v2/api/documentdb/customizations/database_account_extensions.go (165 lines of code) (raw):
/*
* Copyright (c) Microsoft Corporation.
* Licensed under the MIT license.
*/
package customizations
import (
"context"
"strings"
. "github.com/Azure/azure-service-operator/v2/internal/logging"
"github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/cosmos/armcosmos"
"github.com/go-logr/logr"
"github.com/rotisserie/eris"
v1 "k8s.io/api/core/v1"
"sigs.k8s.io/controller-runtime/pkg/conversion"
documentdb "github.com/Azure/azure-service-operator/v2/api/documentdb/v1api20240815/storage"
"github.com/Azure/azure-service-operator/v2/internal/genericarmclient"
"github.com/Azure/azure-service-operator/v2/internal/resolver"
"github.com/Azure/azure-service-operator/v2/internal/set"
"github.com/Azure/azure-service-operator/v2/internal/util/to"
"github.com/Azure/azure-service-operator/v2/pkg/genruntime"
"github.com/Azure/azure-service-operator/v2/pkg/genruntime/core"
"github.com/Azure/azure-service-operator/v2/pkg/genruntime/extensions"
"github.com/Azure/azure-service-operator/v2/pkg/genruntime/secrets"
)
const (
primaryMasterKeyKey = "primaryMasterKey"
secondaryMasterKeyKey = "secondaryMasterKey"
primaryReadonlyMasterKeyKey = "primaryReadonlyMasterKey"
secondaryReadonlyMasterKeyKey = "secondaryReadonlyMasterKey"
)
var _ genruntime.KubernetesSecretExporter = &DatabaseAccountExtension{}
func (ext *DatabaseAccountExtension) ExportKubernetesSecrets(
ctx context.Context,
obj genruntime.MetaObject,
additionalSecrets set.Set[string],
armClient *genericarmclient.GenericClient,
log logr.Logger,
) (*genruntime.KubernetesSecretExportResult, error) {
// This has to be the current hub storage version. It will need to be updated
// if the hub storage version changes.
typedObj, ok := obj.(*documentdb.DatabaseAccount)
if !ok {
return nil, eris.Errorf("cannot run on unknown resource type %T, expected *documentdb.DatabaseAccount", obj)
}
// Type assert that we are the hub type. This will fail to compile if
// the hub type has been changed but this extension has not
var _ conversion.Hub = typedObj
primarySecrets, hasEndpoints := secretsSpecified(typedObj)
requestedSecrets := set.Union(primarySecrets, additionalSecrets)
if len(requestedSecrets) == 0 && !hasEndpoints {
log.V(Debug).Info("No secrets retrieval to perform as operatorSpec is empty")
return nil, nil
}
id, err := genruntime.GetAndParseResourceID(typedObj)
if err != nil {
return nil, err
}
var keys armcosmos.DatabaseAccountListKeysResult
// Only bother calling ListKeys if there are secrets to retrieve
if len(requestedSecrets) > 0 {
subscription := id.SubscriptionID
// Using armClient.ClientOptions() here ensures we share the same HTTP connection, so this is not opening a new
// connection each time through
var acctClient *armcosmos.DatabaseAccountsClient
acctClient, err = armcosmos.NewDatabaseAccountsClient(subscription, armClient.Creds(), armClient.ClientOptions())
if err != nil {
return nil, eris.Wrapf(err, "failed to create new DatabaseAccountClient")
}
// TODO: There is a ListReadOnlyKeys API that requires less permissions. We should consider determining
// TODO: that we don't need to call the ListKeys API and install call the listReadOnlyKeys API.
var resp armcosmos.DatabaseAccountsClientListKeysResponse
resp, err = acctClient.ListKeys(ctx, id.ResourceGroupName, typedObj.AzureName(), nil)
if err != nil {
return nil, eris.Wrapf(err, "failed listing keys")
}
keys = resp.DatabaseAccountListKeysResult
}
resolvedSecrets := map[string]string{}
if to.Value(keys.PrimaryMasterKey) != "" {
resolvedSecrets[primaryMasterKeyKey] = to.Value(keys.PrimaryMasterKey)
}
if to.Value(keys.SecondaryMasterKey) != "" {
resolvedSecrets[secondaryMasterKeyKey] = to.Value(keys.SecondaryMasterKey)
}
if to.Value(keys.PrimaryReadonlyMasterKey) != "" {
resolvedSecrets[primaryReadonlyMasterKeyKey] = to.Value(keys.PrimaryReadonlyMasterKey)
}
if to.Value(keys.SecondaryReadonlyMasterKey) != "" {
resolvedSecrets[secondaryReadonlyMasterKeyKey] = to.Value(keys.SecondaryReadonlyMasterKey)
}
secretSlice, err := secretsToWrite(typedObj, keys)
if err != nil {
return nil, err
}
return &genruntime.KubernetesSecretExportResult{
Objs: secrets.SliceToClientObjectSlice(secretSlice),
RawSecrets: secrets.SelectSecrets(additionalSecrets, resolvedSecrets),
}, nil
}
func secretsSpecified(obj *documentdb.DatabaseAccount) (set.Set[string], bool) {
if obj.Spec.OperatorSpec == nil || obj.Spec.OperatorSpec.Secrets == nil {
return nil, false
}
specSecrets := obj.Spec.OperatorSpec.Secrets
hasEndpoints := false
result := make(set.Set[string])
if specSecrets.PrimaryMasterKey != nil {
result.Add(primaryMasterKeyKey)
}
if specSecrets.SecondaryMasterKey != nil {
result.Add(secondaryMasterKeyKey)
