2020-05-13 12:18:52 +00:00
|
|
|
//
|
|
|
|
// DISCLAIMER
|
|
|
|
//
|
|
|
|
// Copyright 2020 ArangoDB GmbH, Cologne, Germany
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
//
|
|
|
|
// Copyright holder is ArangoDB GmbH, Cologne, Germany
|
|
|
|
//
|
|
|
|
// Author Tomasz Mielech <tomasz@arangodb.com>
|
|
|
|
//
|
|
|
|
|
|
|
|
package reconcile
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
|
2020-06-08 11:30:32 +00:00
|
|
|
"github.com/arangodb/kube-arangodb/pkg/deployment/resources/inspector"
|
|
|
|
"github.com/arangodb/kube-arangodb/pkg/util/k8sutil"
|
|
|
|
|
2020-06-03 10:44:10 +00:00
|
|
|
backupv1 "github.com/arangodb/kube-arangodb/pkg/apis/backup/v1"
|
2020-05-13 12:18:52 +00:00
|
|
|
api "github.com/arangodb/kube-arangodb/pkg/apis/deployment/v1"
|
2020-07-15 08:41:42 +00:00
|
|
|
"github.com/arangodb/kube-arangodb/pkg/deployment/pod"
|
2020-05-13 12:18:52 +00:00
|
|
|
"github.com/rs/zerolog"
|
|
|
|
)
|
|
|
|
|
2020-07-15 08:41:42 +00:00
|
|
|
const secretActionParam = "secret"
|
|
|
|
|
2020-06-08 11:30:32 +00:00
|
|
|
func createRestorePlan(ctx context.Context,
|
|
|
|
log zerolog.Logger, apiObject k8sutil.APIObject,
|
|
|
|
spec api.DeploymentSpec, status api.DeploymentStatus,
|
|
|
|
cachedStatus inspector.Inspector, context PlanBuilderContext) api.Plan {
|
2020-05-13 12:18:52 +00:00
|
|
|
if spec.RestoreFrom == nil && status.Restore != nil {
|
|
|
|
return api.Plan{
|
|
|
|
api.NewAction(api.ActionTypeBackupRestoreClean, api.ServerGroupUnknown, ""),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if spec.RestoreFrom != nil && status.Restore == nil {
|
2020-06-08 11:30:32 +00:00
|
|
|
backup, err := context.GetBackup(spec.GetRestoreFrom())
|
2020-05-13 12:18:52 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Warn().Err(err).Msg("Backup not found")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if backup.Status.Backup == nil {
|
|
|
|
log.Warn().Msg("Backup not yet ready")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-07-15 08:41:42 +00:00
|
|
|
if spec.RocksDB.IsEncrypted() {
|
|
|
|
if ok, p := createRestorePlanEncryption(ctx, log, spec, status, context, backup); !ok {
|
|
|
|
return nil
|
|
|
|
} else if !p.IsEmpty() {
|
|
|
|
return p
|
|
|
|
}
|
|
|
|
|
|
|
|
if !status.Hashes.Encryption.Propagated {
|
|
|
|
log.Warn().Msg("Backup not able to be restored in non propagated state")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-13 12:18:52 +00:00
|
|
|
return api.Plan{
|
|
|
|
api.NewAction(api.ActionTypeBackupRestore, api.ServerGroupUnknown, ""),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2020-06-03 10:44:10 +00:00
|
|
|
|
2020-07-15 08:41:42 +00:00
|
|
|
func createRestorePlanEncryption(ctx context.Context, log zerolog.Logger, spec api.DeploymentSpec, status api.DeploymentStatus, builderCtx PlanBuilderContext, backup *backupv1.ArangoBackup) (bool, api.Plan) {
|
2020-06-03 10:44:10 +00:00
|
|
|
if spec.RestoreEncryptionSecret != nil {
|
|
|
|
if !spec.RocksDB.IsEncrypted() {
|
2020-07-15 08:41:42 +00:00
|
|
|
return true, nil
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if i := status.CurrentImage; i == nil || !i.Enterprise || i.ArangoDBVersion.CompareTo("3.7.0") < 0 {
|
2020-07-15 08:41:42 +00:00
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if !status.Hashes.Encryption.Propagated {
|
|
|
|
return false, nil
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
secret := *spec.RestoreEncryptionSecret
|
|
|
|
|
|
|
|
// Additional logic to do restore with encryption key
|
2020-06-05 13:46:01 +00:00
|
|
|
name, _, exists, err := pod.GetEncryptionKey(builderCtx.SecretsInterface(), secret)
|
2020-06-03 10:44:10 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Err(err).Msgf("Unable to fetch encryption key")
|
2020-07-15 08:41:42 +00:00
|
|
|
return false, nil
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|
|
|
|
|
2020-06-05 13:46:01 +00:00
|
|
|
if !exists {
|
|
|
|
log.Error().Msgf("Unable to fetch encryption key - key is empty or missing")
|
2020-07-15 08:41:42 +00:00
|
|
|
return false, nil
|
2020-06-05 13:46:01 +00:00
|
|
|
}
|
|
|
|
|
2020-07-15 08:41:42 +00:00
|
|
|
if !status.Hashes.Encryption.Keys.ContainsSHA256(name) {
|
|
|
|
return true, api.Plan{
|
|
|
|
api.NewAction(api.ActionTypeEncryptionKeyPropagated, api.ServerGroupUnknown, "").AddParam(propagated, conditionFalse),
|
|
|
|
api.NewAction(api.ActionTypeEncryptionKeyAdd, api.ServerGroupUnknown, "").AddParam(secretActionParam, secret),
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-15 08:41:42 +00:00
|
|
|
return true, nil
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|
|
|
|
|
2020-07-15 08:41:42 +00:00
|
|
|
return true, nil
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|