mirror of
https://github.com/mariadb-operator/mariadb-operator.git
synced 2025-07-28 07:14:28 +00:00
162 lines
5.0 KiB
Go
162 lines
5.0 KiB
Go
package controller
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"slices"
|
|
|
|
mariadbv1alpha1 "github.com/mariadb-operator/mariadb-operator/api/v1alpha1"
|
|
condition "github.com/mariadb-operator/mariadb-operator/pkg/condition"
|
|
"github.com/mariadb-operator/mariadb-operator/pkg/controller/sql"
|
|
"github.com/mariadb-operator/mariadb-operator/pkg/refresolver"
|
|
sqlClient "github.com/mariadb-operator/mariadb-operator/pkg/sql"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
ctrl "sigs.k8s.io/controller-runtime"
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
)
|
|
|
|
// GrantReconciler reconciles a Grant object
|
|
type GrantReconciler struct {
|
|
client.Client
|
|
RefResolver *refresolver.RefResolver
|
|
ConditionReady *condition.Ready
|
|
SqlOpts []sql.SqlOpt
|
|
}
|
|
|
|
func NewGrantReconciler(client client.Client, refResolver *refresolver.RefResolver, conditionReady *condition.Ready,
|
|
sqlOpts ...sql.SqlOpt) *GrantReconciler {
|
|
return &GrantReconciler{
|
|
Client: client,
|
|
RefResolver: refResolver,
|
|
ConditionReady: conditionReady,
|
|
SqlOpts: sqlOpts,
|
|
}
|
|
}
|
|
|
|
//+kubebuilder:rbac:groups=k8s.mariadb.com,resources=grants,verbs=get;list;watch;create;update;patch;delete
|
|
//+kubebuilder:rbac:groups=k8s.mariadb.com,resources=grants/status,verbs=get;update;patch
|
|
//+kubebuilder:rbac:groups=k8s.mariadb.com,resources=grants/finalizers,verbs=update
|
|
|
|
// Reconcile is part of the main kubernetes reconciliation loop which aims to
|
|
// move the current state of the cluster closer to the desired state.
|
|
func (r *GrantReconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
|
|
var grant mariadbv1alpha1.Grant
|
|
if err := r.Get(ctx, req.NamespacedName, &grant); err != nil {
|
|
return ctrl.Result{}, client.IgnoreNotFound(err)
|
|
}
|
|
|
|
wr := newWrappedGrantReconciler(r.Client, *r.RefResolver, &grant)
|
|
wf := newWrappedGrantFinalizer(r.Client, &grant)
|
|
tf := sql.NewSqlFinalizer(r.Client, wf, r.SqlOpts...)
|
|
tr := sql.NewSqlReconciler(r.Client, r.ConditionReady, wr, tf, r.SqlOpts...)
|
|
|
|
result, err := tr.Reconcile(ctx, &grant)
|
|
if err != nil {
|
|
return result, fmt.Errorf("error reconciling in TemplateReconciler: %v", err)
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
// SetupWithManager sets up the controller with the Manager.
|
|
func (r *GrantReconciler) SetupWithManager(ctx context.Context, mgr ctrl.Manager) error {
|
|
builder := ctrl.NewControllerManagedBy(mgr).
|
|
For(&mariadbv1alpha1.Grant{})
|
|
|
|
if err := mariadbv1alpha1.IndexGrant(ctx, mgr, builder, r.Client); err != nil {
|
|
return fmt.Errorf("error indexing Grant: %v", err)
|
|
}
|
|
|
|
return builder.Complete(r)
|
|
}
|
|
|
|
type wrappedGrantReconciler struct {
|
|
client.Client
|
|
refResolver *refresolver.RefResolver
|
|
grant *mariadbv1alpha1.Grant
|
|
}
|
|
|
|
func newWrappedGrantReconciler(client client.Client, refResolver refresolver.RefResolver,
|
|
grant *mariadbv1alpha1.Grant) sql.WrappedReconciler {
|
|
return &wrappedGrantReconciler{
|
|
Client: client,
|
|
refResolver: &refResolver,
|
|
grant: grant,
|
|
}
|
|
}
|
|
|
|
func (wr *wrappedGrantReconciler) Reconcile(ctx context.Context, mdbClient *sqlClient.Client) error {
|
|
var opts []sqlClient.GrantOption
|
|
|
|
if wr.grant.Status.CurrentPrivileges != nil {
|
|
if revokePrivileges := wr.privilegesToRevoke(); len(revokePrivileges) > 0 {
|
|
if err := mdbClient.Revoke(
|
|
ctx,
|
|
revokePrivileges,
|
|
wr.grant.Spec.Database,
|
|
wr.grant.Spec.Table,
|
|
wr.grant.AccountName(),
|
|
opts...,
|
|
); err != nil {
|
|
return fmt.Errorf("error revoking privileges in MariaDB: %v", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
if wr.grant.Spec.GrantOption {
|
|
opts = append(opts, sqlClient.WithGrantOption())
|
|
}
|
|
if err := mdbClient.Grant(
|
|
ctx,
|
|
wr.grant.Spec.Privileges,
|
|
wr.grant.Spec.Database,
|
|
wr.grant.Spec.Table,
|
|
wr.grant.AccountName(),
|
|
opts...,
|
|
); err != nil {
|
|
return fmt.Errorf("error granting privileges in MariaDB: %v", err)
|
|
}
|
|
|
|
if err := wr.patchStatusWithFunc(ctx, func(status *mariadbv1alpha1.GrantStatus) {
|
|
wr.grant.Status.CurrentPrivileges = wr.grant.Spec.Privileges
|
|
}); err != nil {
|
|
return fmt.Errorf("error patching current privileges: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (wr *wrappedGrantReconciler) PatchStatus(ctx context.Context, patcher condition.Patcher) error {
|
|
return wr.patchStatusWithFunc(ctx, func(status *mariadbv1alpha1.GrantStatus) {
|
|
patcher(status)
|
|
})
|
|
}
|
|
|
|
func (wr *wrappedGrantReconciler) patchStatusWithFunc(ctx context.Context, patchFn func(status *mariadbv1alpha1.GrantStatus)) error {
|
|
patch := client.MergeFrom(wr.grant.DeepCopy())
|
|
patchFn(&wr.grant.Status)
|
|
|
|
if err := wr.Client.Status().Patch(ctx, wr.grant, patch); err != nil {
|
|
return fmt.Errorf("error patching Grant status: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (wr *wrappedGrantReconciler) privilegesToRevoke() []string {
|
|
var revokePrivileges []string
|
|
if slices.Equal(wr.grant.Status.CurrentPrivileges, wr.grant.Spec.Privileges) {
|
|
return revokePrivileges
|
|
}
|
|
for _, privilege := range wr.grant.Status.CurrentPrivileges {
|
|
if !slices.Contains(wr.grant.Spec.Privileges, privilege) {
|
|
revokePrivileges = append(revokePrivileges, privilege)
|
|
}
|
|
}
|
|
return revokePrivileges
|
|
}
|
|
|
|
func userKey(grant *mariadbv1alpha1.Grant) types.NamespacedName {
|
|
return types.NamespacedName{
|
|
Name: grant.Spec.Username,
|
|
Namespace: grant.Namespace,
|
|
}
|
|
}
|