mirror of
https://github.com/zitadel/zitadel.git
synced 2025-05-03 20:30:50 +00:00
fix(zitadelctl): implementation for commands in crd mode (#1685)
* fix(zitadelctl): implement takedown command * fix(zitadelctl): correct destroy flow * fix(zitadelctl): correct backup commands to read crds beforehand * fix: add of destroyfile * fix: clean for userlist * fix: determine mode by --gitops flag for backups * refactor: return error instead of higher order function * fix(destroy): needs no self-reconciling Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(destroy): needs no self-reconciling Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix(logs): fix double handled error Co-authored-by: Elio Bischof <eliobischof@gmail.com> Co-authored-by: Elio Bischof <eliobischof@gmail.com>
This commit is contained in:
parent
413ed80611
commit
25c9d7371d
@ -1,13 +1,9 @@
|
|||||||
package cmds
|
package cmds
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
|
||||||
|
|
||||||
"github.com/caos/orbos/pkg/git"
|
|
||||||
|
|
||||||
"github.com/caos/orbos/pkg/kubernetes/cli"
|
"github.com/caos/orbos/pkg/kubernetes/cli"
|
||||||
|
"github.com/caos/zitadel/pkg/databases"
|
||||||
|
|
||||||
"github.com/caos/zitadel/operator/crtlgitops"
|
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -36,25 +32,27 @@ func BackupCommand(getRv GetRootValues) *cobra.Command {
|
|||||||
monitor := rv.Monitor
|
monitor := rv.Monitor
|
||||||
orbConfig := rv.OrbConfig
|
orbConfig := rv.OrbConfig
|
||||||
gitClient := rv.GitClient
|
gitClient := rv.GitClient
|
||||||
version := rv.Version
|
|
||||||
|
|
||||||
if !rv.Gitops {
|
|
||||||
return errors.New("backup command is only supported with the --gitops flag yet")
|
|
||||||
}
|
|
||||||
|
|
||||||
k8sClient, err := cli.Client(monitor, orbConfig, gitClient, rv.Kubeconfig, rv.Gitops, true)
|
k8sClient, err := cli.Client(monitor, orbConfig, gitClient, rv.Kubeconfig, rv.Gitops, true)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
if gitClient.Exists(git.DatabaseFile) {
|
if rv.Gitops {
|
||||||
|
if err := databases.GitOpsInstantBackup(
|
||||||
if err := crtlgitops.Backup(
|
monitor,
|
||||||
|
k8sClient,
|
||||||
|
gitClient,
|
||||||
|
backup,
|
||||||
|
); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
} else {
|
||||||
|
if err := databases.CrdInstantBackup(
|
||||||
monitor,
|
monitor,
|
||||||
orbConfig.Path,
|
|
||||||
k8sClient,
|
k8sClient,
|
||||||
backup,
|
backup,
|
||||||
&version,
|
|
||||||
); err != nil {
|
); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@ -1,10 +1,11 @@
|
|||||||
package cmds
|
package cmds
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"sort"
|
"sort"
|
||||||
|
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes/cli"
|
||||||
|
|
||||||
"github.com/caos/zitadel/pkg/databases"
|
"github.com/caos/zitadel/pkg/databases"
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
)
|
)
|
||||||
@ -31,24 +32,26 @@ func BackupListCommand(getRv GetRootValues) *cobra.Command {
|
|||||||
orbConfig := rv.OrbConfig
|
orbConfig := rv.OrbConfig
|
||||||
gitClient := rv.GitClient
|
gitClient := rv.GitClient
|
||||||
|
|
||||||
if !rv.Gitops {
|
backups := make([]string, 0)
|
||||||
return errors.New("backuplist command is only supported with the --gitops flag yet")
|
k8sClient, err := cli.Client(monitor, orbConfig, rv.GitClient, rv.Kubeconfig, rv.Gitops, true)
|
||||||
}
|
|
||||||
|
|
||||||
if err := gitClient.Configure(orbConfig.URL, []byte(orbConfig.Repokey)); err != nil {
|
|
||||||
monitor.Error(err)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := gitClient.Clone(); err != nil {
|
|
||||||
monitor.Error(err)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
backups, err := databases.ListBackups(monitor, gitClient)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
monitor.Error(err)
|
return err
|
||||||
return nil
|
}
|
||||||
|
|
||||||
|
if rv.Gitops {
|
||||||
|
backupsT, err := databases.GitOpsListBackups(monitor, gitClient, k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
monitor.Error(err)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
backups = backupsT
|
||||||
|
} else {
|
||||||
|
backupsT, err := databases.CrdListBackups(monitor, k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
monitor.Error(err)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
backups = backupsT
|
||||||
}
|
}
|
||||||
|
|
||||||
sort.Slice(backups, func(i, j int) bool {
|
sort.Slice(backups, func(i, j int) bool {
|
||||||
|
165
cmd/zitadelctl/cmds/destroy.go
Normal file
165
cmd/zitadelctl/cmds/destroy.go
Normal file
@ -0,0 +1,165 @@
|
|||||||
|
package cmds
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/git"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes/cli"
|
||||||
|
"github.com/caos/zitadel/operator/crtlcrd"
|
||||||
|
"github.com/caos/zitadel/operator/crtlgitops"
|
||||||
|
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||||
|
orbzit "github.com/caos/zitadel/operator/zitadel/kinds/orb"
|
||||||
|
kuberneteszit "github.com/caos/zitadel/pkg/kubernetes"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TeardownCommand(getRv GetRootValues) *cobra.Command {
|
||||||
|
|
||||||
|
var (
|
||||||
|
cmd = &cobra.Command{
|
||||||
|
Use: "teardown",
|
||||||
|
Short: "Tear down an Orb",
|
||||||
|
Long: "Destroys a whole Orb",
|
||||||
|
Aliases: []string{
|
||||||
|
"shoot",
|
||||||
|
"destroy",
|
||||||
|
"devastate",
|
||||||
|
"annihilate",
|
||||||
|
"crush",
|
||||||
|
"bulldoze",
|
||||||
|
"total",
|
||||||
|
"smash",
|
||||||
|
"decimate",
|
||||||
|
"kill",
|
||||||
|
"trash",
|
||||||
|
"wipe-off-the-map",
|
||||||
|
"pulverize",
|
||||||
|
"take-apart",
|
||||||
|
"destruct",
|
||||||
|
"obliterate",
|
||||||
|
"disassemble",
|
||||||
|
"explode",
|
||||||
|
"blow-up",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
cmd.RunE = func(cmd *cobra.Command, args []string) (err error) {
|
||||||
|
|
||||||
|
rv, err := getRv()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
err = rv.ErrFunc(err)
|
||||||
|
}()
|
||||||
|
|
||||||
|
monitor := rv.Monitor
|
||||||
|
orbConfig := rv.OrbConfig
|
||||||
|
gitClient := rv.GitClient
|
||||||
|
version := rv.Version
|
||||||
|
|
||||||
|
k8sClient, err := cli.Client(
|
||||||
|
monitor,
|
||||||
|
orbConfig,
|
||||||
|
gitClient,
|
||||||
|
rv.Kubeconfig,
|
||||||
|
rv.Gitops,
|
||||||
|
true,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
monitor.WithFields(map[string]interface{}{
|
||||||
|
"version": version,
|
||||||
|
}).Info("Destroying Orb")
|
||||||
|
|
||||||
|
if err := kuberneteszit.ScaleZitadelOperator(monitor, k8sClient, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := kuberneteszit.ScaleDatabaseOperator(monitor, k8sClient, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if rv.Gitops {
|
||||||
|
if err := crtlgitops.DestroyOperator(monitor, orbConfig.Path, k8sClient, &version, rv.Gitops); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := crtlgitops.DestroyDatabase(monitor, orbConfig.Path, k8sClient, &version, rv.Gitops); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if err := crtlcrd.Destroy(monitor, k8sClient, version, "zitadel", "database"); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := destroyOperator(monitor, gitClient, k8sClient, rv.Gitops); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := destroyDatabase(monitor, gitClient, k8sClient, rv.Gitops); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func destroyOperator(monitor mntr.Monitor, gitClient *git.Client, k8sClient kubernetes.ClientInt, gitops bool) error {
|
||||||
|
if gitops {
|
||||||
|
if gitClient.Exists(git.ZitadelFile) {
|
||||||
|
desiredTree, err := gitClient.ReadTree(git.ZitadelFile)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
desired, err := orbzit.ParseDesiredV0(desiredTree)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
spec := desired.Spec
|
||||||
|
|
||||||
|
_, del := orbzit.Reconcile(monitor, spec, gitops)
|
||||||
|
if err := del(k8sClient); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
_, del := orbzit.Reconcile(monitor, &orbzit.Spec{}, gitops)
|
||||||
|
if err := del(k8sClient); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func destroyDatabase(monitor mntr.Monitor, gitClient *git.Client, k8sClient kubernetes.ClientInt, gitops bool) error {
|
||||||
|
if gitops {
|
||||||
|
if gitClient.Exists(git.DatabaseFile) {
|
||||||
|
desiredTree, err := gitClient.ReadTree(git.DatabaseFile)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
desired, err := orbdb.ParseDesiredV0(desiredTree)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
