
io.github.microcks.operator.base.resources.AsyncMinionDeploymentDependentResource Maven / Gradle / Ivy
/*
* Copyright The Microcks Authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package io.github.microcks.operator.base.resources;
import io.github.microcks.operator.MicrocksOperatorConfig;
import io.github.microcks.operator.api.base.v1alpha1.AmazonServiceConnectionSpec;
import io.github.microcks.operator.api.base.v1alpha1.AsyncFeatureSpec;
import io.github.microcks.operator.api.base.v1alpha1.Microcks;
import io.github.microcks.operator.api.base.v1alpha1.MicrocksSpec;
import io.github.microcks.operator.api.base.v1alpha1.KafkaAuthenticationSpec;
import io.github.microcks.operator.api.base.v1alpha1.KafkaAuthenticationType;
import io.github.microcks.operator.model.NamedSecondaryResourceProvider;
import io.fabric8.kubernetes.api.model.ObjectMeta;
import io.fabric8.kubernetes.api.model.apps.Deployment;
import io.fabric8.kubernetes.api.model.apps.DeploymentBuilder;
import io.javaoperatorsdk.operator.ReconcilerUtils;
import io.javaoperatorsdk.operator.api.reconciler.Context;
import io.javaoperatorsdk.operator.processing.dependent.kubernetes.CRUDKubernetesDependentResource;
import io.javaoperatorsdk.operator.processing.dependent.kubernetes.KubernetesDependent;
import org.jboss.logging.Logger;
/**
* An Async Minion Kubernetes Deployment dependent resource.
* @author laurent
*/
@KubernetesDependent(labelSelector = MicrocksOperatorConfig.RESOURCE_LABEL_SELECTOR)
public class AsyncMinionDeploymentDependentResource extends CRUDKubernetesDependentResource
implements NamedSecondaryResourceProvider {
/** Get a JBoss logging logger. */
private final Logger logger = Logger.getLogger(getClass());
private static final String RESOURCE_SUFFIX = "-async-minion";
/** Default empty constructor. */
public AsyncMinionDeploymentDependentResource() {
super(Deployment.class);
}
/**
* Get the name of Deployment given the primary Microcks resource.
* @param microcks The primary resource
* @return The name of Deployment
*/
public static final String getDeploymentName(Microcks microcks) {
return microcks.getMetadata().getName() + RESOURCE_SUFFIX;
}
@Override
public String getSecondaryResourceName(Microcks primary) {
return getDeploymentName(primary);
}
@Override
protected Deployment desired(Microcks microcks, Context context) {
logger.debugf("Building desired Async Minion Deployment for '%s'", microcks.getMetadata().getName());
final ObjectMeta microcksMetadata = microcks.getMetadata();
final String microcksName = microcksMetadata.getName();
final MicrocksSpec spec = microcks.getSpec();
final AsyncFeatureSpec asyncFeatureSpec = spec.getFeatures().getAsync();
Deployment deployment = ReconcilerUtils.loadYaml(Deployment.class, getClass(),
"/k8s/async-minion-deployment.yml");
DeploymentBuilder builder = new DeploymentBuilder(deployment).editMetadata().withName(getDeploymentName(microcks))
.withNamespace(microcksMetadata.getNamespace()).addToLabels("app", microcksName)
.addToLabels("app.kubernetes.io/name", getDeploymentName(microcks))
.addToLabels("app.kubernetes.io/version", microcks.getSpec().getVersion())
.addToLabels("app.kubernetes.io/part-of", microcksName)
.addToLabels(microcks.getSpec().getCommonLabels())
.addToAnnotations(microcks.getSpec().getCommonAnnotations())
.endMetadata()
.editSpec()
.editSelector().addToMatchLabels("app", microcksName).endSelector()
.editTemplate()
// make sure label selector matches label (which has to be matched by service selector too)
.editMetadata()
.addToLabels("app", microcksName)
.addToLabels(microcks.getSpec().getCommonLabels())
.addToAnnotations(microcks.getSpec().getCommonAnnotations())
.endMetadata()
.editSpec()
.editFirstContainer()
.withImage(asyncFeatureSpec.getImage().getCoordinates())
.addAllToEnv(asyncFeatureSpec.getEnv())
.endContainer()
.editFirstVolume()
.editConfigMap()
.withName(AsyncMinionConfigMapDependentResource.getConfigMapName(microcks))
.endConfigMap()
.endVolume()
.endSpec()
.endTemplate()
.endSpec();
// We may have additional security config if external Kafka.
if (!spec.getFeatures().getAsync().getKafka().isInstall()) {
KafkaAuthenticationSpec authenticationSpec = spec.getFeatures().getAsync().getKafka().getAuthentication();
// If there's a security mechanism, it has at least a truststore.
