generated from SAP/repository-template
-
Notifications
You must be signed in to change notification settings - Fork 4
Expand file tree
/
Copy pathbinding.go
More file actions
116 lines (104 loc) · 3.7 KB
/
binding.go
File metadata and controls
116 lines (104 loc) · 3.7 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
/*
SPDX-FileCopyrightText: 2025 SAP SE or an SAP affiliate company and valkey-operator contributors
SPDX-License-Identifier: Apache-2.0
*/
package operator
import (
"bytes"
"context"
"encoding/json"
"fmt"
"text/template"
"github.com/Masterminds/sprig/v3"
operatorv1alpha1 "github.com/sap/valkey-operator/api/v1alpha1"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/types"
"sigs.k8s.io/controller-runtime/pkg/client"
kyaml "sigs.k8s.io/yaml"
)
func reconcileBinding(ctx context.Context, client client.Client, valkey *operatorv1alpha1.Valkey) error {
params := make(map[string]any)
// Use cluster domain from spec, defaulting to "cluster.local" for backward compatibility
clusterDomain := valkey.Spec.ClusterDomain
if clusterDomain == "" {
clusterDomain = "cluster.local"
}
if valkey.Spec.Sentinel != nil && valkey.Spec.Sentinel.Enabled {
params["sentinelEnabled"] = true
params["host"] = fmt.Sprintf("valkey-%s.%s.svc.%s", valkey.Name, valkey.Namespace, clusterDomain)
params["port"] = 6379
params["sentinelHost"] = fmt.Sprintf("valkey-%s.%s.svc.%s", valkey.Name, valkey.Namespace, clusterDomain)
params["sentinelPort"] = 26379
params["primaryName"] = "myprimary"
} else {
params["primaryHost"] = fmt.Sprintf("valkey-%s-primary.%s.svc.%s", valkey.Name, valkey.Namespace, clusterDomain)
params["primaryPort"] = 6379
params["replicaHost"] = fmt.Sprintf("valkey-%s-replicas.%s.svc.%s", valkey.Name, valkey.Namespace, clusterDomain)
params["replicaPort"] = 6379
}
authSecret := &corev1.Secret{}
authSecretName := fmt.Sprintf("valkey-%s", valkey.Name)
if err := client.Get(ctx, types.NamespacedName{Namespace: valkey.Namespace, Name: authSecretName}, authSecret); err != nil {
return err
}
params["password"] = string(authSecret.Data["valkey-password"])
if valkey.Spec.TLS != nil && valkey.Spec.TLS.Enabled {
params["tlsEnabled"] = true
tlsSecret := &corev1.Secret{}
tlsSecretName := ""
if valkey.Spec.TLS.CertManager == nil {
tlsSecretName = fmt.Sprintf("valkey-%s-crt", valkey.Name)
} else {
tlsSecretName = fmt.Sprintf("valkey-%s-tls", valkey.Name)
}
if err := client.Get(ctx, types.NamespacedName{Namespace: valkey.Namespace, Name: tlsSecretName}, tlsSecret); err != nil {
return err
}
params["caData"] = string(tlsSecret.Data["ca.crt"])
}
var buf bytes.Buffer
t := template.New("binding.yaml").Option("missingkey=zero").Funcs(sprig.TxtFuncMap())
if valkey.Spec.Binding != nil && valkey.Spec.Binding.Template != nil {
if _, err := t.Parse(*valkey.Spec.Binding.Template); err != nil {
return err
}
} else {
if _, err := t.ParseFS(data, "data/binding.yaml"); err != nil {
return err
}
}
if err := t.Execute(&buf, params); err != nil {
return err
}
var bindingData map[string]any
if err := kyaml.Unmarshal(buf.Bytes(), &bindingData); err != nil {
return err
}
bindingSecret := &corev1.Secret{}
bindingSecretName := ""
if valkey.Spec.Binding != nil && valkey.Spec.Binding.SecretName != "" {
bindingSecretName = valkey.Spec.Binding.SecretName
} else {
bindingSecretName = fmt.Sprintf("valkey-%s-binding", valkey.Name)
}
if err := client.Get(ctx, types.NamespacedName{Namespace: valkey.Namespace, Name: bindingSecretName}, bindingSecret); err != nil {
return err
}
bindingSecret.Data = make(map[string][]byte)
for key, value := range bindingData {
if stringValue, ok := value.(string); ok {
bindingSecret.Data[key] = []byte(stringValue)
} else {
rawValue, err := json.Marshal(value)
if err != nil {
return err
}
bindingSecret.Data[key] = rawValue
}
}
// TODO: avoid this update call if not necessary (e.g. by checking if data have changed)
if err := client.Update(ctx, bindingSecret); err != nil {
return err
}
return nil
}