v2/api/kusto/customizations/database_extensions.go (33 lines of code) (raw):
/*
* Copyright (c) Microsoft Corporation.
* Licensed under the MIT license.
*/
package customizations
import (
"context"
"fmt"
"github.com/go-logr/logr"
kusto "github.com/Azure/azure-service-operator/v2/api/kusto/v1api20230815/storage"
"github.com/Azure/azure-service-operator/v2/internal/genericarmclient"
"github.com/Azure/azure-service-operator/v2/internal/resolver"
"github.com/Azure/azure-service-operator/v2/pkg/genruntime"
"github.com/Azure/azure-service-operator/v2/pkg/genruntime/extensions"
)
var _ extensions.PreReconciliationChecker = &ClusterExtension{}
// PreReconcileCheck is called before the reconciliation of the resource to see if the cluster
// is in a state that will allow reconciliation to proceed.
// We can't try to create/update a Database unless the cluster is in a state that allows it.
func (ext *DatabaseExtension) PreReconcileCheck(
ctx context.Context,
obj genruntime.MetaObject,
owner genruntime.MetaObject,
resourceResolver *resolver.Resolver,
armClient_ *genericarmclient.GenericClient,
log logr.Logger,
next extensions.PreReconcileCheckFunc,
) (extensions.PreReconcileCheckResult, error) {
// Check to see if the owning cluster is in a state that will block us from reconciling
// Owner nil can happen if the owner of the database is referenced by armID
if owner != nil {
if cluster, ok := owner.(*kusto.Cluster); ok {
// If our owning *cluster* is in a state that will reject any PUT, then we should skip
// reconciliation of the database as there's no point in even trying.
// One way this can happen is when we reconcile the cluster, putting it into an `Updating`
// state for a period. While it's in that state, we can't even try to reconcile the database as
// the operation will fail with a `Conflict` error.
// Checking the state of our owning cluster allows us to "play nice with others" and not use up
// request quota attempting to make changes when we already know those attempts will fail.
state := cluster.Status.ProvisioningState
if state != nil && clusterProvisioningStateBlocksReconciliation(state) {
return extensions.BlockReconcile(
fmt.Sprintf("Owning cluster is in provisioning state %q", *state)),
nil
}
}
}
return next(ctx, obj, owner, resourceResolver, armClient_, log)
}