Skip to content

Commit eb7e719

Browse files
authored
Allow export of RedisEnterprise keys (#5010)
Fixes #4994.
1 parent 8f0cfd1 commit eb7e719

39 files changed

+2536
-440
lines changed
Lines changed: 126 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,126 @@
1+
/*
2+
* Copyright (c) Microsoft Corporation.
3+
* Licensed under the MIT license.
4+
*/
5+
6+
package customizations
7+
8+
import (
9+
"context"
10+
11+
. "github.com/Azure/azure-service-operator/v2/internal/logging"
12+
13+
"github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/redisenterprise/armredisenterprise"
14+
"github.com/go-logr/logr"
15+
"github.com/rotisserie/eris"
16+
v1 "k8s.io/api/core/v1"
17+
"sigs.k8s.io/controller-runtime/pkg/conversion"
18+
19+
redisenterprise "github.com/Azure/azure-service-operator/v2/api/cache/v1api20250401/storage"
20+
"github.com/Azure/azure-service-operator/v2/internal/genericarmclient"
21+
"github.com/Azure/azure-service-operator/v2/internal/set"
22+
"github.com/Azure/azure-service-operator/v2/internal/util/to"
23+
"github.com/Azure/azure-service-operator/v2/pkg/genruntime"
24+
"github.com/Azure/azure-service-operator/v2/pkg/genruntime/secrets"
25+
)
26+
27+
var _ genruntime.KubernetesSecretExporter = &RedisEnterpriseDatabaseExtension{}
28+
29+
func (ext *RedisEnterpriseDatabaseExtension) ExportKubernetesSecrets(
30+
ctx context.Context,
31+
obj genruntime.MetaObject,
32+
additionalSecrets set.Set[string],
33+
armClient *genericarmclient.GenericClient,
34+
log logr.Logger,
35+
) (*genruntime.KubernetesSecretExportResult, error) {
36+
// This has to be the current hub storage version. It will need to be updated
37+
// if the hub storage version changes.
38+
typedObj, ok := obj.(*redisenterprise.RedisEnterpriseDatabase)
39+
if !ok {
40+
return nil, eris.Errorf("cannot run on unknown resource type %T, expected *redisenterprise.RedisEnterpriseDatabase", obj)
41+
}
42+
43+
// Type assert that we are the hub type. This will fail to compile if
44+
// the hub type has been changed but this extension has not
45+
var _ conversion.Hub = typedObj
46+
47+
primarySecrets := redisEnterpriseSecretsSpecified(typedObj)
48+
requestedSecrets := set.Union(primarySecrets, additionalSecrets)
49+
if len(requestedSecrets) == 0 {
50+
log.V(Debug).Info("No secrets retrieval to perform as operatorSpec is empty")
51+
return nil, nil
52+
}
53+
54+
id, err := genruntime.GetAndParseResourceID(typedObj)
55+
if err != nil {
56+
return nil, err
57+
}
58+
59+
var accessKeys armredisenterprise.AccessKeys
60+
// Only bother calling ListKeys if there are secrets to retrieve
61+
if len(requestedSecrets) > 0 {
62+
subscription := id.SubscriptionID
63+
// Using armClient.ClientOptions() here ensures we share the same HTTP connection, so this is not opening a new
64+
// connection each time through
65+
var databaseClient *armredisenterprise.DatabasesClient
66+
databaseClient, err = armredisenterprise.NewDatabasesClient(subscription, armClient.Creds(), armClient.ClientOptions())
67+
if err != nil {
68+
return nil, eris.Wrapf(err, "failed to create new DatabasesClient")
69+
}
70+
71+
var resp armredisenterprise.DatabasesClientListKeysResponse
72+
resp, err = databaseClient.ListKeys(ctx, id.ResourceGroupName, id.Parent.Name, typedObj.AzureName(), nil)
73+
if err != nil {
74+
return nil, eris.Wrapf(err, "failed listing keys")
75+
}
76+
accessKeys = resp.AccessKeys
77+
}
78+
secretSlice, err := redisEnterpriseSecretsToWrite(typedObj, accessKeys)
79+
if err != nil {
80+
return nil, err
81+
}
82+
83+
resolvedSecrets := map[string]string{}
84+
if to.Value(accessKeys.PrimaryKey) != "" {
85+
resolvedSecrets[primaryKey] = to.Value(accessKeys.PrimaryKey)
86+
}
87+
if to.Value(accessKeys.SecondaryKey) != "" {
88+
resolvedSecrets[secondaryKey] = to.Value(accessKeys.SecondaryKey)
89+
}
90+
91+
return &genruntime.KubernetesSecretExportResult{
92+
Objs: secrets.SliceToClientObjectSlice(secretSlice),
93+
RawSecrets: secrets.SelectSecrets(additionalSecrets, resolvedSecrets),
94+
}, nil
95+
}
96+
97+
func redisEnterpriseSecretsSpecified(obj *redisenterprise.RedisEnterpriseDatabase) set.Set[string] {
98+
if obj.Spec.OperatorSpec == nil || obj.Spec.OperatorSpec.Secrets == nil {
99+
return nil
100+
}
101+
102+
secrets := obj.Spec.OperatorSpec.Secrets
103+
result := make(set.Set[string])
104+
105+
if secrets.PrimaryKey != nil {
106+
result.Add(primaryKey)
107+
}
108+
if secrets.SecondaryKey != nil {
109+
result.Add(secondaryKey)
110+
}
111+
112+
return result
113+
}
114+
115+
func redisEnterpriseSecretsToWrite(obj *redisenterprise.RedisEnterpriseDatabase, accessKeys armredisenterprise.AccessKeys) ([]*v1.Secret, error) {
116+
operatorSpecSecrets := obj.Spec.OperatorSpec.Secrets
117+
if operatorSpecSecrets == nil {
118+
return nil, nil
119+
}
120+
121+
collector := secrets.NewCollector(obj.Namespace)
122+
collector.AddValue(operatorSpecSecrets.PrimaryKey, to.Value(accessKeys.PrimaryKey))
123+
collector.AddValue(operatorSpecSecrets.SecondaryKey, to.Value(accessKeys.SecondaryKey))
124+
125+
return collector.Values()
126+
}