spec := desired.Spec
|
||||||
|
|
||||||
|
_, del := orbdb.Reconcile(monitor, spec, gitops)
|
||||||
|
if err := del(k8sClient); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
_, del := orbdb.Reconcile(monitor, &orbdb.Spec{}, gitops)
|
||||||
|
if err := del(k8sClient); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
@ -2,10 +2,10 @@ package cmds
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
|
"github.com/caos/zitadel/pkg/zitadel"
|
||||||
|
|
||||||
"github.com/caos/orbos/pkg/kubernetes/cli"
|
"github.com/caos/orbos/pkg/kubernetes/cli"
|
||||||
|
|
||||||
"github.com/caos/zitadel/operator/crtlgitops"
|
|
||||||
"github.com/caos/zitadel/pkg/databases"
|
"github.com/caos/zitadel/pkg/databases"
|
||||||
"github.com/manifoldco/promptui"
|
"github.com/manifoldco/promptui"
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
@ -39,19 +39,26 @@ func RestoreCommand(getRv GetRootValues) *cobra.Command {
|
|||||||
gitClient := rv.GitClient
|
gitClient := rv.GitClient
|
||||||
version := rv.Version
|
version := rv.Version
|
||||||
|
|
||||||
if !rv.Gitops {
|
|
||||||
return errors.New("restore command is only supported with the --gitops flag yet")
|
|
||||||
}
|
|
||||||
|
|
||||||
k8sClient, err := cli.Client(monitor, orbConfig, gitClient, rv.Kubeconfig, rv.Gitops, true)
|
k8sClient, err := cli.Client(monitor, orbConfig, gitClient, rv.Kubeconfig, rv.Gitops, true)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
list, err := databases.ListBackups(monitor, gitClient)
|
list := make([]string, 0)
|
||||||
if err != nil {
|
if rv.Gitops {
|
||||||
monitor.Error(err)
|
listT, err := databases.GitOpsListBackups(monitor, gitClient, k8sClient)
|
||||||
return nil
|
if err != nil {
|
||||||
|
monitor.Error(err)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
list = listT
|
||||||
|
} else {
|
||||||
|
listT, err := databases.CrdListBackups(monitor, k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
monitor.Error(err)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
list = listT
|
||||||
}
|
}
|
||||||
|
|
||||||
if backup == "" {
|
if backup == "" {
|
||||||
@ -79,8 +86,17 @@ func RestoreCommand(getRv GetRootValues) *cobra.Command {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := crtlgitops.Restore(monitor, gitClient, orbConfig, k8sClient, backup, rv.Gitops, &version); err != nil {
|
if rv.Gitops {
|
||||||
monitor.Error(err)
|
if err := zitadel.GitOpsClearMigrateRestore(monitor, gitClient, orbConfig, k8sClient, backup, &version); err != nil {
|
||||||
|
monitor.Error(err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if err := zitadel.CrdClearMigrateRestore(monitor, k8sClient, backup, &version); err != nil {
|
||||||
|
monitor.Error(err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
@ -106,7 +106,8 @@ func deployOperator(monitor mntr.Monitor, gitClient *git.Client, k8sClient kuber
|
|||||||
|
|
||||||
// at takeoff the artifacts have to be applied
|
// at takeoff the artifacts have to be applied
|
||||||
spec.SelfReconciling = true
|
spec.SelfReconciling = true
|
||||||
if err := orbzit.Reconcile(monitor, spec, gitops)(k8sClient); err != nil {
|
rec, _ := orbzit.Reconcile(monitor, spec, gitops)
|
||||||
|
if err := rec(k8sClient); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -117,7 +118,8 @@ func deployOperator(monitor mntr.Monitor, gitClient *git.Client, k8sClient kuber
|
|||||||
SelfReconciling: true,
|
SelfReconciling: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := orbzit.Reconcile(monitor, spec, gitops)(k8sClient); err != nil {
|
rec, _ := orbzit.Reconcile(monitor, spec, gitops)
|
||||||
|
if err := rec(k8sClient); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -140,11 +142,8 @@ func deployDatabase(monitor mntr.Monitor, gitClient *git.Client, k8sClient kuber
|
|||||||
|
|
||||||
// at takeoff the artifacts have to be applied
|
// at takeoff the artifacts have to be applied
|
||||||
spec.SelfReconciling = true
|
spec.SelfReconciling = true
|
||||||
if err := orbdb.Reconcile(
|
rec, _ := orbdb.Reconcile(monitor, desired.Spec, gitops)
|
||||||
monitor,
|
if err := rec(k8sClient); err != nil {
|
||||||
spec,
|
|
||||||
gitops,
|
|
||||||
)(k8sClient); err != nil {
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -155,11 +154,8 @@ func deployDatabase(monitor mntr.Monitor, gitClient *git.Client, k8sClient kuber
|
|||||||
SelfReconciling: true,
|
SelfReconciling: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := orbdb.Reconcile(
|
rec, _ := orbdb.Reconcile(monitor, spec, gitops)
|
||||||
monitor,
|
if err := rec(k8sClient); err != nil {
|
||||||
spec,
|
|
||||||
gitops,
|
|
||||||
)(k8sClient); err != nil {
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -27,6 +27,7 @@ func main() {
|
|||||||
cmds.BackupCommand(rootValues),
|
cmds.BackupCommand(rootValues),
|
||||||
cmds.StartDatabase(rootValues),
|
cmds.StartDatabase(rootValues),
|
||||||
cmds.ConfigCommand(rootValues, githubClientID, githubClientSecret),
|
cmds.ConfigCommand(rootValues, githubClientID, githubClientSecret),
|
||||||
|
cmds.TeardownCommand(rootValues),
|
||||||
)
|
)
|
||||||
|
|
||||||
if err := rootCmd.Execute(); err != nil {
|
if err := rootCmd.Execute(); err != nil {
|
||||||
|
@ -19,8 +19,8 @@ import (
|
|||||||
"github.com/caos/zitadel/internal/domain"
|
"github.com/caos/zitadel/internal/domain"
|
||||||
"github.com/caos/zitadel/internal/form"
|
"github.com/caos/zitadel/internal/form"
|
||||||
"github.com/caos/zitadel/internal/id"
|
"github.com/caos/zitadel/internal/id"
|
||||||
"github.com/caos/zitadel/internal/static"
|
|
||||||
"github.com/caos/zitadel/internal/query"
|
"github.com/caos/zitadel/internal/query"
|
||||||
|
"github.com/caos/zitadel/internal/static"
|
||||||
_ "github.com/caos/zitadel/internal/ui/login/statik"
|
_ "github.com/caos/zitadel/internal/ui/login/statik"
|
||||||
usr_model "github.com/caos/zitadel/internal/user/model"
|
usr_model "github.com/caos/zitadel/internal/user/model"
|
||||||
"github.com/gorilla/csrf"
|
"github.com/gorilla/csrf"
|
||||||
|
32
operator/crtlcrd/backup.go
Normal file
32
operator/crtlcrd/backup.go
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
package crtlcrd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
"github.com/caos/orbos/pkg/tree"
|
||||||
|
"github.com/caos/zitadel/operator/api/database"
|
||||||
|
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||||
|
)
|
||||||
|
|
||||||
|
func Restore(monitor mntr.Monitor, k8sClient *kubernetes.Client, backup string, binaryVersion *string) error {
|
||||||
|
desired, err := database.ReadCrd(k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
query, _, _, _, _, _, err := orbdb.AdaptFunc(backup, binaryVersion, false, "restore")(monitor, desired, &tree.Tree{})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
ensure, err := query(k8sClient, map[string]interface{}{})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := ensure(k8sClient); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
26
operator/crtlcrd/database/destroy.go
Normal file
26
operator/crtlcrd/database/destroy.go
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
package database
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
"github.com/caos/orbos/pkg/tree"
|
||||||
|
"github.com/caos/zitadel/operator/api/database"
|
||||||
|
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||||
|
)
|
||||||
|
|
||||||
|
func Destroy(monitor mntr.Monitor, k8sClient kubernetes.ClientInt, version string) error {
|
||||||
|
desired, err := database.ReadCrd(k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if desired != nil {
|
||||||
|
_, destroy, _, _, _, _, err := orbdb.AdaptFunc("", &version, false, "database")(monitor, desired, &tree.Tree{})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return destroy(k8sClient)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
24
operator/crtlcrd/destroy.go
Normal file
24
operator/crtlcrd/destroy.go
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
package crtlcrd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
"github.com/caos/zitadel/operator/crtlcrd/database"
|
||||||
|
"github.com/caos/zitadel/operator/crtlcrd/zitadel"
|
||||||
|
)
|
||||||
|
|
||||||
|
func Destroy(monitor mntr.Monitor, k8sClient kubernetes.ClientInt, version string, features ...string) error {
|
||||||
|
for _, feature := range features {
|
||||||
|
switch feature {
|
||||||
|
case Zitadel:
|
||||||
|
if err := zitadel.Destroy(monitor, k8sClient, version); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
case Database:
|
||||||
|
if err := database.Destroy(monitor, k8sClient, version); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
