-
Notifications
You must be signed in to change notification settings - Fork 0
/
redis.go
241 lines (219 loc) · 6.88 KB
/
redis.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
package controller
import (
"fmt"
"github.com/appscode/go/encoding/json/types"
"github.com/appscode/go/log"
"github.com/appscode/kutil"
dynamic_util "github.com/appscode/kutil/dynamic"
meta_util "github.com/appscode/kutil/meta"
"github.com/kubedb/apimachinery/apis"
api "github.com/kubedb/apimachinery/apis/kubedb/v1alpha1"
"github.com/kubedb/apimachinery/client/clientset/versioned/typed/kubedb/v1alpha1/util"
"github.com/kubedb/apimachinery/pkg/eventer"
validator "github.com/kubedb/redis/pkg/admission"
core "k8s.io/api/core/v1"
kerr "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
clientsetscheme "k8s.io/client-go/kubernetes/scheme"
"k8s.io/client-go/tools/reference"
)
func (c *Controller) create(redis *api.Redis) error {
if err := validator.ValidateRedis(c.Client, c.ExtClient, redis); err != nil {
c.recorder.Event(
redis,
core.EventTypeWarning,
eventer.EventReasonInvalid,
err.Error(),
)
log.Errorln(err)
return nil // user error so just record error and don't retry.
}
// Check if redisVersion is deprecated.
// If deprecated, add event and return nil (stop processing.)
redisVersion, err := c.ExtClient.CatalogV1alpha1().RedisVersions().Get(string(redis.Spec.Version), metav1.GetOptions{})
if err != nil {
return err
}
if redisVersion.Spec.Deprecated {
c.recorder.Eventf(
redis,
core.EventTypeWarning,
eventer.EventReasonInvalid,
"RedisVersion %v is deprecated. Skipped processing.",
redisVersion.Name,
)
log.Errorf("Redis %s/%s is using deprecated version %v. Skipped processing.",
redis.Namespace, redis.Name, redisVersion.Name)
return nil
}
// Delete Matching DormantDatabase if exists any
if err := c.deleteMatchingDormantDatabase(redis); err != nil {
c.recorder.Eventf(
redis,
core.EventTypeWarning,
eventer.EventReasonFailedToCreate,
`Failed to delete dormant Database : "%v". Reason: %v`,
redis.Name,
err,
)
return err
}
if redis.Status.Phase == "" {
rd, err := util.UpdateRedisStatus(c.ExtClient.KubedbV1alpha1(), redis, func(in *api.RedisStatus) *api.RedisStatus {
in.Phase = api.DatabasePhaseCreating
return in
}, apis.EnableStatusSubresource)
if err != nil {
c.recorder.Eventf(
redis,
core.EventTypeWarning,
eventer.EventReasonFailedToUpdate,
err.Error(),
)
return err
}
redis.Status = rd.Status
}
// create Governing Service
governingService := c.GoverningService
if err := c.CreateGoverningService(governingService, redis.Namespace); err != nil {
c.recorder.Eventf(
redis,
core.EventTypeWarning,
eventer.EventReasonFailedToCreate,
`Failed to create Service: "%v". Reason: %v`,
governingService,
err,
)
return err
}
// ensure database Service
vt1, err := c.ensureService(redis)
if err != nil {
return err
}
// ensure database StatefulSet
vt2, err := c.ensureStatefulSet(redis)
if err != nil {
return err
}
if vt1 == kutil.VerbCreated && vt2 == kutil.VerbCreated {
c.recorder.Event(
redis,
core.EventTypeNormal,
eventer.EventReasonSuccessful,
"Successfully created Redis",
)
} else if vt1 == kutil.VerbPatched || vt2 == kutil.VerbPatched {
c.recorder.Event(
redis,
core.EventTypeNormal,
eventer.EventReasonSuccessful,
"Successfully patched Redis",
)
}
rd, err := util.UpdateRedisStatus(c.ExtClient.KubedbV1alpha1(), redis, func(in *api.RedisStatus) *api.RedisStatus {
