1
0
Fork 0
mirror of https://github.com/arangodb/kube-arangodb.git synced 2024-12-14 11:57:37 +00:00
kube-arangodb/pkg/deployment/reconcile/plan_builder_restore.go

131 lines
3.6 KiB
Go
Raw Normal View History

2020-05-13 12:18:52 +00:00
//
// DISCLAIMER
//
2022-01-10 11:35:49 +00:00
// Copyright 2016-2022 ArangoDB GmbH, Cologne, Germany
2020-05-13 12:18:52 +00:00
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// Copyright holder is ArangoDB GmbH, Cologne, Germany
//
package reconcile
import (
"context"
api "github.com/arangodb/kube-arangodb/pkg/apis/deployment/v1"
"github.com/arangodb/kube-arangodb/pkg/deployment/actions"
"github.com/arangodb/kube-arangodb/pkg/deployment/features"
"github.com/arangodb/kube-arangodb/pkg/deployment/pod"
"github.com/arangodb/kube-arangodb/pkg/util/k8sutil"
2020-05-13 12:18:52 +00:00
)
const secretActionParam = "secret"
2022-06-14 07:26:07 +00:00
func (r *Reconciler) createRestorePlan(ctx context.Context, apiObject k8sutil.APIObject,
spec api.DeploymentSpec, status api.DeploymentStatus,
context PlanBuilderContext) api.Plan {
2020-05-13 12:18:52 +00:00
if spec.RestoreFrom == nil && status.Restore != nil {
return api.Plan{
actions.NewClusterAction(api.ActionTypeBackupRestoreClean),
2020-05-13 12:18:52 +00:00
}
}
if spec.RestoreFrom != nil && status.Restore == nil {
2021-04-26 08:30:06 +00:00
backup, err := context.GetBackup(ctx, spec.GetRestoreFrom())
2020-05-13 12:18:52 +00:00
if err != nil {
2022-06-14 07:26:07 +00:00
r.planLogger.Err(err).Warn("Backup not found")
2020-05-13 12:18:52 +00:00
return nil
}
if backup.Status.Backup == nil {
2022-06-14 07:26:07 +00:00
r.planLogger.Warn("Backup not yet ready")
2020-05-13 12:18:52 +00:00
return nil
}
if spec.RocksDB.IsEncrypted() {
2022-06-14 07:26:07 +00:00
if ok, p := r.createRestorePlanEncryption(ctx, spec, status, context); !ok {
return nil
} else if !p.IsEmpty() {
return p
}
2020-07-21 07:32:02 +00:00
if i := status.CurrentImage; i != nil && features.EncryptionRotation().Supported(i.ArangoDBVersion, i.Enterprise) {
if !status.Hashes.Encryption.Propagated {
2022-06-14 07:26:07 +00:00
r.planLogger.Warn("Backup not able to be restored in non propagated state")
2020-07-21 07:32:02 +00:00
return nil
}
}
}
return restorePlan(spec)
2020-05-13 12:18:52 +00:00
}
return nil
}
func restorePlan(spec api.DeploymentSpec) api.Plan {
p := api.Plan{
actions.NewClusterAction(api.ActionTypeBackupRestore),
}
switch spec.Mode.Get() {
case api.DeploymentModeActiveFailover:
p = withMaintenance(p...)
}
return p
}
2022-06-14 07:26:07 +00:00
func (r *Reconciler) createRestorePlanEncryption(ctx context.Context, spec api.DeploymentSpec, status api.DeploymentStatus, builderCtx PlanBuilderContext) (bool, api.Plan) {
if spec.RestoreEncryptionSecret != nil {
if !spec.RocksDB.IsEncrypted() {
return true, nil
}
2020-07-21 07:32:02 +00:00
if i := status.CurrentImage; i == nil || !features.EncryptionRotation().Supported(i.ArangoDBVersion, i.Enterprise) {
return false, nil
}
if !status.Hashes.Encryption.Propagated {
return false, nil
}
secret := *spec.RestoreEncryptionSecret
// Additional logic to do restore with encryption key
name, _, exists, err := pod.GetEncryptionKey(ctx, builderCtx.ACS().CurrentClusterCache().Secret().V1().Read(), secret)
if err != nil {
2022-06-14 07:26:07 +00:00
r.planLogger.Err(err).Error("Unable to fetch encryption key")
return false, nil
}
if !exists {
2022-06-14 07:26:07 +00:00
r.planLogger.Error("Unable to fetch encryption key - key is empty or missing")
return false, nil
}
if !status.Hashes.Encryption.Keys.ContainsSHA256(name) {
return true, api.Plan{
actions.NewClusterAction(api.ActionTypeEncryptionKeyPropagated).AddParam(propagated, conditionFalse),
actions.NewClusterAction(api.ActionTypeEncryptionKeyAdd).AddParam(secretActionParam, secret),
}
}
return true, nil
}
return true, nil
}