26
operator/crtlcrd/zitadel/destroy.go
Normal file
26
operator/crtlcrd/zitadel/destroy.go
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
package zitadel
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
"github.com/caos/orbos/pkg/tree"
|
||||||
|
"github.com/caos/zitadel/operator/api/zitadel"
|
||||||
|
orbz "github.com/caos/zitadel/operator/zitadel/kinds/orb"
|
||||||
|
)
|
||||||
|
|
||||||
|
func Destroy(monitor mntr.Monitor, k8sClient kubernetes.ClientInt, version string) error {
|
||||||
|
desired, err := zitadel.ReadCrd(k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if desired != nil {
|
||||||
|
_, destroy, _, _, _, _, err := orbz.AdaptFunc(nil, "ensure", &version, false, []string{"operator", "iam"})(monitor, desired, &tree.Tree{})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return destroy(k8sClient)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
44
operator/crtlgitops/destroy.go
Normal file
44
operator/crtlgitops/destroy.go
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
package crtlgitops
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/git"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
orbconfig "github.com/caos/orbos/pkg/orb"
|
||||||
|
"github.com/caos/zitadel/operator/database"
|
||||||
|
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||||
|
"github.com/caos/zitadel/operator/zitadel"
|
||||||
|
orbz "github.com/caos/zitadel/operator/zitadel/kinds/orb"
|
||||||
|
)
|
||||||
|
|
||||||
|
func DestroyOperator(monitor mntr.Monitor, orbConfigPath string, k8sClient *kubernetes.Client, version *string, gitops bool) error {
|
||||||
|
|
||||||
|
orbConfig, err := orbconfig.ParseOrbConfig(orbConfigPath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
gitClient := git.New(context.Background(), monitor, "orbos", "orbos@caos.ch")
|
||||||
|
if err := gitClient.Configure(orbConfig.URL, []byte(orbConfig.Repokey)); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return zitadel.Destroy(monitor, gitClient, orbz.AdaptFunc(orbConfig, "ensure", version, gitops, []string{"zitadel", "iam"}), k8sClient)
|
||||||
|
}
|
||||||
|
|
||||||
|
func DestroyDatabase(monitor mntr.Monitor, orbConfigPath string, k8sClient *kubernetes.Client, version *string, gitops bool) error {
|
||||||
|
|
||||||
|
orbConfig, err := orbconfig.ParseOrbConfig(orbConfigPath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
gitClient := git.New(context.Background(), monitor, "orbos", "orbos@caos.ch")
|
||||||
|
if err := gitClient.Configure(orbConfig.URL, []byte(orbConfig.Repokey)); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return database.Destroy(monitor, gitClient, orbdb.AdaptFunc("", version, gitops, "operator", "database", "backup"), k8sClient)
|
||||||
|
}
|
@ -13,8 +13,6 @@ import (
|
|||||||
"github.com/caos/orbos/pkg/kubernetes"
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
orbconfig "github.com/caos/orbos/pkg/orb"
|
orbconfig "github.com/caos/orbos/pkg/orb"
|
||||||
"github.com/caos/zitadel/operator/zitadel/kinds/orb"
|
"github.com/caos/zitadel/operator/zitadel/kinds/orb"
|
||||||
"github.com/caos/zitadel/pkg/databases"
|
|
||||||
kubernetes2 "github.com/caos/zitadel/pkg/kubernetes"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func Operator(monitor mntr.Monitor, orbConfigPath string, k8sClient *kubernetes.Client, version *string, gitops bool) error {
|
func Operator(monitor mntr.Monitor, orbConfigPath string, k8sClient *kubernetes.Client, version *string, gitops bool) error {
|
||||||
@ -54,61 +52,6 @@ func Operator(monitor mntr.Monitor, orbConfigPath string, k8sClient *kubernetes.
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func Restore(
|
|
||||||
monitor mntr.Monitor,
|
|
||||||
gitClient *git.Client,
|
|
||||||
orbCfg *orbconfig.Orb,
|
|
||||||
k8sClient *kubernetes.Client,
|
|
||||||
backup string,
|
|
||||||
gitops bool,
|
|
||||||
version *string,
|
|
||||||
) error {
|
|
||||||
databasesList := []string{
|
|
||||||
"notification",
|
|
||||||
"adminapi",
|
|
||||||
"auth",
|
|
||||||
"authz",
|
|
||||||
"eventstore",
|
|
||||||
"management",
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := kubernetes2.ScaleZitadelOperator(monitor, k8sClient, 0); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := zitadel.Takeoff(monitor, gitClient, orb.AdaptFunc(orbCfg, "scaledown", version, gitops, []string{"scaledown"}), k8sClient)(); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := databases.Clear(monitor, k8sClient, gitClient, databasesList); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := zitadel.Takeoff(monitor, gitClient, orb.AdaptFunc(orbCfg, "migration", version, gitops, []string{"migration"}), k8sClient)(); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := databases.Restore(
|
|
||||||
monitor,
|
|
||||||
k8sClient,
|
|
||||||
gitClient,
|
|
||||||
backup,
|
|
||||||
databasesList,
|
|
||||||
); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := zitadel.Takeoff(monitor, gitClient, orb.AdaptFunc(orbCfg, "scaleup", version, gitops, []string{"scaleup"}), k8sClient)(); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := kubernetes2.ScaleZitadelOperator(monitor, k8sClient, 1); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func Database(monitor mntr.Monitor, orbConfigPath string, k8sClient *kubernetes.Client, binaryVersion *string, gitops bool) error {
|
func Database(monitor mntr.Monitor, orbConfigPath string, k8sClient *kubernetes.Client, binaryVersion *string, gitops bool) error {
|
||||||
takeoffChan := make(chan struct{})
|
takeoffChan := make(chan struct{})
|
||||||
go func() {
|
go func() {
|
||||||
@ -145,20 +88,3 @@ func Database(monitor mntr.Monitor, orbConfigPath string, k8sClient *kubernetes.
|
|||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func Backup(monitor mntr.Monitor, orbConfigPath string, k8sClient *kubernetes.Client, backup string, binaryVersion *string) error {
|
|
||||||
orbConfig, err := orbconfig.ParseOrbConfig(orbConfigPath)
|
|
||||||
if err != nil {
|
|
||||||
monitor.Error(err)
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
gitClient := git.New(context.Background(), monitor, "orbos", "orbos@caos.ch")
|
|
||||||
if err := gitClient.Configure(orbConfig.URL, []byte(orbConfig.Repokey)); err != nil {
|
|
||||||
monitor.Error(err)
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
database.Takeoff(monitor, gitClient, orbdb.AdaptFunc(backup, binaryVersion, false, "instantbackup"), k8sClient)()
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
34
operator/database/destroy.go
Normal file
34
operator/database/destroy.go
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
package database
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/git"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
"github.com/caos/orbos/pkg/tree"
|
||||||
|
"github.com/caos/zitadel/operator"
|
||||||
|
)
|
||||||
|
|
||||||
|
func Destroy(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
gitClient *git.Client,
|
||||||
|
adapt operator.AdaptFunc,
|
||||||
|
k8sClient *kubernetes.Client,
|
||||||
|
) error {
|
||||||
|
internalMonitor := monitor.WithField("operator", "database")
|
||||||
|
internalMonitor.Info("Destroy")
|
||||||
|
treeDesired, err := operator.Parse(gitClient, "database.yml")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
treeCurrent := &tree.Tree{}
|
||||||
|
|
||||||
|
_, destroy, _, _, _, _, err := adapt(internalMonitor, treeDesired, treeCurrent)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := destroy(k8sClient); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
@ -2,6 +2,7 @@ package backups
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"github.com/caos/orbos/mntr"
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
"github.com/caos/orbos/pkg/labels"
|
"github.com/caos/orbos/pkg/labels"
|
||||||
"github.com/caos/orbos/pkg/secret"
|
"github.com/caos/orbos/pkg/secret"
|
||||||
"github.com/caos/orbos/pkg/tree"
|
"github.com/caos/orbos/pkg/tree"
|
||||||
@ -61,6 +62,7 @@ func Adapt(
|
|||||||
|
|
||||||
func GetBackupList(
|
func GetBackupList(
|
||||||
monitor mntr.Monitor,
|
monitor mntr.Monitor,
|
||||||
|
k8sClient kubernetes.ClientInt,
|
||||||
name string,
|
name string,
|
||||||
desiredTree *tree.Tree,
|
desiredTree *tree.Tree,
|
||||||
) (
|
) (
|
||||||
@ -69,7 +71,7 @@ func GetBackupList(
|
|||||||
) {
|
) {
|
||||||
switch desiredTree.Common.Kind {
|
switch desiredTree.Common.Kind {
|
||||||
case "databases.caos.ch/BucketBackup":
|
case "databases.caos.ch/BucketBackup":
|
||||||
return bucket.BackupList()(monitor, name, desiredTree)
|
