1
0
Fork 0
mirror of https://github.com/arangodb/kube-arangodb.git synced 2024-12-14 11:57:37 +00:00
kube-arangodb/pkg/deployment/reconcile/plan_builder_restore.go

122 lines
3.5 KiB
Go
Raw Normal View History

2020-05-13 12:18:52 +00:00
//
// DISCLAIMER
//
// Copyright 2020 ArangoDB GmbH, Cologne, Germany
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// Copyright holder is ArangoDB GmbH, Cologne, Germany
//
// Author Tomasz Mielech <tomasz@arangodb.com>
//
package reconcile
import (
"context"
"github.com/arangodb/kube-arangodb/pkg/deployment/resources/inspector"
"github.com/arangodb/kube-arangodb/pkg/util/k8sutil"
backupv1 "github.com/arangodb/kube-arangodb/pkg/apis/backup/v1"
2020-05-13 12:18:52 +00:00
api "github.com/arangodb/kube-arangodb/pkg/apis/deployment/v1"
"github.com/arangodb/kube-arangodb/pkg/deployment/pod"
2020-05-13 12:18:52 +00:00
"github.com/rs/zerolog"
)
const secretActionParam = "secret"
func createRestorePlan(ctx context.Context,
log zerolog.Logger, apiObject k8sutil.APIObject,
spec api.DeploymentSpec, status api.DeploymentStatus,
cachedStatus inspector.Inspector, context PlanBuilderContext) api.Plan {
2020-05-13 12:18:52 +00:00
if spec.RestoreFrom == nil && status.Restore != nil {
return api.Plan{
api.NewAction(api.ActionTypeBackupRestoreClean, api.ServerGroupUnknown, ""),
}
}
if spec.RestoreFrom != nil && status.Restore == nil {
backup, err := context.GetBackup(spec.GetRestoreFrom())
2020-05-13 12:18:52 +00:00
if err != nil {
log.Warn().Err(err).Msg("Backup not found")
return nil
}
if backup.Status.Backup == nil {
log.Warn().Msg("Backup not yet ready")
return nil
}
if spec.RocksDB.IsEncrypted() {
if ok, p := createRestorePlanEncryption(ctx, log, spec, status, context, backup); !ok {
return nil
} else if !p.IsEmpty() {
return p
}
if !status.Hashes.Encryption.Propagated {
log.Warn().Msg("Backup not able to be restored in non propagated state")
return nil
}
}
2020-05-13 12:18:52 +00:00
return api.Plan{
api.NewAction(api.ActionTypeBackupRestore, api.ServerGroupUnknown, ""),
}
}
return nil
}
func createRestorePlanEncryption(ctx context.Context, log zerolog.Logger, spec api.DeploymentSpec, status api.DeploymentStatus, builderCtx PlanBuilderContext, backup *backupv1.ArangoBackup) (bool, api.Plan) {
if spec.RestoreEncryptionSecret != nil {
if !spec.RocksDB.IsEncrypted() {
return true, nil
}
if i := status.CurrentImage; i == nil || !i.Enterprise || i.ArangoDBVersion.CompareTo("3.7.0") < 0 {
return true, nil
}
if !status.Hashes.Encryption.Propagated {
return false, nil
}
secret := *spec.RestoreEncryptionSecret
// Additional logic to do restore with encryption key
name, _, exists, err := pod.GetEncryptionKey(builderCtx.SecretsInterface(), secret)
if err != nil {
log.Err(err).Msgf("Unable to fetch encryption key")
return false, nil
}
if !exists {
log.Error().Msgf("Unable to fetch encryption key - key is empty or missing")
return false, nil
}
if !status.Hashes.Encryption.Keys.ContainsSHA256(name) {
return true, api.Plan{
api.NewAction(api.ActionTypeEncryptionKeyPropagated, api.ServerGroupUnknown, "").AddParam(propagated, conditionFalse),
api.NewAction(api.ActionTypeEncryptionKeyAdd, api.ServerGroupUnknown, "").AddParam(secretActionParam, secret),
}
}
return true, nil
}
return true, nil
}