Files
mariadb-operator/internal/controller/grant_controller.go
2025-07-15 18:54:47 +02:00

162 lines
5.0 KiB
Go

package controller
import (
"context"
"fmt"
"slices"
mariadbv1alpha1 "github.com/mariadb-operator/mariadb-operator/api/v1alpha1"
condition "github.com/mariadb-operator/mariadb-operator/pkg/condition"
"github.com/mariadb-operator/mariadb-operator/pkg/controller/sql"
"github.com/mariadb-operator/mariadb-operator/pkg/refresolver"
sqlClient "github.com/mariadb-operator/mariadb-operator/pkg/sql"
"k8s.io/apimachinery/pkg/types"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
)
// GrantReconciler reconciles a Grant object
type GrantReconciler struct {
client.Client
RefResolver *refresolver.RefResolver
ConditionReady *condition.Ready
SqlOpts []sql.SqlOpt
}
func NewGrantReconciler(client client.Client, refResolver *refresolver.RefResolver, conditionReady *condition.Ready,
sqlOpts ...sql.SqlOpt) *GrantReconciler {
return &GrantReconciler{
Client: client,
RefResolver: refResolver,
ConditionReady: conditionReady,
SqlOpts: sqlOpts,
}
}
//+kubebuilder:rbac:groups=k8s.mariadb.com,resources=grants,verbs=get;list;watch;create;update;patch;delete
//+kubebuilder:rbac:groups=k8s.mariadb.com,resources=grants/status,verbs=get;update;patch
//+kubebuilder:rbac:groups=k8s.mariadb.com,resources=grants/finalizers,verbs=update
// Reconcile is part of the main kubernetes reconciliation loop which aims to
// move the current state of the cluster closer to the desired state.
func (r *GrantReconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
var grant mariadbv1alpha1.Grant
if err := r.Get(ctx, req.NamespacedName, &grant); err != nil {
return ctrl.Result{}, client.IgnoreNotFound(err)
}
wr := newWrappedGrantReconciler(r.Client, *r.RefResolver, &grant)
wf := newWrappedGrantFinalizer(r.Client, &grant)
tf := sql.NewSqlFinalizer(r.Client, wf, r.SqlOpts...)
tr := sql.NewSqlReconciler(r.Client, r.ConditionReady, wr, tf, r.SqlOpts...)
result, err := tr.Reconcile(ctx, &grant)
if err != nil {
return result, fmt.Errorf("error reconciling in TemplateReconciler: %v", err)
}
return result, nil
}
// SetupWithManager sets up the controller with the Manager.
func (r *GrantReconciler) SetupWithManager(ctx context.Context, mgr ctrl.Manager) error {
builder := ctrl.NewControllerManagedBy(mgr).
For(&mariadbv1alpha1.Grant{})
if err := mariadbv1alpha1.IndexGrant(ctx, mgr, builder, r.Client); err != nil {
return fmt.Errorf("error indexing Grant: %v", err)
}
return builder.Complete(r)
}
type wrappedGrantReconciler struct {
client.Client
refResolver *refresolver.RefResolver
grant *mariadbv1alpha1.Grant
}
func newWrappedGrantReconciler(client client.Client, refResolver refresolver.RefResolver,
grant *mariadbv1alpha1.Grant) sql.WrappedReconciler {
return &wrappedGrantReconciler{
Client: client,
refResolver: &refResolver,
grant: grant,
}
}
func (wr *wrappedGrantReconciler) Reconcile(ctx context.Context, mdbClient *sqlClient.Client) error {
var opts []sqlClient.GrantOption
if wr.grant.Status.CurrentPrivileges != nil {
if revokePrivileges := wr.privilegesToRevoke(); len(revokePrivileges) > 0 {
if err := mdbClient.Revoke(
ctx,
revokePrivileges,
wr.grant.Spec.Database,
wr.grant.Spec.Table,
wr.grant.AccountName(),
opts...,
); err != nil {
return fmt.Errorf("error revoking privileges in MariaDB: %v", err)
}
}
}
if wr.grant.Spec.GrantOption {
opts = append(opts, sqlClient.WithGrantOption())
}
if err := mdbClient.Grant(
ctx,
wr.grant.Spec.Privileges,
wr.grant.Spec.Database,
wr.grant.Spec.Table,
wr.grant.AccountName(),
opts...,
); err != nil {
return fmt.Errorf("error granting privileges in MariaDB: %v", err)
}
if err := wr.patchStatusWithFunc(ctx, func(status *mariadbv1alpha1.GrantStatus) {
wr.grant.Status.CurrentPrivileges = wr.grant.Spec.Privileges
}); err != nil {
return fmt.Errorf("error patching current privileges: %v", err)
}
return nil
}
func (wr *wrappedGrantReconciler) PatchStatus(ctx context.Context, patcher condition.Patcher) error {
return wr.patchStatusWithFunc(ctx, func(status *mariadbv1alpha1.GrantStatus) {
patcher(status)
})
}
func (wr *wrappedGrantReconciler) patchStatusWithFunc(ctx context.Context, patchFn func(status *mariadbv1alpha1.GrantStatus)) error {
patch := client.MergeFrom(wr.grant.DeepCopy())
patchFn(&wr.grant.Status)
if err := wr.Client.Status().Patch(ctx, wr.grant, patch); err != nil {
return fmt.Errorf("error patching Grant status: %v", err)
}
return nil
}
func (wr *wrappedGrantReconciler) privilegesToRevoke() []string {
var revokePrivileges []string
if slices.Equal(wr.grant.Status.CurrentPrivileges, wr.grant.Spec.Privileges) {
return revokePrivileges
}
for _, privilege := range wr.grant.Status.CurrentPrivileges {
if !slices.Contains(wr.grant.Spec.Privileges, privilege) {
revokePrivileges = append(revokePrivileges, privilege)
}
}
return revokePrivileges
}
func userKey(grant *mariadbv1alpha1.Grant) types.NamespacedName {
return types.NamespacedName{
Name: grant.Spec.Username,
Namespace: grant.Namespace,
}
}