return bucket.BackupList()(monitor, k8sClient, name, desiredTree)
|
||||||
default:
|
default:
|
||||||
return nil, errors.Errorf("unknown database kind %s", desiredTree.Common.Kind)
|
return nil, errors.Errorf("unknown database kind %s", desiredTree.Common.Kind)
|
||||||
}
|
}
|
||||||
|
@ -116,6 +116,7 @@ func AdaptFunc(
|
|||||||
namespace,
|
namespace,
|
||||||
componentLabels,
|
componentLabels,
|
||||||
[]string{},
|
[]string{},
|
||||||
|
[]string{},
|
||||||
nodeselector,
|
nodeselector,
|
||||||
tolerations,
|
tolerations,
|
||||||
checkDBReady,
|
checkDBReady,
|
||||||
@ -162,6 +163,11 @@ func AdaptFunc(
|
|||||||
databases = []string{}
|
databases = []string{}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
users, err := currentDB.GetListUsersFunc()(k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
users = []string{}
|
||||||
|
}
|
||||||
|
|
||||||
value, err := read.GetSecretValue(k8sClient, desiredKind.Spec.ServiceAccountJSON, desiredKind.Spec.ExistingServiceAccountJSON)
|
value, err := read.GetSecretValue(k8sClient, desiredKind.Spec.ServiceAccountJSON, desiredKind.Spec.ExistingServiceAccountJSON)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@ -218,6 +224,7 @@ func AdaptFunc(
|
|||||||
namespace,
|
namespace,
|
||||||
componentLabels,
|
componentLabels,
|
||||||
databases,
|
databases,
|
||||||
|
users,
|
||||||
nodeselector,
|
nodeselector,
|
||||||
tolerations,
|
tolerations,
|
||||||
checkDBReady,
|
checkDBReady,
|
||||||
|
@ -153,7 +153,7 @@ func TestBucket_AdaptBackup(t *testing.T) {
|
|||||||
|
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
databases := []string{"test1", "test2"}
|
databases := []string{"test1", "test2"}
|
||||||
queried := SetQueriedForDatabases(databases)
|
queried := SetQueriedForDatabases(databases, []string{})
|
||||||
ensure, err := query(client, queried)
|
ensure, err := query(client, queried)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
assert.NotNil(t, ensure)
|
assert.NotNil(t, ensure)
|
||||||
@ -228,7 +228,7 @@ func TestBucket_AdaptInstantBackup(t *testing.T) {
|
|||||||
|
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
databases := []string{"test1", "test2"}
|
databases := []string{"test1", "test2"}
|
||||||
queried := SetQueriedForDatabases(databases)
|
queried := SetQueriedForDatabases(databases, []string{})
|
||||||
ensure, err := query(client, queried)
|
ensure, err := query(client, queried)
|
||||||
assert.NotNil(t, ensure)
|
assert.NotNil(t, ensure)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
@ -304,7 +304,7 @@ func TestBucket_AdaptRestore(t *testing.T) {
|
|||||||
|
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
databases := []string{"test1", "test2"}
|
databases := []string{"test1", "test2"}
|
||||||
queried := SetQueriedForDatabases(databases)
|
queried := SetQueriedForDatabases(databases, []string{})
|
||||||
ensure, err := query(client, queried)
|
ensure, err := query(client, queried)
|
||||||
assert.NotNil(t, ensure)
|
assert.NotNil(t, ensure)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
@ -380,7 +380,8 @@ func TestBucket_AdaptClean(t *testing.T) {
|
|||||||
|
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
databases := []string{"test1", "test2"}
|
databases := []string{"test1", "test2"}
|
||||||
queried := SetQueriedForDatabases(databases)
|
users := []string{"test1", "test2"}
|
||||||
|
queried := SetQueriedForDatabases(databases, users)
|
||||||
ensure, err := query(client, queried)
|
ensure, err := query(client, queried)
|
||||||
assert.NotNil(t, ensure)
|
assert.NotNil(t, ensure)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
|
@ -30,6 +30,7 @@ func AdaptFunc(
|
|||||||
namespace string,
|
namespace string,
|
||||||
componentLabels *labels.Component,
|
componentLabels *labels.Component,
|
||||||
databases []string,
|
databases []string,
|
||||||
|
users []string,
|
||||||
nodeselector map[string]string,
|
nodeselector map[string]string,
|
||||||
tolerations []corev1.Toleration,
|
tolerations []corev1.Toleration,
|
||||||
checkDBReady operator.EnsureFunc,
|
checkDBReady operator.EnsureFunc,
|
||||||
@ -42,7 +43,7 @@ func AdaptFunc(
|
|||||||
err error,
|
err error,
|
||||||
) {
|
) {
|
||||||
|
|
||||||
command := getCommand(databases)
|
command := getCommand(databases, users)
|
||||||
|
|
||||||
jobDef := getJob(
|
jobDef := getJob(
|
||||||
namespace,
|
namespace,
|
||||||
|
@ -20,6 +20,7 @@ func TestBackup_Adapt1(t *testing.T) {
|
|||||||
monitor := mntr.Monitor{}
|
monitor := mntr.Monitor{}
|
||||||
namespace := "testNs"
|
namespace := "testNs"
|
||||||
databases := []string{"testDb"}
|
databases := []string{"testDb"}
|
||||||
|
users := []string{"testUser"}
|
||||||
nodeselector := map[string]string{"test": "test"}
|
nodeselector := map[string]string{"test": "test"}
|
||||||
tolerations := []corev1.Toleration{
|
tolerations := []corev1.Toleration{
|
||||||
{Key: "testKey", Operator: "testOp"}}
|
{Key: "testKey", Operator: "testOp"}}
|
||||||
@ -44,6 +45,7 @@ func TestBackup_Adapt1(t *testing.T) {
|
|||||||
secretKey,
|
secretKey,
|
||||||
getCommand(
|
getCommand(
|
||||||
databases,
|
databases,
|
||||||
|
users,
|
||||||
),
|
),
|
||||||
image,
|
image,
|
||||||
)
|
)
|
||||||
@ -57,6 +59,7 @@ func TestBackup_Adapt1(t *testing.T) {
|
|||||||
namespace,
|
namespace,
|
||||||
componentLabels,
|
componentLabels,
|
||||||
databases,
|
databases,
|
||||||
|
users,
|
||||||
nodeselector,
|
nodeselector,
|
||||||
tolerations,
|
tolerations,
|
||||||
checkDBReady,
|
checkDBReady,
|
||||||
@ -78,6 +81,7 @@ func TestBackup_Adapt2(t *testing.T) {
|
|||||||
monitor := mntr.Monitor{}
|
monitor := mntr.Monitor{}
|
||||||
namespace := "testNs2"
|
namespace := "testNs2"
|
||||||
databases := []string{"testDb1", "testDb2"}
|
databases := []string{"testDb1", "testDb2"}
|
||||||
|
users := []string{"testUser1", "testUser2"}
|
||||||
nodeselector := map[string]string{"test2": "test2"}
|
nodeselector := map[string]string{"test2": "test2"}
|
||||||
tolerations := []corev1.Toleration{
|
tolerations := []corev1.Toleration{
|
||||||
{Key: "testKey2", Operator: "testOp2"}}
|
{Key: "testKey2", Operator: "testOp2"}}
|
||||||
@ -102,6 +106,7 @@ func TestBackup_Adapt2(t *testing.T) {
|
|||||||
secretKey,
|
secretKey,
|
||||||
getCommand(
|
getCommand(
|
||||||
databases,
|
databases,
|
||||||
|
users,
|
||||||
),
|
),
|
||||||
image,
|
image,
|
||||||
)
|
)
|
||||||
@ -115,6 +120,7 @@ func TestBackup_Adapt2(t *testing.T) {
|
|||||||
namespace,
|
namespace,
|
||||||
componentLabels,
|
componentLabels,
|
||||||
databases,
|
databases,
|
||||||
|
users,
|
||||||
nodeselector,
|
nodeselector,
|
||||||
tolerations,
|
tolerations,
|
||||||
checkDBReady,
|
checkDBReady,
|
||||||
|
@ -4,6 +4,7 @@ import "strings"
|
|||||||
|
|
||||||
func getCommand(
|
func getCommand(
|
||||||
databases []string,
|
databases []string,
|
||||||
|
users []string,
|
||||||
) string {
|
) string {
|
||||||
backupCommands := make([]string, 0)
|
backupCommands := make([]string, 0)
|
||||||
for _, database := range databases {
|
for _, database := range databases {
|
||||||
@ -14,12 +15,12 @@ func getCommand(
|
|||||||
database,
|
database,
|
||||||
}, " "))
|
}, " "))
|
||||||
}
|
}
|
||||||
for _, database := range databases {
|
for _, user := range users {
|
||||||
backupCommands = append(backupCommands,
|
backupCommands = append(backupCommands,
|
||||||
strings.Join([]string{
|
strings.Join([]string{
|
||||||
"/scripts/clean-user.sh",
|
"/scripts/clean-user.sh",
|
||||||
certPath,
|
certPath,
|
||||||
database,
|
user,
|
||||||
}, " "))
|
}, " "))
|
||||||
}
|
}
|
||||||
backupCommands = append(backupCommands,
|
backupCommands = append(backupCommands,
|
||||||
|
@ -7,8 +7,9 @@ import (
|
|||||||
|
|
||||||
func TestClean_Command1(t *testing.T) {
|
func TestClean_Command1(t *testing.T) {
|
||||||
databases := []string{}
|
databases := []string{}
|
||||||
|
users := []string{}
|
||||||
|
|
||||||
cmd := getCommand(databases)
|
cmd := getCommand(databases, users)
|
||||||
equals := "/scripts/clean-migration.sh " + certPath
|
equals := "/scripts/clean-migration.sh " + certPath
|
||||||
|
|
||||||
assert.Equal(t, equals, cmd)
|
assert.Equal(t, equals, cmd)
|
||||||
@ -16,8 +17,9 @@ func TestClean_Command1(t *testing.T) {
|
|||||||
|
|
||||||
func TestClean_Command2(t *testing.T) {
|
func TestClean_Command2(t *testing.T) {
|
||||||
databases := []string{"test"}
|
databases := []string{"test"}
|
||||||
|
users := []string{"test"}
|
||||||
|
|
||||||
cmd := getCommand(databases)
|
cmd := getCommand(databases, users)
|
||||||
