-
Notifications
You must be signed in to change notification settings - Fork 188
/
topic_extension.go
104 lines (84 loc) · 3.24 KB
/
topic_extension.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
/* Copyright (c) Microsoft Corporation.
* Licensed under the MIT license.
*/
package customizations
import (
"context"
"github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/eventgrid/armeventgrid"
"github.com/go-logr/logr"
"github.com/pkg/errors"
v1 "k8s.io/api/core/v1"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/conversion"
"github.com/Azure/azure-service-operator/v2/api/eventgrid/v1api20200601/storage"
"github.com/Azure/azure-service-operator/v2/internal/genericarmclient"
. "github.com/Azure/azure-service-operator/v2/internal/logging"
"github.com/Azure/azure-service-operator/v2/internal/util/to"
"github.com/Azure/azure-service-operator/v2/pkg/genruntime"
"github.com/Azure/azure-service-operator/v2/pkg/genruntime/secrets"
)
var _ genruntime.KubernetesExporter = &TopicExtension{}
func (ext *TopicExtension) ExportKubernetesResources(
ctx context.Context,
obj genruntime.MetaObject,
armClient *genericarmclient.GenericClient,
log logr.Logger,
) ([]client.Object, error) {
// This has to be the current hub storage version. It will need to be updated
// if the hub storage version changes.
typedObj, ok := obj.(*storage.Topic)
if !ok {
return nil, errors.Errorf("cannot run on unknown resource type %T, expected *eventgrid.Topic", obj)
}
// Type assert that we are the hub type. This will fail to compile if
// the hub type has been changed but this extension has not
var _ conversion.Hub = typedObj
hasSecrets := secretsSpecified(typedObj)
if !hasSecrets {
log.V(Debug).Info("No secrets retrieval to perform as operatorSpec is empty")
return nil, nil
}
id, err := genruntime.GetAndParseResourceID(typedObj)
if err != nil {
return nil, err
}
subscription := id.SubscriptionID
// Using armClient.ClientOptions() here ensures we share the same HTTP connection, so this is not opening a new
// connection each time through
var confClient *armeventgrid.TopicsClient
confClient, err = armeventgrid.NewTopicsClient(subscription, armClient.Creds(), armClient.ClientOptions())
if err != nil {
return nil, errors.Wrapf(err, "failed to create new TopicsClient")
}
var resp armeventgrid.TopicsClientListSharedAccessKeysResponse
resp, err = confClient.ListSharedAccessKeys(ctx, id.ResourceGroupName, typedObj.AzureName(), nil)
if err != nil {
return nil, errors.Wrapf(err, "failed listing keys")
}
secretSlice, err := secretsToWrite(typedObj, resp)
if err != nil {
return nil, err
}
return secrets.SliceToClientObjectSlice(secretSlice), nil
}
func secretsSpecified(obj *storage.Topic) bool {
if obj.Spec.OperatorSpec == nil || obj.Spec.OperatorSpec.Secrets == nil {
return false
}
secrets := obj.Spec.OperatorSpec.Secrets
if secrets.Key1 != nil ||
secrets.Key2 != nil {
return true
}
return false
}
func secretsToWrite(obj *storage.Topic, keys armeventgrid.TopicsClientListSharedAccessKeysResponse) ([]*v1.Secret, error) {
operatorSpecSecrets := obj.Spec.OperatorSpec.Secrets
if operatorSpecSecrets == nil {
return nil, errors.Errorf("unexpected nil operatorspec")
}
collector := secrets.NewCollector(obj.Namespace)
collector.AddValue(operatorSpecSecrets.Key1, to.Value(keys.Key1))
collector.AddValue(operatorSpecSecrets.Key2, to.Value(keys.Key2))
return collector.Values()
}