2020-05-13 12:18:52 +00:00
|
|
|
//
|
|
|
|
// DISCLAIMER
|
|
|
|
//
|
2022-01-10 11:35:49 +00:00
|
|
|
// Copyright 2016-2022 ArangoDB GmbH, Cologne, Germany
|
2020-05-13 12:18:52 +00:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
//
|
|
|
|
// Copyright holder is ArangoDB GmbH, Cologne, Germany
|
|
|
|
//
|
|
|
|
|
|
|
|
package reconcile
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
|
|
|
|
api "github.com/arangodb/kube-arangodb/pkg/apis/deployment/v1"
|
2022-02-16 13:29:24 +00:00
|
|
|
"github.com/arangodb/kube-arangodb/pkg/deployment/actions"
|
2022-07-11 11:49:47 +00:00
|
|
|
"github.com/arangodb/kube-arangodb/pkg/deployment/features"
|
2020-07-15 08:41:42 +00:00
|
|
|
"github.com/arangodb/kube-arangodb/pkg/deployment/pod"
|
2022-05-15 16:11:41 +00:00
|
|
|
"github.com/arangodb/kube-arangodb/pkg/util/k8sutil"
|
2020-05-13 12:18:52 +00:00
|
|
|
)
|
|
|
|
|
2020-07-15 08:41:42 +00:00
|
|
|
const secretActionParam = "secret"
|
|
|
|
|
2022-06-14 07:26:07 +00:00
|
|
|
func (r *Reconciler) createRestorePlan(ctx context.Context, apiObject k8sutil.APIObject,
|
2020-06-08 11:30:32 +00:00
|
|
|
spec api.DeploymentSpec, status api.DeploymentStatus,
|
2022-05-15 16:11:41 +00:00
|
|
|
context PlanBuilderContext) api.Plan {
|
2020-05-13 12:18:52 +00:00
|
|
|
if spec.RestoreFrom == nil && status.Restore != nil {
|
|
|
|
return api.Plan{
|
2022-02-16 13:29:24 +00:00
|
|
|
actions.NewClusterAction(api.ActionTypeBackupRestoreClean),
|
2020-05-13 12:18:52 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if spec.RestoreFrom != nil && status.Restore == nil {
|
2021-04-26 08:30:06 +00:00
|
|
|
backup, err := context.GetBackup(ctx, spec.GetRestoreFrom())
|
2020-05-13 12:18:52 +00:00
|
|
|
if err != nil {
|
2022-06-14 07:26:07 +00:00
|
|
|
r.planLogger.Err(err).Warn("Backup not found")
|
2020-05-13 12:18:52 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if backup.Status.Backup == nil {
|
2022-06-14 07:26:07 +00:00
|
|
|
r.planLogger.Warn("Backup not yet ready")
|
2020-05-13 12:18:52 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-07-15 08:41:42 +00:00
|
|
|
if spec.RocksDB.IsEncrypted() {
|
2022-06-14 07:26:07 +00:00
|
|
|
if ok, p := r.createRestorePlanEncryption(ctx, spec, status, context); !ok {
|
2020-07-15 08:41:42 +00:00
|
|
|
return nil
|
|
|
|
} else if !p.IsEmpty() {
|
|
|
|
return p
|
|
|
|
}
|
|
|
|
|
2020-07-21 07:32:02 +00:00
|
|
|
if i := status.CurrentImage; i != nil && features.EncryptionRotation().Supported(i.ArangoDBVersion, i.Enterprise) {
|
|
|
|
if !status.Hashes.Encryption.Propagated {
|
2022-06-14 07:26:07 +00:00
|
|
|
r.planLogger.Warn("Backup not able to be restored in non propagated state")
|
2020-07-21 07:32:02 +00:00
|
|
|
return nil
|
|
|
|
}
|
2020-07-15 08:41:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-15 12:07:33 +00:00
|
|
|
return restorePlan(spec)
|
2020-05-13 12:18:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2020-06-03 10:44:10 +00:00
|
|
|
|
2021-07-15 12:07:33 +00:00
|
|
|
func restorePlan(spec api.DeploymentSpec) api.Plan {
|
2020-09-03 06:53:56 +00:00
|
|
|
p := api.Plan{
|
2022-02-16 13:29:24 +00:00
|
|
|
actions.NewClusterAction(api.ActionTypeBackupRestore),
|
2020-09-03 06:53:56 +00:00
|
|
|
}
|
|
|
|
|
2021-07-15 12:07:33 +00:00
|
|
|
switch spec.Mode.Get() {
|
2020-09-03 06:53:56 +00:00
|
|
|
case api.DeploymentModeActiveFailover:
|
|
|
|
p = withMaintenance(p...)
|
|
|
|
}
|
|
|
|
|
|
|
|
return p
|
|
|
|
}
|
|
|
|
|
2022-06-14 07:26:07 +00:00
|
|
|
func (r *Reconciler) createRestorePlanEncryption(ctx context.Context, spec api.DeploymentSpec, status api.DeploymentStatus, builderCtx PlanBuilderContext) (bool, api.Plan) {
|
2022-03-23 22:19:36 +00:00
|
|
|
|
2020-06-03 10:44:10 +00:00
|
|
|
if spec.RestoreEncryptionSecret != nil {
|
|
|
|
if !spec.RocksDB.IsEncrypted() {
|
2020-07-15 08:41:42 +00:00
|
|
|
return true, nil
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|
|
|
|
|
2020-07-21 07:32:02 +00:00
|
|
|
if i := status.CurrentImage; i == nil || !features.EncryptionRotation().Supported(i.ArangoDBVersion, i.Enterprise) {
|
|
|
|
return false, nil
|
2020-07-15 08:41:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if !status.Hashes.Encryption.Propagated {
|
|
|
|
return false, nil
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
secret := *spec.RestoreEncryptionSecret
|
|
|
|
|
|
|
|
// Additional logic to do restore with encryption key
|
2022-05-15 16:11:41 +00:00
|
|
|
name, _, exists, err := pod.GetEncryptionKey(ctx, builderCtx.ACS().CurrentClusterCache().Secret().V1().Read(), secret)
|
2020-06-03 10:44:10 +00:00
|
|
|
if err != nil {
|
2022-06-14 07:26:07 +00:00
|
|
|
r.planLogger.Err(err).Error("Unable to fetch encryption key")
|
2020-07-15 08:41:42 +00:00
|
|
|
return false, nil
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|
|
|
|
|
2020-06-05 13:46:01 +00:00
|
|
|
if !exists {
|
2022-06-14 07:26:07 +00:00
|
|
|
r.planLogger.Error("Unable to fetch encryption key - key is empty or missing")
|
2020-07-15 08:41:42 +00:00
|
|
|
return false, nil
|
2020-06-05 13:46:01 +00:00
|
|
|
}
|
|
|
|
|
2020-07-15 08:41:42 +00:00
|
|
|
if !status.Hashes.Encryption.Keys.ContainsSHA256(name) {
|
|
|
|
return true, api.Plan{
|
2022-02-16 13:29:24 +00:00
|
|
|
actions.NewClusterAction(api.ActionTypeEncryptionKeyPropagated).AddParam(propagated, conditionFalse),
|
|
|
|
actions.NewClusterAction(api.ActionTypeEncryptionKeyAdd).AddParam(secretActionParam, secret),
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-15 08:41:42 +00:00
|
|
|
return true, nil
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|
|
|
|
|
2020-07-15 08:41:42 +00:00
|
|
|
return true, nil
|
2020-06-03 10:44:10 +00:00
|
|
|
}
|