Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add update operations for VolumeSize, InstanceType, and BrokerCount #55

Merged
merged 2 commits into from
Mar 5, 2025

Conversation

michaelhtm
Copy link
Member

@michaelhtm michaelhtm commented Feb 26, 2025

Issue #2249

Description of changes:
Also added reconcile before deletion attempt if cluster is
not active. Before, if we tried deleting a cluster that was
not active, the controller would set it to terminal, and does
not reconcile.

Another change being added is a field in the Cluster status
called ClusterVersion. This field is returned by the sdkFind
operation, and is crutial to make updates to VolumeSize,
InstanceType, and BrokerCount.

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

@ack-prow ack-prow bot requested review from jlbutler and rushmash91 February 26, 2025 22:02
@ack-prow ack-prow bot added the approved label Feb 26, 2025
@michaelhtm michaelhtm force-pushed the handle/updates branch 3 times, most recently from 26aab76 to c670340 Compare February 27, 2025 22:42
Also added reconcile before deletion attempt if cluster is not active.
Before, if we tried deleting a cluster that was not active, the
controller would set it to terminal, and does not reconcile.
@michaelhtm michaelhtm force-pushed the handle/updates branch 7 times, most recently from 5ce92f5 to be660de Compare March 4, 2025 19:58
Copy link

ack-prow bot commented Mar 4, 2025

@michaelhtm: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
kafka-verify-attribution 3857374 link false /test kafka-verify-attribution

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

Copy link
Member

@rushmash91 rushmash91 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Amazing!!!

@rushmash91
Copy link
Member

/lgtm

@ack-prow ack-prow bot added the lgtm Indicates that a PR is ready to be merged. label Mar 5, 2025
Copy link

ack-prow bot commented Mar 5, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: michaelhtm, rushmash91

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [michaelhtm,rushmash91]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@michaelhtm
Copy link
Member Author

/hold

@ack-prow ack-prow bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Mar 5, 2025
@michaelhtm
Copy link
Member Author

/unhold

@ack-prow ack-prow bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Mar 5, 2025
@ack-prow ack-prow bot merged commit 1721e84 into aws-controllers-k8s:main Mar 5, 2025
6 of 7 checks passed
Copy link
Member

@a-hilaly a-hilaly left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

w00t!

@@ -95,6 +98,11 @@ resources:
BootstrapBrokerStringVpcConnectivityTls:
type: string
is_read_only: true
CurrentVersion:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why do you need both spec.KafkaVersion and `CurrentVersion? do they serve the same purpose?

Copy link
Member Author

@michaelhtm michaelhtm Mar 5, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

CurrentVersion is just the version of the cluster..it's different values from KafkaVersion...also ClusterVersion comes from the Describe output smh

Comment on lines +163 to +216
input := &svcsdk.UpdateSecurityInput{}
if desired.ko.Status.CurrentVersion != nil {
input.CurrentVersion = desired.ko.Status.CurrentVersion
}
if desired.ko.Status.ACKResourceMetadata.ARN != nil {
input.ClusterArn = (*string)(desired.ko.Status.ACKResourceMetadata.ARN)
}
if desired.ko.Spec.ClientAuthentication != nil {
f0 := &svcsdktypes.ClientAuthentication{}
if desired.ko.Spec.ClientAuthentication.SASL != nil {
f0f0 := &svcsdktypes.Sasl{}
if desired.ko.Spec.ClientAuthentication.SASL.IAM != nil &&
desired.ko.Spec.ClientAuthentication.SASL.IAM.Enabled != nil {
f0f0f0 := &svcsdktypes.Iam{
Enabled: desired.ko.Spec.ClientAuthentication.SASL.IAM.Enabled,
}
f0f0.Iam = f0f0f0
}
if desired.ko.Spec.ClientAuthentication.SASL.SCRAM != nil &&
desired.ko.Spec.ClientAuthentication.SASL.SCRAM.Enabled != nil {
f0f0f1 := &svcsdktypes.Scram{
Enabled: desired.ko.Spec.ClientAuthentication.SASL.SCRAM.Enabled,
}
f0f0.Scram = f0f0f1
}
f0.Sasl = f0f0
}
if desired.ko.Spec.ClientAuthentication.TLS != nil {
f0f1 := &svcsdktypes.Tls{}
if desired.ko.Spec.ClientAuthentication.TLS.CertificateAuthorityARNList != nil {
f0f1.CertificateAuthorityArnList = aws.ToStringSlice(desired.ko.Spec.ClientAuthentication.TLS.CertificateAuthorityARNList)
}
if desired.ko.Spec.ClientAuthentication.TLS.Enabled != nil {
f0f1.Enabled = desired.ko.Spec.ClientAuthentication.TLS.Enabled
}
f0.Tls = f0f1
}
if desired.ko.Spec.ClientAuthentication.Unauthenticated != nil &&
desired.ko.Spec.ClientAuthentication.Unauthenticated.Enabled != nil {
f0.Unauthenticated = &svcsdktypes.Unauthenticated{
Enabled: desired.ko.Spec.ClientAuthentication.Unauthenticated.Enabled,
}
}
input.ClientAuthentication = f0
}