equals := "/scripts/clean-db.sh " + certPath + " test && /scripts/clean-user.sh " + certPath + " test && /scripts/clean-migration.sh " + certPath
|
equals := "/scripts/clean-db.sh " + certPath + " test && /scripts/clean-user.sh " + certPath + " test && /scripts/clean-migration.sh " + certPath
|
||||||
|
|
||||||
assert.Equal(t, equals, cmd)
|
assert.Equal(t, equals, cmd)
|
||||||
@ -25,8 +27,9 @@ func TestClean_Command2(t *testing.T) {
|
|||||||
|
|
||||||
func TestClean_Command3(t *testing.T) {
|
func TestClean_Command3(t *testing.T) {
|
||||||
databases := []string{"test1", "test2", "test3"}
|
databases := []string{"test1", "test2", "test3"}
|
||||||
|
users := []string{"test1", "test2", "test3"}
|
||||||
|
|
||||||
cmd := getCommand(databases)
|
cmd := getCommand(databases, users)
|
||||||
equals := "/scripts/clean-db.sh " + certPath + " test1 && /scripts/clean-db.sh " + certPath + " test2 && /scripts/clean-db.sh " + certPath + " test3 && " +
|
equals := "/scripts/clean-db.sh " + certPath + " test1 && /scripts/clean-db.sh " + certPath + " test2 && /scripts/clean-db.sh " + certPath + " test3 && " +
|
||||||
"/scripts/clean-user.sh " + certPath + " test1 && /scripts/clean-user.sh " + certPath + " test2 && /scripts/clean-user.sh " + certPath + " test3 && " +
|
"/scripts/clean-user.sh " + certPath + " test1 && /scripts/clean-user.sh " + certPath + " test2 && /scripts/clean-user.sh " + certPath + " test3 && " +
|
||||||
"/scripts/clean-migration.sh " + certPath
|
"/scripts/clean-migration.sh " + certPath
|
||||||
|
@ -4,6 +4,8 @@ import (
|
|||||||
"cloud.google.com/go/storage"
|
"cloud.google.com/go/storage"
|
||||||
"context"
|
"context"
|
||||||
"github.com/caos/orbos/mntr"
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
"github.com/caos/orbos/pkg/secret/read"
|
||||||
"github.com/caos/orbos/pkg/tree"
|
"github.com/caos/orbos/pkg/tree"
|
||||||
"github.com/caos/zitadel/operator/database/kinds/backups/core"
|
"github.com/caos/zitadel/operator/database/kinds/backups/core"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
@ -13,7 +15,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func BackupList() core.BackupListFunc {
|
func BackupList() core.BackupListFunc {
|
||||||
return func(monitor mntr.Monitor, name string, desired *tree.Tree) ([]string, error) {
|
return func(monitor mntr.Monitor, k8sClient kubernetes.ClientInt, name string, desired *tree.Tree) ([]string, error) {
|
||||||
desiredKind, err := ParseDesiredV0(desired)
|
desiredKind, err := ParseDesiredV0(desired)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.Wrap(err, "parsing desired state failed")
|
return nil, errors.Wrap(err, "parsing desired state failed")
|
||||||
@ -24,7 +26,12 @@ func BackupList() core.BackupListFunc {
|
|||||||
monitor.Verbose()
|
monitor.Verbose()
|
||||||
}
|
}
|
||||||
|
|
||||||
return listFilesWithFilter(desiredKind.Spec.ServiceAccountJSON.Value, desiredKind.Spec.Bucket, name)
|
value, err := read.GetSecretValue(k8sClient, desiredKind.Spec.ServiceAccountJSON, desiredKind.Spec.ExistingServiceAccountJSON)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return listFilesWithFilter(value, desiredKind.Spec.Bucket, name)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -13,9 +13,9 @@ import (
|
|||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
)
|
)
|
||||||
|
|
||||||
func SetQueriedForDatabases(databases []string) map[string]interface{} {
|
func SetQueriedForDatabases(databases, users []string) map[string]interface{} {
|
||||||
queried := map[string]interface{}{}
|
queried := map[string]interface{}{}
|
||||||
core.SetQueriedForDatabaseDBList(queried, databases)
|
core.SetQueriedForDatabaseDBList(queried, databases, users)
|
||||||
|
|
||||||
return queried
|
return queried
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,8 @@ package core
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"github.com/caos/orbos/mntr"
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
"github.com/caos/orbos/pkg/tree"
|
"github.com/caos/orbos/pkg/tree"
|
||||||
)
|
)
|
||||||
|
|
||||||
type BackupListFunc func(monitor mntr.Monitor, name string, desired *tree.Tree) ([]string, error)
|
type BackupListFunc func(monitor mntr.Monitor, k8sClient kubernetes.ClientInt, name string, desired *tree.Tree) ([]string, error)
|
||||||
|
@ -45,7 +45,7 @@ func SetQueriedForDatabase(queried map[string]interface{}, databaseCurrent *tree
|
|||||||
queried[queriedName] = databaseCurrent
|
queried[queriedName] = databaseCurrent
|
||||||
}
|
}
|
||||||
|
|
||||||
func SetQueriedForDatabaseDBList(queried map[string]interface{}, databases []string) {
|
func SetQueriedForDatabaseDBList(queried map[string]interface{}, databases, users []string) {
|
||||||
currentDBList := &CurrentDBList{
|
currentDBList := &CurrentDBList{
|
||||||
Common: &tree.Common{
|
Common: &tree.Common{
|
||||||
Kind: "DBList",
|
Kind: "DBList",
|
||||||
@ -53,6 +53,7 @@ func SetQueriedForDatabaseDBList(queried map[string]interface{}, databases []str
|
|||||||
},
|
},
|
||||||
Current: &DatabaseCurrentDBList{
|
Current: &DatabaseCurrentDBList{
|
||||||
Databases: databases,
|
Databases: databases,
|
||||||
|
Users: users,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -16,6 +16,7 @@ type CurrentDBList struct {
|
|||||||
|
|
||||||
type DatabaseCurrentDBList struct {
|
type DatabaseCurrentDBList struct {
|
||||||
Databases []string
|
Databases []string
|
||||||
|
Users []string
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *CurrentDBList) GetURL() string {
|
func (c *CurrentDBList) GetURL() string {
|
||||||
@ -53,7 +54,9 @@ func (c *CurrentDBList) GetListDatabasesFunc() func(k8sClient kubernetes.ClientI
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (c *CurrentDBList) GetListUsersFunc() func(k8sClient kubernetes.ClientInt) ([]string, error) {
|
func (c *CurrentDBList) GetListUsersFunc() func(k8sClient kubernetes.ClientInt) ([]string, error) {
|
||||||
return nil
|
return func(k8sClient kubernetes.ClientInt) ([]string, error) {
|
||||||
|
return c.Current.Users, nil
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *CurrentDBList) GetAddUserFunc() func(user string) (operator.QueryFunc, error) {
|
func (c *CurrentDBList) GetAddUserFunc() func(user string) (operator.QueryFunc, error) {
|
||||||
|
@ -2,6 +2,7 @@ package databases
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"github.com/caos/orbos/mntr"
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
"github.com/caos/orbos/pkg/labels"
|
"github.com/caos/orbos/pkg/labels"
|
||||||
"github.com/caos/orbos/pkg/secret"
|
"github.com/caos/orbos/pkg/secret"
|
||||||
"github.com/caos/orbos/pkg/tree"
|
"github.com/caos/orbos/pkg/tree"
|
||||||
@ -65,6 +66,7 @@ func Adapt(
|
|||||||
|
|
||||||
func GetBackupList(
|
func GetBackupList(
|
||||||
monitor mntr.Monitor,
|
monitor mntr.Monitor,
|
||||||
|
k8sClient kubernetes.ClientInt,
|
||||||
desiredTree *tree.Tree,
|
desiredTree *tree.Tree,
|
||||||
) (
|
) (
|
||||||
[]string,
|
[]string,
|
||||||
@ -72,7 +74,7 @@ func GetBackupList(
|
|||||||
) {
|
) {
|
||||||
switch desiredTree.Common.Kind {
|
switch desiredTree.Common.Kind {
|
||||||
case "databases.caos.ch/CockroachDB":
|
case "databases.caos.ch/CockroachDB":
|
||||||
return managed.BackupList()(monitor, desiredTree)
|
return managed.BackupList()(monitor, k8sClient, desiredTree)
|
||||||
case "databases.caos.ch/ProvidedDatabse":
|
case "databases.caos.ch/ProvidedDatabse":
|
||||||
return nil, errors.Errorf("no backups supported for database kind %s", desiredTree.Common.Kind)
|
return nil, errors.Errorf("no backups supported for database kind %s", desiredTree.Common.Kind)
|
||||||
default:
|
default:
|
||||||
|
@ -142,22 +142,11 @@ func Adapter(
|
|||||||
cockroachHTTPPort,
|
cockroachHTTPPort,
|
||||||
)
|
)
|
||||||
|
|
||||||
//externalName := "cockroachdb-public." + namespaceStr + ".svc.cluster.local"
|
|
||||||
//queryES, destroyES, err := service.AdaptFunc("cockroachdb-public", "default", labels, []service.Port{}, "ExternalName", map[string]string{}, false, "", externalName)
|
|
||||||
//if err != nil {
|
|
||||||
// return nil, nil, err
|
|
||||||
//}
|
|
||||||
|
|
||||||
queryPDB, err := pdb.AdaptFuncToEnsure(namespace, labels.MustForName(componentLabels, pdbName), cockroachSelector, "1")
|
queryPDB, err := pdb.AdaptFuncToEnsure(namespace, labels.MustForName(componentLabels, pdbName), cockroachSelector, "1")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, nil, nil, nil, false, err
|
return nil, nil, nil, nil, nil, false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
destroyPDB, err := pdb.AdaptFuncToDestroy(namespace, pdbName)
|
|
||||||
if err != nil {
|
|
||||||