if (authenticationSpec.getType() != KafkaAuthenticationType.NONE) {
builder.editSpec().editTemplate().editSpec().editFirstContainer().addNewEnv()
.withName("KAFKA_TRUSTSTORE_PASSWORD").withNewValueFrom().withNewSecretKeyRef()
.withName("kafka-truststore")
.withKey(authenticationSpec.getTruststoreSecretRef().getAdditionalProperties().get("passwordKey")
.toString())
.endSecretKeyRef().endValueFrom().endEnv().addNewVolumeMount().withName("kafka-truststore")
.withMountPath("/deployments/config/kafka/truststore").endVolumeMount().endContainer().addNewVolume()
.withName("kafka-truststore").withNewSecret()
.withSecretName(authenticationSpec.getTruststoreSecretRef().getName()).endSecret().endVolume()
.endSpec().endTemplate().endSpec();
}
if (authenticationSpec.getType() == KafkaAuthenticationType.SSL) {
builder.editSpec().editTemplate().editSpec().editFirstContainer().addNewEnv()
.withName("KAFKA_KEYSTORE_PASSWORD").withNewValueFrom().withNewSecretKeyRef()
.withName("kafka-keystore")
.withKey(authenticationSpec.getKeystoreSecretRef().getAdditionalProperties().get("passwordKey")
.toString())
.endSecretKeyRef().endValueFrom().endEnv().addNewVolumeMount().withName("kafka-keystore")
.withMountPath("/deployments/config/kafka/keystore").endVolumeMount().endContainer().addNewVolume()
.withName("kafka-keystore").withNewSecret()
.withSecretName(authenticationSpec.getKeystoreSecretRef().getName()).endSecret().endVolume().endSpec()
.endTemplate().endSpec();
}
}
// If using Google PubSub, mount service account token from secret.
if (asyncFeatureSpec.getGooglepubsub() != null
&& asyncFeatureSpec.getGooglepubsub().getServiceAccountSecretRef() != null) {
builder.editSpec().editTemplate().editSpec().editFirstContainer().addNewVolumeMount()
.withName("googlepubsub-sa").withMountPath("/deployments/config/googlepubsub/sa").endVolumeMount()
.endContainer().addNewVolume().withName("googlepubsub-sa").withNewSecret()
.withSecretName(asyncFeatureSpec.getGooglepubsub().getServiceAccountSecretRef().getName()).endSecret()
.endVolume().endSpec().endTemplate().endSpec();
}
// If using Amazon SQS, mount credentials variables from secret if env-variable authentication.
if (asyncFeatureSpec.getSqs() != null && asyncFeatureSpec.getSqs().getRegion() != null) {
if (asyncFeatureSpec.getSqs().getCredentialsType()
.equals(AmazonServiceConnectionSpec.AmazonCredentialsProviderType.ENV_VARIABLE)
&& asyncFeatureSpec.getSqs().getCredentialsSecretRef() != null
&& asyncFeatureSpec.getSqs().getCredentialsSecretRef().getName() != null) {
addAmazonServicesEnvVariables(builder, asyncFeatureSpec.getSqs());
}
}
// If using Amazon SNS, mount credentials variables from secret if env-variable authentication.
if (asyncFeatureSpec.getSns() != null && asyncFeatureSpec.getSns().getRegion() != null) {
if (asyncFeatureSpec.getSns().getCredentialsType()
.equals(AmazonServiceConnectionSpec.AmazonCredentialsProviderType.ENV_VARIABLE)
&& asyncFeatureSpec.getSns().getCredentialsSecretRef() != null
&& asyncFeatureSpec.getSns().getCredentialsSecretRef().getName() != null) {
addAmazonServicesEnvVariables(builder, asyncFeatureSpec.getSns());
}
}
// Complete configuration with optional stuffs.
if (spec.getCommonAffinities() != null) {
builder.editSpec().editTemplate().editSpec().withAffinity(spec.getCommonAffinities()).endSpec().endTemplate().endSpec();
}
if (spec.getCommonTolerations() != null) {
builder.editSpec().editTemplate().editSpec().withTolerations(spec.getCommonTolerations()).endSpec().endTemplate().endSpec();
}
return builder.build();
}
private void addAmazonServicesEnvVariables(DeploymentBuilder builder, AmazonServiceConnectionSpec awsSpec) {
builder.editSpec().editTemplate().editSpec().editFirstContainer().addNewEnv().withName("AWS_ACCESS_KEY_ID")
.withNewValueFrom().withNewSecretKeyRef().withName(awsSpec.getCredentialsSecretRef().getName())
.withKey(awsSpec.getCredentialsSecretRef().getAdditionalProperties().get("accessKeyIdKey").toString())
.endSecretKeyRef().endValueFrom().endEnv().addNewEnv().withName("AWS_SECRET_ACCESS_KEY").withNewValueFrom()
.withNewSecretKeyRef().withName(awsSpec.getCredentialsSecretRef().getName())
.withKey(awsSpec.getCredentialsSecretRef().getAdditionalProperties().get("secretAccessKeyKey").toString())
.endSecretKeyRef().endValueFrom().endEnv().endContainer().endSpec().endTemplate().endSpec();
if (awsSpec.getCredentialsSecretRef().getAdditionalProperties().containsKey("sessionTokenKey")) {
builder.editSpec().editTemplate().editSpec().editFirstContainer().addNewEnv().withName("AWS_SESSION_TOKEN")
.withNewValueFrom().withNewSecretKeyRef().withName(awsSpec.getCredentialsSecretRef().getName())
.withKey(awsSpec.getCredentialsSecretRef().getAdditionalProperties().get("sessionTokenKey").toString())
.endSecretKeyRef().endValueFrom().endEnv().endContainer().endSpec().endTemplate().endSpec();
}
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy