@@ -2,16 +2,12 @@ package kafka
2
2
3
3
import (
4
4
"fmt"
5
- "strconv"
6
5
7
6
crd "github.com/RedHatInsights/clowder/apis/cloud.redhat.com/v1alpha1"
8
7
"github.com/RedHatInsights/clowder/controllers/cloud.redhat.com/config"
9
- "github.com/RedHatInsights/clowder/controllers/cloud.redhat.com/errors"
10
8
"github.com/RedHatInsights/clowder/controllers/cloud.redhat.com/providers"
11
- "github.com/RedHatInsights/rhc-osdk-utils/utils"
12
9
13
10
core "k8s.io/api/core/v1"
14
- "k8s.io/apimachinery/pkg/types"
15
11
)
16
12
17
13
type managedKafkaProvider struct {
@@ -36,12 +32,12 @@ func (k *managedKafkaProvider) Provide(app *crd.ClowdApp) error {
36
32
var secret * core.Secret
37
33
var broker config.BrokerConfig
38
34
39
- secret , err = k . getSecret ()
35
+ secret , err = getSecret (k )
40
36
if err != nil {
41
37
return err
42
38
}
43
39
44
- broker , err = k . getBrokerConfig (secret )
40
+ broker , err = getBrokerConfig (k , secret )
45
41
if err != nil {
46
42
return err
47
43
}
@@ -68,52 +64,6 @@ func (k *managedKafkaProvider) appendTopic(topic crd.KafkaTopicSpec, kafkaConfig
68
64
)
69
65
}
70
66
71
- func (k * managedKafkaProvider ) destructureSecret (secret * core.Secret ) (int , string , string , string , string , string , error ) {
72
- port , err := strconv .ParseUint (string (secret .Data ["port" ]), 10 , 16 )
73
- if err != nil {
74
- return 0 , "" , "" , "" , "" , "" , err
75
- }
76
- password := string (secret .Data ["password" ])
77
- username := string (secret .Data ["username" ])
78
- hostname := string (secret .Data ["hostname" ])
79
- cacert := ""
80
- if val , ok := secret .Data ["cacert" ]; ok {
81
- cacert = string (val )
82
- }
83
- saslMechanism := "PLAIN"
84
- if val , ok := secret .Data ["saslMechanism" ]; ok {
85
- saslMechanism = string (val )
86
- }
87
- return int (port ), password , username , hostname , cacert , saslMechanism , nil
88
- }
89
-
90
- func (k * managedKafkaProvider ) getBrokerConfig (secret * core.Secret ) (config.BrokerConfig , error ) {
91
- broker := config.BrokerConfig {}
92
-
93
- port , password , username , hostname , cacert , saslMechanism , err := k .destructureSecret (secret )
94
- if err != nil {
95
- return broker , err
96
- }
97
-
98
- saslType := config .BrokerConfigAuthtypeSasl
99
-
100
- broker .Hostname = hostname
101
- broker .Port = & port
102
- broker .Authtype = & saslType
103
- if cacert != "" {
104
- broker .Cacert = & cacert
105
- }
106
- broker .Sasl = & config.KafkaSASLConfig {
107
- Password : & password ,
108
- Username : & username ,
109
- SecurityProtocol : utils .StringPtr ("SASL_SSL" ),
110
- SaslMechanism : utils .StringPtr (saslMechanism ),
111
- }
112
- broker .SecurityProtocol = utils .StringPtr ("SASL_SSL" )
113
-
114
- return broker , nil
115
- }
116
-
117
67
func (k * managedKafkaProvider ) getKafkaConfig (broker config.BrokerConfig , app * crd.ClowdApp ) * config.KafkaConfig {
118
68
kafkaConfig := & config.KafkaConfig {}
119
69
kafkaConfig .Brokers = []config.BrokerConfig {broker }
@@ -126,30 +76,3 @@ func (k *managedKafkaProvider) getKafkaConfig(broker config.BrokerConfig, app *c
126
76
return kafkaConfig
127
77
128
78
}
129
-
130
- func (k * managedKafkaProvider ) getSecret () (* core.Secret , error ) {
131
- secretRef , err := k .getSecretRef ()
132
- if err != nil {
133
- return nil , err
134
- }
135
-
136
- secret := & core.Secret {}
137
-
138
- if err = k .Client .Get (k .Ctx , secretRef , secret ); err != nil {
139
- return nil , err
140
- }
141
-
142
- return secret , nil
143
- }
144
-
145
- func (k * managedKafkaProvider ) getSecretRef () (types.NamespacedName , error ) {
146
- secretRef := types.NamespacedName {
147
- Name : k .Env .Spec .Providers .Kafka .ManagedSecretRef .Name ,
148
- Namespace : k .Env .Spec .Providers .Kafka .ManagedSecretRef .Namespace ,
149
- }
150
- nullName := types.NamespacedName {}
151
- if secretRef == nullName {
152
- return nullName , errors .NewClowderError ("no secret ref defined for managed Kafka" )
153
- }
154
- return secretRef , nil
155
- }
0 commit comments