return nil, nil, nil, nil, nil, false, err
|
|
||||||
}
|
|
||||||
|
|
||||||
currentDB := &Current{
|
currentDB := &Current{
|
||||||
Common: &tree.Common{
|
Common: &tree.Common{
|
||||||
Kind: "databases.caos.ch/CockroachDB",
|
Kind: "databases.caos.ch/CockroachDB",
|
||||||
@ -188,7 +177,6 @@ func Adapter(
|
|||||||
|
|
||||||
if isFeatureDatabase {
|
if isFeatureDatabase {
|
||||||
destroyers = append(destroyers,
|
destroyers = append(destroyers,
|
||||||
operator.ResourceDestroyToZitadelDestroy(destroyPDB),
|
|
||||||
destroyS,
|
destroyS,
|
||||||
operator.ResourceDestroyToZitadelDestroy(destroySFS),
|
operator.ResourceDestroyToZitadelDestroy(destroySFS),
|
||||||
destroyRBAC,
|
destroyRBAC,
|
||||||
|
@ -88,7 +88,7 @@ func TestManaged_AdaptBucketBackup(t *testing.T) {
|
|||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
|
|
||||||
databases := []string{"test1", "test2"}
|
databases := []string{"test1", "test2"}
|
||||||
queried := bucket.SetQueriedForDatabases(databases)
|
queried := bucket.SetQueriedForDatabases(databases, []string{})
|
||||||
ensure, err := query(k8sClient, queried)
|
ensure, err := query(k8sClient, queried)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
assert.NotNil(t, ensure)
|
assert.NotNil(t, ensure)
|
||||||
@ -128,7 +128,7 @@ func TestManaged_AdaptBucketInstantBackup(t *testing.T) {
|
|||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
|
|
||||||
databases := []string{"test1", "test2"}
|
databases := []string{"test1", "test2"}
|
||||||
queried := bucket.SetQueriedForDatabases(databases)
|
queried := bucket.SetQueriedForDatabases(databases, []string{})
|
||||||
ensure, err := query(k8sClient, queried)
|
ensure, err := query(k8sClient, queried)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
assert.NotNil(t, ensure)
|
assert.NotNil(t, ensure)
|
||||||
@ -169,7 +169,8 @@ func TestManaged_AdaptBucketCleanAndRestore(t *testing.T) {
|
|||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
|
|
||||||
databases := []string{"test1", "test2"}
|
databases := []string{"test1", "test2"}
|
||||||
queried := bucket.SetQueriedForDatabases(databases)
|
users := []string{"test1", "test2"}
|
||||||
|
queried := bucket.SetQueriedForDatabases(databases, users)
|
||||||
ensure, err := query(k8sClient, queried)
|
ensure, err := query(k8sClient, queried)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
assert.NotNil(t, ensure)
|
assert.NotNil(t, ensure)
|
||||||
|
@ -2,13 +2,14 @@ package managed
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"github.com/caos/orbos/mntr"
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
"github.com/caos/orbos/pkg/tree"
|
"github.com/caos/orbos/pkg/tree"
|
||||||
"github.com/caos/zitadel/operator/database/kinds/backups"
|
"github.com/caos/zitadel/operator/database/kinds/backups"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
func BackupList() func(monitor mntr.Monitor, desired *tree.Tree) ([]string, error) {
|
func BackupList() func(monitor mntr.Monitor, k8sClient kubernetes.ClientInt, desired *tree.Tree) ([]string, error) {
|
||||||
return func(monitor mntr.Monitor, desired *tree.Tree) ([]string, error) {
|
return func(monitor mntr.Monitor, k8sClient kubernetes.ClientInt, desired *tree.Tree) ([]string, error) {
|
||||||
desiredKind, err := parseDesiredV0(desired)
|
desiredKind, err := parseDesiredV0(desired)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.Wrap(err, "parsing desired state failed")
|
return nil, errors.Wrap(err, "parsing desired state failed")
|
||||||
@ -22,7 +23,7 @@ func BackupList() func(monitor mntr.Monitor, desired *tree.Tree) ([]string, erro
|
|||||||
backuplists := make([]string, 0)
|
backuplists := make([]string, 0)
|
||||||
if desiredKind.Spec.Backups != nil {
|
if desiredKind.Spec.Backups != nil {
|
||||||
for name, def := range desiredKind.Spec.Backups {
|
for name, def := range desiredKind.Spec.Backups {
|
||||||
backuplist, err := backups.GetBackupList(monitor, name, def)
|
backuplist, err := backups.GetBackupList(monitor, k8sClient, name, def)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -33,7 +33,7 @@ func AdaptFunc(
|
|||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
destroyR, err := role.AdaptFuncToDestroy(namespace, roleLabels.Name())
|
destroyR, err := role.AdaptFuncToDestroy(roleLabels.Name(), namespace)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
@ -91,22 +91,28 @@ func AdaptFunc(
|
|||||||
return nil, nil, nil, nil, nil, migrate, err
|
return nil, nil, nil, nil, nil, migrate, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
rec, _ := Reconcile(monitor, desiredKind.Spec, gitops)
|
||||||
|
|
||||||
destroyers := make([]operator.DestroyFunc, 0)
|
destroyers := make([]operator.DestroyFunc, 0)
|
||||||
queriers := make([]operator.QueryFunc, 0)
|
queriers := make([]operator.QueryFunc, 0)
|
||||||
|
dbOrBackup := false
|
||||||
for _, feature := range features {
|
for _, feature := range features {
|
||||||
switch feature {
|
switch feature {
|
||||||
case "database", backup.Instant, backup.Normal, restore.Instant, clean.Instant:
|
case "database", backup.Instant, backup.Normal, restore.Instant, clean.Instant:
|
||||||
queriers = append(queriers,
|
if !dbOrBackup {
|
||||||
operator.ResourceQueryToZitadelQuery(queryNS),
|
dbOrBackup = true
|
||||||
queryDB,
|
queriers = append(queriers,
|
||||||
)
|
operator.ResourceQueryToZitadelQuery(queryNS),
|
||||||
destroyers = append(destroyers,
|
queryDB,
|
||||||
destroyDB,
|
)
|
||||||
)
|
destroyers = append(destroyers,
|
||||||
|
destroyDB,
|
||||||
|
)
|
||||||
|
}
|
||||||
case "operator":
|
case "operator":
|
||||||
queriers = append(queriers,
|
queriers = append(queriers,
|
||||||
operator.ResourceQueryToZitadelQuery(queryNS),
|
operator.ResourceQueryToZitadelQuery(queryNS),
|
||||||
operator.EnsureFuncToQueryFunc(Reconcile(monitor, desiredKind.Spec, gitops)),
|
operator.EnsureFuncToQueryFunc(rec),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -2,13 +2,14 @@ package orb
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"github.com/caos/orbos/mntr"
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
"github.com/caos/orbos/pkg/tree"
|
"github.com/caos/orbos/pkg/tree"
|
||||||
"github.com/caos/zitadel/operator/database/kinds/databases"
|
"github.com/caos/zitadel/operator/database/kinds/databases"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
func BackupListFunc() func(monitor mntr.Monitor, desiredTree *tree.Tree) (strings []string, err error) {
|
func BackupListFunc() func(monitor mntr.Monitor, k8sClient kubernetes.ClientInt, desiredTree *tree.Tree) (strings []string, err error) {
|
||||||
return func(monitor mntr.Monitor, desiredTree *tree.Tree) (strings []string, err error) {
|
return func(monitor mntr.Monitor, k8sClient kubernetes.ClientInt, desiredTree *tree.Tree) (strings []string, err error) {
|
||||||
desiredKind, err := ParseDesiredV0(desiredTree)
|
desiredKind, err := ParseDesiredV0(desiredTree)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.Wrap(err, "parsing desired state failed")
|
return nil, errors.Wrap(err, "parsing desired state failed")
|
||||||
@ -19,6 +20,6 @@ func BackupListFunc() func(monitor mntr.Monitor, desiredTree *tree.Tree) (string
|
|||||||
monitor = monitor.Verbose()
|
monitor = monitor.Verbose()
|
||||||
}
|
}
|
||||||
|
|
||||||
return databases.GetBackupList(monitor, desiredKind.Database)
|
return databases.GetBackupList(monitor, k8sClient, desiredKind.Database)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -3,6 +3,7 @@ package orb
|
|||||||
import (
|
import (
|
||||||
"github.com/caos/orbos/mntr"
|
"github.com/caos/orbos/mntr"
|
||||||
"github.com/caos/orbos/pkg/kubernetes"
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
"github.com/caos/orbos/pkg/labels"
|
||||||
"github.com/caos/orbos/pkg/tree"
|
"github.com/caos/orbos/pkg/tree"
|
||||||
"github.com/caos/orbos/pkg/treelabels"
|
"github.com/caos/orbos/pkg/treelabels"
|
||||||
"github.com/caos/zitadel/operator"
|
"github.com/caos/zitadel/operator"
|
||||||
@ -14,31 +15,39 @@ func Reconcile(
|
|||||||
monitor mntr.Monitor,
|
monitor mntr.Monitor,
|
||||||
spec *Spec,
|
spec *Spec,
|
||||||
gitops bool,
|
gitops bool,
|
||||||
) operator.EnsureFunc {
|
) (
|
||||||
|
operator.EnsureFunc,
|
||||||
|
operator.DestroyFunc,
|
||||||
|
) {
|
||||||
return func(k8sClient kubernetes.ClientInt) (err error) {
|
return func(k8sClient kubernetes.ClientInt) (err error) {
|
||||||
recMonitor := monitor.WithField("version", spec.Version)
|
recMonitor := monitor.WithField("version", spec.Version)
|
||||||
|
|
||||||
if spec.Version == "" {
|
if spec.Version == "" {