_, err = rm.sdkapi.UpdateSecurity(ctx, input)
rm.metrics.RecordAPICall("UPDATE", "UpdateSecurity", err)
if err != nil {
return nil, err
}
ackcondition.SetSynced(updatedRes, corev1.ConditionFalse, nil, nil)
err = requeueAfterAsyncUpdate()

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we use a function to hide this logic?

Comment on lines +226 to +242
_, err := rm.sdkapi.UpdateBrokerStorage(ctx, &svcsdk.UpdateBrokerStorageInput{
ClusterArn: (*string)(latest.ko.Status.ACKResourceMetadata.ARN),
CurrentVersion: latest.ko.Status.CurrentVersion,
TargetBrokerEBSVolumeInfo: []svcsdktypes.BrokerEBSVolumeInfo{
{
KafkaBrokerNodeId: aws.String("ALL"),
VolumeSizeGB: aws.Int32(int32(*desired.ko.Spec.BrokerNodeGroupInfo.StorageInfo.EBSStorageInfo.VolumeSize)),
},
},
})
rm.metrics.RecordAPICall("UPDATE", "UpdateBrokerStorage", err)
if err != nil {
return nil, err
}
message := fmt.Sprintf("kafka is updating broker storage")
ackcondition.SetSynced(updatedRes, corev1.ConditionFalse, &message, nil)
err = requeueAfterAsyncUpdate()
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ditto

Comment on lines +245 to +255
_, err := rm.sdkapi.UpdateBrokerType(ctx, &svcsdk.UpdateBrokerTypeInput{
ClusterArn: (*string)(latest.ko.Status.ACKResourceMetadata.ARN),
CurrentVersion: latest.ko.Status.CurrentVersion,
TargetInstanceType: desired.ko.Spec.BrokerNodeGroupInfo.InstanceType,
})
rm.metrics.RecordAPICall("UPDATE", "UpdateBrokerType", err)
if err != nil {
return nil, err
}
message := fmt.Sprintf("kafka is updating broker instanceType")
ackcondition.SetSynced(updatedRes, corev1.ConditionFalse, &message, nil)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ditto

Comment on lines +358 to +366
type unprocessedSecret struct {
errorCode string
errorMessage string
secretArn string
}

func (us unprocessedSecret) String() string {
return fmt.Sprintf("ErrorCode: %s, ErrorMessage %s, SecretArn: %s", us.errorCode, us.errorMessage, us.secretArn)
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

how about making an error type, encapsulating all the unprocessed secrets. And implement an Error method that formats it all for you. I guess that's what you're trying to do in L388+

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

mmm, not sure how we can achieve that since each secret may have its own reason why it can't be attached...i don't think i can return a slice of errors..

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

unless maybe if i make all three fields a list of strings..after i would just need to fix how I represent it as a string

ack-prow bot pushed a commit that referenced this pull request Mar 5, 2025
Issue #55 

Description of changes:
* wrapped update operations in functions
* made `unprocessedSecrets` implement error

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants