mirror of
https://github.com/cloudnative-pg/plugin-barman-cloud.git
synced 2026-01-11 21:23:12 +01:00
Signed-off-by: Armando Ruocco <armando.ruocco@enterprisedb.com> Signed-off-by: Francesco Canovai <francesco.canovai@enterprisedb.com> Co-authored-by: Francesco Canovai <francesco.canovai@enterprisedb.com>
200 lines
4.8 KiB
Go
200 lines
4.8 KiB
Go
package client
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/cloudnative-pg/machinery/pkg/log"
|
|
corev1 "k8s.io/api/core/v1"
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
|
|
v1 "github.com/cloudnative-pg/plugin-barman-cloud/api/v1"
|
|
)
|
|
|
|
type cachedSecret struct {
|
|
secret *corev1.Secret
|
|
fetchUnixTime int64
|
|
}
|
|
|
|
// ExtendedClient is an extended client that is capable of caching multiple secrets without relying on informers
|
|
type ExtendedClient struct {
|
|
client.Client
|
|
barmanObjectKey client.ObjectKey
|
|
cachedSecrets []*cachedSecret
|
|
mux *sync.Mutex
|
|
ttl int
|
|
}
|
|
|
|
// NewExtendedClient returns an extended client capable of caching secrets on the 'Get' operation
|
|
func NewExtendedClient(
|
|
baseClient client.Client,
|
|
objectStoreKey client.ObjectKey,
|
|
) client.Client {
|
|
return &ExtendedClient{
|
|
Client: baseClient,
|
|
barmanObjectKey: objectStoreKey,
|
|
mux: &sync.Mutex{},
|
|
}
|
|
}
|
|
|
|
func (e *ExtendedClient) refreshTTL(ctx context.Context) error {
|
|
var object v1.ObjectStore
|
|
if err := e.Get(ctx, e.barmanObjectKey, &object); err != nil {
|
|
return fmt.Errorf("failed to get the object store while refreshing the TTL parameter: %w", err)
|
|
}
|
|
|
|
e.ttl = object.Spec.InstanceSidecarConfiguration.GetCacheTTL()
|
|
|
|
return nil
|
|
}
|
|
|
|
// Get behaves like the original Get method, but uses a cache for secrets
|
|
func (e *ExtendedClient) Get(
|
|
ctx context.Context,
|
|
key client.ObjectKey,
|
|
obj client.Object,
|
|
opts ...client.GetOption,
|
|
) error {
|
|
contextLogger := log.FromContext(ctx).
|
|
WithName("extended_client").
|
|
WithValues("name", key.Name, "namespace", key.Namespace)
|
|
|
|
if _, ok := obj.(*corev1.Secret); !ok {
|
|
contextLogger.Trace("not a secret, skipping")
|
|
return e.Client.Get(ctx, key, obj, opts...)
|
|
}
|
|
|
|
if err := e.refreshTTL(ctx); err != nil {
|
|
return err
|
|
}
|
|
|
|
if e.isCacheDisabled() {
|
|
contextLogger.Trace("cache is disabled")
|
|
return e.Client.Get(ctx, key, obj, opts...)