|
||||||
err := errors.New("No version provided for self-reconciling")
|
err := errors.New("No version provided for self-reconciling")
|
||||||
recMonitor.Error(err)
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if spec.SelfReconciling {
|
|
||||||
desiredTree := &tree.Tree{
|
|
||||||
Common: &tree.Common{
|
|
||||||
Kind: "databases.caos.ch/Orb",
|
|
||||||
Version: "v0",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := zitadelKubernetes.EnsureDatabaseArtifacts(monitor, treelabels.MustForAPI(desiredTree, mustDatabaseOperator(&spec.Version)), k8sClient, spec.Version, spec.NodeSelector, spec.Tolerations, spec.CustomImageRegistry, gitops); err != nil {
|
|
||||||
recMonitor.Error(errors.Wrap(err, "Failed to deploy database-operator into k8s-cluster"))
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
recMonitor.Info("Applied database-operator")
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
|
|
||||||
}
|
if spec.SelfReconciling {
|
||||||
|
desiredTree := &tree.Tree{
|
||||||
|
Common: &tree.Common{
|
||||||
|
Kind: "databases.caos.ch/Orb",
|
||||||
|
Version: "v0",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := zitadelKubernetes.EnsureDatabaseArtifacts(monitor, treelabels.MustForAPI(desiredTree, mustDatabaseOperator(&spec.Version)), k8sClient, spec.Version, spec.NodeSelector, spec.Tolerations, spec.CustomImageRegistry, gitops); err != nil {
|
||||||
|
recMonitor.Error(errors.Wrap(err, "Failed to deploy database-operator into k8s-cluster"))
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
recMonitor.Info("Applied database-operator")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}, func(k8sClient kubernetes.ClientInt) error {
|
||||||
|
if err := zitadelKubernetes.DestroyDatabaseOperator(monitor, labels.MustForAPI(labels.NoopOperator("database-operator"), "database", "v0"), k8sClient, gitops); err != nil {
|
||||||
|
monitor.Error(errors.Wrap(err, "Failed to destroy database-operator in k8s-cluster"))
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
monitor.Info("Destroyed database-operator")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
34
operator/zitadel/destroy.go
Normal file
34
operator/zitadel/destroy.go
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
package zitadel
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/git"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
"github.com/caos/orbos/pkg/tree"
|
||||||
|
"github.com/caos/zitadel/operator"
|
||||||
|
)
|
||||||
|
|
||||||
|
func Destroy(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
gitClient *git.Client,
|
||||||
|
adapt operator.AdaptFunc,
|
||||||
|
k8sClient *kubernetes.Client,
|
||||||
|
) error {
|
||||||
|
internalMonitor := monitor.WithField("operator", "zitadel")
|
||||||
|
internalMonitor.Info("Destroy")
|
||||||
|
treeDesired, err := operator.Parse(gitClient, "zitadel.yml")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
treeCurrent := &tree.Tree{}
|
||||||
|
|
||||||
|
_, destroy, _, _, _, _, err := adapt(internalMonitor, treeDesired, treeCurrent)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := destroy(k8sClient); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
@ -64,7 +64,7 @@ func AdaptFunc(
|
|||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
destroyJ, err := job.AdaptFuncToDestroy(jobName, namespace)
|
destroyJ, err := job.AdaptFuncToDestroy(namespace, jobName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
@ -51,7 +51,7 @@ func AdaptFunc(
|
|||||||
jobName := getJobName(reason)
|
jobName := getJobName(reason)
|
||||||
nameLabels := labels.MustForName(componentLabels, jobName)
|
nameLabels := labels.MustForName(componentLabels, jobName)
|
||||||
|
|
||||||
destroyJ, err := job.AdaptFuncToDestroy(jobName, namespace)
|
destroyJ, err := job.AdaptFuncToDestroy(namespace, jobName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
@ -101,6 +101,8 @@ func AdaptFunc(
|
|||||||
migrate = migrate || migrateIAM
|
migrate = migrate || migrateIAM
|
||||||
secret.AppendSecrets("", allSecrets, zitadelSecrets, allExisting, zitadelExisting)
|
secret.AppendSecrets("", allSecrets, zitadelSecrets, allExisting, zitadelExisting)
|
||||||
|
|
||||||
|
rec, _ := Reconcile(monitor, desiredKind.Spec, gitops)
|
||||||
|
|
||||||
destroyers := make([]operator.DestroyFunc, 0)
|
destroyers := make([]operator.DestroyFunc, 0)
|
||||||
queriers := make([]operator.QueryFunc, 0)
|
queriers := make([]operator.QueryFunc, 0)
|
||||||
for _, feature := range features {
|
for _, feature := range features {
|
||||||
@ -114,7 +116,7 @@ func AdaptFunc(
|
|||||||
case "operator":
|
case "operator":
|
||||||
queriers = append(queriers,
|
queriers = append(queriers,
|
||||||
operator.ResourceQueryToZitadelQuery(queryNS),
|
operator.ResourceQueryToZitadelQuery(queryNS),
|
||||||
operator.EnsureFuncToQueryFunc(Reconcile(monitor, desiredKind.Spec, gitops)),
|
operator.EnsureFuncToQueryFunc(rec),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,8 +1,10 @@
|
|||||||
package orb
|
package orb
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
"github.com/caos/orbos/mntr"
|
"github.com/caos/orbos/mntr"
|
||||||
kubernetes2 "github.com/caos/orbos/pkg/kubernetes"
|
kubernetes2 "github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
"github.com/caos/orbos/pkg/labels"
|
||||||
"github.com/caos/orbos/pkg/tree"
|
"github.com/caos/orbos/pkg/tree"
|
||||||
"github.com/caos/orbos/pkg/treelabels"
|
"github.com/caos/orbos/pkg/treelabels"
|
||||||
"github.com/caos/zitadel/operator"
|
"github.com/caos/zitadel/operator"
|
||||||
@ -14,31 +16,39 @@ func Reconcile(
|
|||||||
monitor mntr.Monitor,
|
monitor mntr.Monitor,
|
||||||
spec *Spec,
|
spec *Spec,
|
||||||
gitops bool,
|
gitops bool,
|
||||||
) operator.EnsureFunc {
|
) (
|
||||||
|
operator.EnsureFunc,
|
||||||
|
operator.DestroyFunc,
|
||||||
|
) {
|
||||||
return func(k8sClient kubernetes2.ClientInt) (err error) {
|
return func(k8sClient kubernetes2.ClientInt) (err error) {
|
||||||
recMonitor := monitor.WithField("version", spec.Version)
|
recMonitor := monitor.WithField("version", spec.Version)
|
||||||
|
|
||||||
if spec.Version == "" {
|
if spec.Version == "" {
|
||||||
err := errors.New("No version provided for self-reconciling")
|
err := errors.New("No version provided for self-reconciling")
|
||||||
recMonitor.Error(err)
|
recMonitor.Error(err)
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if spec.SelfReconciling {
|
|
||||||
desiredTree := &tree.Tree{
|
|
||||||
Common: &tree.Common{
|
|
||||||
Kind: "zitadel.caos.ch/Orb",
|
|
||||||
Version: "v0",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := kubernetes.EnsureZitadelOperatorArtifacts(monitor, treelabels.MustForAPI(desiredTree, mustZITADELOperator(&spec.Version)), k8sClient, spec.Version, spec.NodeSelector, spec.Tolerations, spec.CustomImageRegistry, gitops); err != nil {
|
|
||||||
recMonitor.Error(errors.Wrap(err, "Failed to deploy zitadel-operator into k8s-cluster"))
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
recMonitor.Info("Applied zitadel-operator")
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
|
|
||||||
}
|
if spec.SelfReconciling {
|
||||||
|
desiredTree := &tree.Tree{
|
||||||
|
Common: &tree.Common{
|
||||||
|
Kind: "zitadel.caos.ch/Orb",
|
||||||
|
Version: "v0",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := kubernetes.EnsureZitadelOperatorArtifacts(monitor, treelabels.MustForAPI(desiredTree, mustZITADELOperator(&spec.Version)), k8sClient, spec.Version, spec.NodeSelector, spec.Tolerations, spec.CustomImageRegistry, gitops); err != nil {
|
||||||
|
return fmt.Errorf("failed to deploy zitadel-operator into k8s-cluster: %w", err)
|
||||||
|
}
|
||||||
|
recMonitor.Info("Applied zitadel-operator")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}, func(k8sClient kubernetes2.ClientInt) error {
|
||||||
|
if err := kubernetes.DestroyZitadelOperator(monitor, labels.MustForAPI(labels.NoopOperator("zitadel-operator"), "zitadel", "v0"), k8sClient, gitops); err != nil {
|
||||||
|
monitor.Error(errors.Wrap(err, "Failed to destroy zitadel-operator in k8s-cluster"))
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
monitor.Info("Destroyed zitadel-operator")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -5,10 +5,11 @@ import (
|
|||||||
"github.com/caos/orbos/pkg/git"
|
"github.com/caos/orbos/pkg/git"
|
||||||
"github.com/caos/orbos/pkg/kubernetes"
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
"github.com/caos/orbos/pkg/tree"
|
"github.com/caos/orbos/pkg/tree"
|
||||||
|
"github.com/caos/zitadel/operator/api/database"
|
||||||