v2/api/cache/customizations/redis_extensions.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ func (ext *RedisExtension) ExportKubernetesSecrets(
5050
// the hub type has been changed but this extension has not
5151
var _ conversion.Hub = typedObj
5252

53-
primarySecrets, hasEndpoints := secretsSpecified(typedObj)
53+
primarySecrets, hasEndpoints := redisSecretsSpecified(typedObj)
5454
requestedSecrets := set.Union(primarySecrets, additionalSecrets)
5555
if len(requestedSecrets) == 0 && !hasEndpoints {
5656
log.V(Debug).Info("No secrets retrieval to perform as operatorSpec is empty")
@@ -71,7 +71,7 @@ func (ext *RedisExtension) ExportKubernetesSecrets(
7171
var redisClient *armredis.Client
7272
redisClient, err = armredis.NewClient(subscription, armClient.Creds(), armClient.ClientOptions())
7373
if err != nil {
74-
return nil, eris.Wrapf(err, "failed to create new new RedisClient")
74+
return nil, eris.Wrapf(err, "failed to create new RedisClient")
7575
}
7676

7777
var resp armredis.ClientListKeysResponse
@@ -81,7 +81,7 @@ func (ext *RedisExtension) ExportKubernetesSecrets(
8181
}
8282
accessKeys = resp.AccessKeys
8383
}
84-
secretSlice, err := secretsToWrite(typedObj, accessKeys)
84+
secretSlice, err := redisSecretsToWrite(typedObj, accessKeys)
8585
if err != nil {
8686
return nil, err
8787
}
@@ -100,7 +100,7 @@ func (ext *RedisExtension) ExportKubernetesSecrets(
100100
}, nil
101101
}
102102

103-
func secretsSpecified(obj *redis.Redis) (set.Set[string], bool) {
103+
func redisSecretsSpecified(obj *redis.Redis) (set.Set[string], bool) {
104104
if obj.Spec.OperatorSpec == nil || obj.Spec.OperatorSpec.Secrets == nil {
105105
return nil, false
106106
}
@@ -125,7 +125,7 @@ func secretsSpecified(obj *redis.Redis) (set.Set[string], bool) {
125125
return result, hasEndpoints
126126
}
127127

128-
func secretsToWrite(obj *redis.Redis, accessKeys armredis.AccessKeys) ([]*v1.Secret, error) {
128+
func redisSecretsToWrite(obj *redis.Redis, accessKeys armredis.AccessKeys) ([]*v1.Secret, error) {
129129
operatorSpecSecrets := obj.Spec.OperatorSpec.Secrets
130130
if operatorSpecSecrets == nil {
131131
return nil, nil

v2/api/cache/customizations/redis_extensions_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ func Test_SecretsSpecified_AllSecretsSpecifiedAllSecretsReturned(t *testing.T) {
2929
},
3030
},
3131
}
32-
secretNames, _ := secretsSpecified(obj)
32+
secretNames, _ := redisSecretsSpecified(obj)
3333
expectedTags := set.Set[string]{
3434
primaryKey: {},
3535
secondaryKey: {},

v2/api/cache/v1api20210301/redis_enterprise_database_types_gen.go

Lines changed: 92 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)