|
|
}
|
|
|
|
contextLogger.Trace("locking the cache")
|
|
e.mux.Lock()
|
|
defer e.mux.Unlock()
|
|
|
|
expiredSecretIndex := -1
|
|
// check if in cache
|
|
for idx, cache := range e.cachedSecrets {
|
|
if cache.secret.Namespace != key.Namespace || cache.secret.Name != key.Name {
|
|
continue
|
|
}
|
|
if e.isExpired(cache.fetchUnixTime) {
|
|
contextLogger.Trace("secret found, but it is expired")
|
|
expiredSecretIndex = idx
|
|
break
|
|
}
|
|
contextLogger.Debug("secret found, loading it from cache")
|
|
cache.secret.DeepCopyInto(obj.(*corev1.Secret))
|
|
return nil
|
|
}
|
|
|
|
if err := e.Client.Get(ctx, key, obj); err != nil {
|
|
return err
|
|
}
|
|
|
|
cs := &cachedSecret{
|
|
secret: obj.(*corev1.Secret).DeepCopy(),
|
|
fetchUnixTime: time.Now().Unix(),
|
|
}
|
|
|
|
contextLogger.Debug("setting secret in the cache")
|
|
if expiredSecretIndex != -1 {
|
|
e.cachedSecrets[expiredSecretIndex] = cs
|
|
} else {
|
|
e.cachedSecrets = append(e.cachedSecrets, cs)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (e *ExtendedClient) isExpired(unixTime int64) bool {
|
|
return time.Now().Unix()-unixTime > int64(e.ttl)
|
|
}
|
|
|
|
func (e *ExtendedClient) isCacheDisabled() bool {
|
|
const noCache = 0
|
|
return e.ttl == noCache
|
|
}
|
|
|
|
// RemoveSecret ensures that a secret is not present in the cache
|
|
func (e *ExtendedClient) RemoveSecret(key client.ObjectKey) {
|
|
if e.isCacheDisabled() {
|
|
return
|
|
}
|
|
|
|
e.mux.Lock()
|
|
defer e.mux.Unlock()
|
|
|
|
for i, cache := range e.cachedSecrets {
|
|
if cache.secret.Namespace == key.Namespace && cache.secret.Name == key.Name {
|
|
e.cachedSecrets = append(e.cachedSecrets[:i], e.cachedSecrets[i+1:]...)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
// Update behaves like the original Update method, but on secrets it removes the secret from the cache
|
|
func (e *ExtendedClient) Update(
|
|
ctx context.Context,
|
|
obj client.Object,
|
|
opts ...client.UpdateOption,
|
|
) error {
|
|
if e.isCacheDisabled() {
|
|
return e.Client.Update(ctx, obj, opts...)
|
|
}
|
|
|
|
if _, ok := obj.(*corev1.Secret); !ok {
|
|
return e.Client.Update(ctx, obj, opts...)
|
|
}
|
|
|
|
e.RemoveSecret(client.ObjectKeyFromObject(obj))
|
|
|
|
return e.Client.Update(ctx, obj, opts...)
|
|
}
|
|
|
|
// Delete behaves like the original Delete method, but on secrets it removes the secret from the cache
|
|
func (e *ExtendedClient) Delete(
|
|
ctx context.Context,
|
|
obj client.Object,
|
|
opts ...client.DeleteOption,
|
|
) error {
|
|
if e.isCacheDisabled() {
|
|
return e.Client.Delete(ctx, obj, opts...)
|
|
}
|
|
|
|
if _, ok := obj.(*corev1.Secret); !ok {
|
|
return e.Client.Delete(ctx, obj, opts...)
|
|
}
|
|
|
|
e.RemoveSecret(client.ObjectKeyFromObject(obj))
|
|
|
|
return e.Client.Delete(ctx, obj, opts...)
|
|
}
|
|
|
|
// Patch behaves like the original Patch method, but on secrets it removes the secret from the cache
|
|
func (e *ExtendedClient) Patch(
|
|
ctx context.Context,
|
|
obj client.Object,
|
|
patch client.Patch,
|
|
opts ...client.PatchOption,
|
|
) error {
|
|
if e.isCacheDisabled() {
|
|
return e.Client.Patch(ctx, obj, patch, opts...)
|
|
}
|
|
|
|
if _, ok := obj.(*corev1.Secret); !ok {
|
|
return e.Client.Patch(ctx, obj, patch, opts...)
|
|
}
|
|
|
|
e.RemoveSecret(client.ObjectKeyFromObject(obj))
|
|
|
|
return e.Client.Patch(ctx, obj, patch, opts...)
|
|
}
|