5-linux-${OS_ARCH}-debian-11" \
|
||||
"java-17.0.10-13-0-linux-${OS_ARCH}-debian-11" \
|
||||
"kafka-3.2.3-12-linux-${OS_ARCH}-debian-11" \
|
||||
) ; \
|
||||
for COMPONENT in "${COMPONENTS[@]}"; do \
|
||||
|
|
@ -44,6 +44,7 @@ RUN mkdir -p /tmp/bitnami/pkg/cache/ ; cd /tmp/bitnami/pkg/cache/ ; \
|
|||
RUN apt-get update && apt-get upgrade -y && \
|
||||
apt-get clean && rm -rf /var/lib/apt/lists /var/cache/apt/archives
|
||||
RUN chmod g+rwX /opt/bitnami
|
||||
RUN find / -perm /6000 -type f -exec chmod a-s {} \; || true
|
||||
RUN ln -s /opt/bitnami/scripts/kafka/entrypoint.sh /entrypoint.sh
|
||||
RUN ln -s /opt/bitnami/scripts/kafka/run.sh /run.sh
|
||||
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
"arch": "amd64",
|
||||
"distro": "debian-11",
|
||||
"type": "NAMI",
|
||||
"version": "17.0.9-11-6"
|
||||
"version": "17.0.10-13-0"
|
||||
},
|
||||
"kafka": {
|
||||
"arch": "amd64",
|
||||
|
|
@ -15,12 +15,12 @@
|
|||
"arch": "amd64",
|
||||
"distro": "debian-11",
|
||||
"type": "NAMI",
|
||||
"version": "1.0.6-4"
|
||||
"version": "1.0.6-5"
|
||||
},
|
||||
"wait-for-port": {
|
||||
"arch": "amd64",
|
||||
"distro": "debian-11",
|
||||
"type": "NAMI",
|
||||
"version": "1.0.7-4"
|
||||
"version": "1.0.7-5"
|
||||
}
|
||||
}
|
||||
|
|
@ -10,7 +10,7 @@ fi
|
|||
|
||||
script=$1
|
||||
exit_code="${2:-96}"
|
||||
fail_if_not_present="${3:-y}"
|
||||
fail_if_not_present="${3:-n}"
|
||||
|
||||
if test -f "$script"; then
|
||||
sh $script
|
||||
|
|
|
|||
|
|
@ -37,6 +37,9 @@ kafka_env_vars=(
|
|||
KAFKA_CFG_SASL_ENABLED_MECHANISMS
|
||||
KAFKA_KRAFT_CLUSTER_ID
|
||||
KAFKA_SKIP_KRAFT_STORAGE_INIT
|
||||
KAFKA_CFG_MAX_REQUEST_SIZE
|
||||
KAFKA_CFG_MESSAGE_MAX_BYTES
|
||||
KAFKA_CFG_MAX_PARTITION_FETCH_BYTES
|
||||
KAFKA_CLIENT_LISTENER_NAME
|
||||
KAFKA_ZOOKEEPER_PROTOCOL
|
||||
KAFKA_ZOOKEEPER_PASSWORD
|
||||
|
|
|
|||
|
|
@ -399,6 +399,8 @@ kafka_validate() {
|
|||
if [[ "$protocol" = "SASL_PLAINTEXT" ]] || [[ "$protocol" = "SASL_SSL" ]]; then
|
||||
if is_empty_value "${KAFKA_CFG_SASL_MECHANISM_CONTROLLER_PROTOCOL:-}"; then
|
||||
print_validation_error "When using SASL for controller comunication the mechanism should be provided at KAFKA_CFG_SASL_MECHANISM_CONTROLLER_PROTOCOL"
|
||||
elif [[ "$KAFKA_CFG_SASL_MECHANISM_CONTROLLER_PROTOCOL" =~ SCRAM ]]; then
|
||||
warn "KRaft controller listener may not support SCRAM-SHA-256/SCRAM-SHA-512 mechanisms. If facing any issues, we recommend switching to PLAIN mechanism. More information at: https://issues.apache.org/jira/browse/KAFKA-15513"
|
||||
fi
|
||||
if is_empty_value "${KAFKA_CONTROLLER_USER:-}" || is_empty_value "${KAFKA_CONTROLLER_PASSWORD:-}"; then
|
||||
print_validation_error "In order to configure SASL authentication for Kafka control plane communications, you must provide the SASL credentials. Set the environment variables KAFKA_CONTROLLER_USER and KAFKA_CONTROLLER_PASSWORD to configure the credentials for SASL authentication with between controllers."
|
||||
|
|
|
|||
Loading…
Reference in New Issue