}
if specSecrets.PrimaryReadonlyMasterKey != nil {
result.Add(primaryReadonlyMasterKeyKey)
}
if specSecrets.SecondaryReadonlyMasterKey != nil {
result.Add(secondaryReadonlyMasterKeyKey)
}
if specSecrets.DocumentEndpoint != nil {
hasEndpoints = true
}
return result, hasEndpoints
}
func secretsToWrite(obj *documentdb.DatabaseAccount, accessKeys armcosmos.DatabaseAccountListKeysResult) ([]*v1.Secret, error) {
operatorSpecSecrets := obj.Spec.OperatorSpec.Secrets
if operatorSpecSecrets == nil {
return nil, nil
}
collector := secrets.NewCollector(obj.Namespace)
collector.AddValue(operatorSpecSecrets.PrimaryMasterKey, to.Value(accessKeys.PrimaryMasterKey))
collector.AddValue(operatorSpecSecrets.SecondaryMasterKey, to.Value(accessKeys.SecondaryMasterKey))
collector.AddValue(operatorSpecSecrets.PrimaryReadonlyMasterKey, to.Value(accessKeys.PrimaryReadonlyMasterKey))
collector.AddValue(operatorSpecSecrets.SecondaryReadonlyMasterKey, to.Value(accessKeys.SecondaryReadonlyMasterKey))
collector.AddValue(operatorSpecSecrets.DocumentEndpoint, to.Value(obj.Status.DocumentEndpoint))
return collector.Values()
}
var _ extensions.ErrorClassifier = &DatabaseAccountExtension{}
// ClassifyError evaluates the provided error, returning whether it is fatal or can be retried.
// A "ServiceUnavailable" error would usually be retryable, but in the case of DatabaseAccount, when coupled with
// a "high demand" message, it means that the region is capacity constrained and cannot have DatabseAccounts allocated.
// If we retry on this error CosmosDB will start returning a new BadRequest error stating
// DatabaseAccount is in a failed provisioning state because the previous attempt to create it was not successful.
// Please delete the previous instance before attempting to recreate this account."
// Since we can't retry anyway, we mark the original ServiceUnavailable error as fatal so the user has a clearer error message.
// cloudError is the error returned from ARM.
// apiVersion is the ARM API version used for the request.
// log is a logger than can be used for telemetry.
// next is the next implementation to call.
func (ext *DatabaseAccountExtension) ClassifyError(
cloudError *genericarmclient.CloudError,
apiVersion string,
log logr.Logger,
next extensions.ErrorClassifierFunc,
) (core.CloudErrorDetails, error) {
details, err := next(cloudError)
if err != nil {
return core.CloudErrorDetails{}, err
}
if isCapacityError(cloudError) {
details.Classification = core.ErrorFatal
}
return details, nil
}
func isCapacityError(err *genericarmclient.CloudError) bool {
if err == nil {
return false
}
return err.Code() == "ServiceUnavailable" && strings.Contains(err.Message(), "currently experiencing high demand")
}
var _ extensions.PreReconciliationChecker = &DatabaseAccountExtension{}
// PreReconcileCheck does a pre-reconcile check to see if the resource is in a state that can be reconciled.
// ARM resources should implement this to avoid reconciliation attempts that cannot possibly succeed.
// Returns ProceedWithReconcile if the reconciliation should go ahead.
// Returns BlockReconcile and a human-readable reason if the reconciliation should be skipped.
// ctx is the current operation context.
// obj is the resource about to be reconciled. The resource's State will be freshly updated.
// kubeClient allows access to the cluster for any required queries.
// armClient allows access to ARM for any required queries.
// log is the logger for the current operation.
// next is the next (nested) implementation to call.
func (ext *DatabaseAccountExtension) PreReconcileCheck(
ctx context.Context,
obj genruntime.MetaObject,
owner genruntime.MetaObject,
resourceResolver *resolver.Resolver,
armClient *genericarmclient.GenericClient,
log logr.Logger,
next extensions.PreReconcileCheckFunc,
) (extensions.PreReconcileCheckResult, error) {
// This has to be the current hub storage version of the account.
// It will need to be updated if the hub storage version changes.
account, ok := obj.(*documentdb.DatabaseAccount)
if !ok {
return extensions.PreReconcileCheckResult{}, eris.Errorf("cannot run on unknown resource type %T, expected *documentdb.DatabaseAccount", obj)
}
// Type assert that we are the hub type. This will fail to compile if
// the hub type has been changed but this extension has not
var _ conversion.Hub = account
// If the account is already deleting, we have to wait for that to finish
// before trying anything else
if account.Status.ProvisioningState != nil && strings.EqualFold(*account.Status.ProvisioningState, "Deleting") {
return extensions.BlockReconcile("reconcile blocked while account is at status deleting"), nil
}
return next(ctx, obj, owner, resourceResolver, armClient, log)
}