in.Phase = api.DatabasePhaseRunning
in.ObservedGeneration = types.NewIntHash(redis.Generation, meta_util.GenerationHash(redis))
return in
}, apis.EnableStatusSubresource)
if err != nil {
c.recorder.Eventf(
redis,
core.EventTypeWarning,
eventer.EventReasonFailedToUpdate,
err.Error(),
)
return err
}
redis.Status = rd.Status
// ensure StatsService for desired monitoring
if _, err := c.ensureStatsService(redis); err != nil {
c.recorder.Eventf(
redis,
core.EventTypeWarning,
eventer.EventReasonFailedToCreate,
"Failed to manage monitoring system. Reason: %v",
err,
)
log.Errorln(err)
return nil
}
if err := c.manageMonitor(redis); err != nil {
c.recorder.Eventf(
redis,
core.EventTypeWarning,
eventer.EventReasonFailedToCreate,
"Failed to manage monitoring system. Reason: %v",
err,
)
log.Errorln(err)
return nil
}
return nil
}
func (c *Controller) terminate(redis *api.Redis) error {
ref, rerr := reference.GetReference(clientsetscheme.Scheme, redis)
if rerr != nil {
return rerr
}
// If TerminationPolicy is "terminate", keep everything (ie, PVCs,Secrets,Snapshots) intact.
// In operator, create dormantdatabase
if redis.Spec.TerminationPolicy == api.TerminationPolicyPause {
if err := c.removeOwnerReferenceFromOffshoots(redis, ref); err != nil {
return err
}
if _, err := c.createDormantDatabase(redis); err != nil {
if kerr.IsAlreadyExists(err) {
// if already exists, check if it is database of another Kind and return error in that case.
// If the Kind is same, we can safely assume that the DormantDB was not deleted in before,
// Probably because, User is more faster (create-delete-create-again-delete...) than operator!
// So reuse that DormantDB!
ddb, err := c.ExtClient.KubedbV1alpha1().DormantDatabases(redis.Namespace).Get(redis.Name, metav1.GetOptions{})
if err != nil {
return err
}
if val, _ := meta_util.GetStringValue(ddb.Labels, api.LabelDatabaseKind); val != api.ResourceKindRedis {
return fmt.Errorf(`DormantDatabase "%v" of kind %v already exists`, redis.Name, val)
}
} else {
return fmt.Errorf(`failed to create DormantDatabase: "%v". Reason: %v`, redis.Name, err)
}
}
} else {
// If TerminationPolicy is "wipeOut", delete everything (ie, PVCs,Secrets,Snapshots).
// If TerminationPolicy is "delete", delete PVCs and keep snapshots,secrets intact.
// In both these cases, don't create dormantdatabase
if err := c.setOwnerReferenceToOffshoots(redis, ref); err != nil {
return err
}
}
if redis.Spec.Monitor != nil {
if _, err := c.deleteMonitor(redis); err != nil {
log.Errorln(err)
return nil
}
}
return nil
}
func (c *Controller) setOwnerReferenceToOffshoots(redis *api.Redis, ref *core.ObjectReference) error {
selector := labels.SelectorFromSet(redis.OffshootSelectors())
// delete PVC for both "wipeOut" and "delete" TerminationPolicy.
return dynamic_util.EnsureOwnerReferenceForSelector(
c.DynamicClient,
core.SchemeGroupVersion.WithResource("persistentvolumeclaims"),
redis.Namespace,
selector,
ref)
}
func (c *Controller) removeOwnerReferenceFromOffshoots(redis *api.Redis, ref *core.ObjectReference) error {
// First, Get LabelSelector for Other Components
labelSelector := labels.SelectorFromSet(redis.OffshootSelectors())
return dynamic_util.RemoveOwnerReferenceForSelector(
c.DynamicClient,
core.SchemeGroupVersion.WithResource("persistentvolumeclaims"),
redis.Namespace,
labelSelector,
ref)
}