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||||
)
|
)
|
||||||
|
|
||||||
func InstantBackup(
|
func GitOpsInstantBackup(
|
||||||
monitor mntr.Monitor,
|
monitor mntr.Monitor,
|
||||||
k8sClient kubernetes.ClientInt,
|
k8sClient kubernetes.ClientInt,
|
||||||
gitClient *git.Client,
|
gitClient *git.Client,
|
||||||
@ -16,9 +17,29 @@ func InstantBackup(
|
|||||||
) error {
|
) error {
|
||||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
monitor.Error(err)
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
return instantBackup(monitor, k8sClient, desired, name)
|
||||||
|
}
|
||||||
|
|
||||||
|
func CrdInstantBackup(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
k8sClient kubernetes.ClientInt,
|
||||||
|
name string,
|
||||||
|
) error {
|
||||||
|
desired, err := database.ReadCrd(k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return instantBackup(monitor, k8sClient, desired, name)
|
||||||
|
}
|
||||||
|
|
||||||
|
func instantBackup(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
k8sClient kubernetes.ClientInt,
|
||||||
|
desired *tree.Tree,
|
||||||
|
name string,
|
||||||
|
) error {
|
||||||
current := &tree.Tree{}
|
current := &tree.Tree{}
|
||||||
|
|
||||||
query, _, _, _, _, _, err := orbdb.AdaptFunc(name, nil, false, "instantbackup")(monitor, desired, current)
|
query, _, _, _, _, _, err := orbdb.AdaptFunc(name, nil, false, "instantbackup")(monitor, desired, current)
|
||||||
@ -40,25 +61,3 @@ func InstantBackup(
|
|||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func ListBackups(
|
|
||||||
monitor mntr.Monitor,
|
|
||||||
gitClient *git.Client,
|
|
||||||
) (
|
|
||||||
[]string,
|
|
||||||
error,
|
|
||||||
) {
|
|
||||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
|
||||||
if err != nil {
|
|
||||||
monitor.Error(err)
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
backups, err := orbdb.BackupListFunc()(monitor, desired)
|
|
||||||
if err != nil {
|
|
||||||
monitor.Error(err)
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return backups, nil
|
|
||||||
}
|
|
||||||
|
57
pkg/databases/backuplist.go
Normal file
57
pkg/databases/backuplist.go
Normal file
@ -0,0 +1,57 @@
|
|||||||
|
package databases
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/git"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
"github.com/caos/orbos/pkg/tree"
|
||||||
|
"github.com/caos/zitadel/operator/api/database"
|
||||||
|
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||||
|
)
|
||||||
|
|
||||||
|
func GitOpsListBackups(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
gitClient *git.Client,
|
||||||
|
k8sClient kubernetes.ClientInt,
|
||||||
|
) (
|
||||||
|
[]string,
|
||||||
|
error,
|
||||||
|
) {
|
||||||
|
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return listBackups(monitor, k8sClient, desired)
|
||||||
|
}
|
||||||
|
|
||||||
|
func CrdListBackups(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
k8sClient kubernetes.ClientInt,
|
||||||
|
) (
|
||||||
|
[]string,
|
||||||
|
error,
|
||||||
|
) {
|
||||||
|
desired, err := database.ReadCrd(k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return listBackups(monitor, k8sClient, desired)
|
||||||
|
}
|
||||||
|
|
||||||
|
func listBackups(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
k8sClient kubernetes.ClientInt,
|
||||||
|
desired *tree.Tree,
|
||||||
|
) (
|
||||||
|
[]string,
|
||||||
|
error,
|
||||||
|
) {
|
||||||
|
backups, err := orbdb.BackupListFunc()(monitor, k8sClient, desired)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return backups, nil
|
||||||
|
}
|
@ -5,21 +5,47 @@ import (
|
|||||||
"github.com/caos/orbos/pkg/git"
|
"github.com/caos/orbos/pkg/git"
|
||||||
"github.com/caos/orbos/pkg/kubernetes"
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
"github.com/caos/orbos/pkg/tree"
|
"github.com/caos/orbos/pkg/tree"
|
||||||
|
"github.com/caos/zitadel/operator/api/database"
|
||||||
"github.com/caos/zitadel/operator/database/kinds/databases/core"
|
"github.com/caos/zitadel/operator/database/kinds/databases/core"
|
||||||
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||||
)
|
)
|
||||||
|
|
||||||
func Clear(
|
func GitOpsClear(
|
||||||
monitor mntr.Monitor,
|
monitor mntr.Monitor,
|
||||||
k8sClient kubernetes.ClientInt,
|
k8sClient kubernetes.ClientInt,
|
||||||
gitClient *git.Client,
|
gitClient *git.Client,
|
||||||
databases []string,
|
databases []string,
|
||||||
|
users []string,
|
||||||
) error {
|
) error {
|
||||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
monitor.Error(err)
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return clear(monitor, k8sClient, databases, users, desired)
|
||||||
|
}
|
||||||
|
|
||||||
|
func CrdClear(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
k8sClient kubernetes.ClientInt,
|
||||||
|
databases []string,
|
||||||
|
users []string,
|
||||||
|
) error {
|
||||||
|
desired, err := database.ReadCrd(k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return clear(monitor, k8sClient, databases, users, desired)
|
||||||
|
}
|
||||||
|
|
||||||
|
func clear(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
k8sClient kubernetes.ClientInt,
|
||||||
|
databases []string,
|
||||||
|
users []string,
|
||||||
|
desired *tree.Tree,
|
||||||
|
) error {
|
||||||
current := &tree.Tree{}
|
current := &tree.Tree{}
|
||||||
|
|
||||||
query, _, _, _, _, _, err := orbdb.AdaptFunc("", nil, false, "clean")(monitor, desired, current)
|
query, _, _, _, _, _, err := orbdb.AdaptFunc("", nil, false, "clean")(monitor, desired, current)
|
||||||
@ -28,7 +54,7 @@ func Clear(
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
queried := map[string]interface{}{}
|
queried := map[string]interface{}{}
|
||||||
core.SetQueriedForDatabaseDBList(queried, databases)
|
core.SetQueriedForDatabaseDBList(queried, databases, users)
|
||||||
|
|
||||||
ensure, err := query(k8sClient, queried)
|
ensure, err := query(k8sClient, queried)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -37,8 +63,8 @@ func Clear(
|
|||||||
}
|
}
|
||||||
|
|
||||||
if err := ensure(k8sClient); err != nil {
|
if err := ensure(k8sClient); err != nil {
|
||||||
monitor.Error(err)
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
@ -19,7 +19,7 @@ func CrdGetConnectionInfo(
|
|||||||
return "", "", err
|
return "", "", err
|
||||||
}
|
}
|
||||||
|
|
||||||
return getConnectionInfo(monitor, k8sClient, desired)
|
return getConnectionInfo(monitor, k8sClient, desired, false)
|
||||||
}
|
}
|
||||||
|
|
||||||
func GitOpsGetConnectionInfo(
|
func GitOpsGetConnectionInfo(
|
||||||
@ -33,17 +33,18 @@ func GitOpsGetConnectionInfo(
|
|||||||
return "", "", err
|
return "", "", err
|
||||||
}
|
}
|
||||||
|
|
||||||
return getConnectionInfo(monitor, k8sClient, desired)
|
return getConnectionInfo(monitor, k8sClient, desired, true)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getConnectionInfo(
|
func getConnectionInfo(
|
||||||
monitor mntr.Monitor,
|
monitor mntr.Monitor,
|
||||||
k8sClient kubernetes.ClientInt,
|
k8sClient kubernetes.ClientInt,
|
||||||
desired *tree.Tree,
|
desired *tree.Tree,
|
||||||
|
gitOps bool,
|
||||||
) (string, string, error) {
|
) (string, string, error) {
|
||||||
current := &tree.Tree{}
|
current := &tree.Tree{}
|
||||||
|
|
||||||
query, _, _, _, _, _, err := orbdb.AdaptFunc("", nil, false, "database")(monitor, desired, current)
|
query, _, _, _, _, _, err := orbdb.AdaptFunc("", nil, gitOps, "database")(monitor, desired, current)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", "", err
|
return "", "", err
|
||||||
}
|
}
|
||||||
|
@ -5,11 +5,12 @@ import (
|
|||||||
"github.com/caos/orbos/pkg/git"
|
"github.com/caos/orbos/pkg/git"
|
||||||
"github.com/caos/orbos/pkg/kubernetes"
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
"github.com/caos/orbos/pkg/tree"
|
"github.com/caos/orbos/pkg/tree"
|
||||||
|
"github.com/caos/zitadel/operator/api/database"
|
||||||
"github.com/caos/zitadel/operator/database/kinds/databases/core"
|
"github.com/caos/zitadel/operator/database/kinds/databases/core"
|
||||||
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||||
)
|
)
|
||||||
|
|
||||||
func Restore(
|
func GitOpsRestore(
|
||||||
monitor mntr.Monitor,
|
monitor mntr.Monitor,
|
||||||
k8sClient kubernetes.ClientInt,
|
k8sClient kubernetes.ClientInt,
|
||||||
gitClient *git.Client,
|
gitClient *git.Client,
|
||||||
@ -18,9 +19,31 @@ func Restore(
|
|||||||
) error {
|
) error {
|
||||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
monitor.Error(err)
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
return restore(monitor, k8sClient, desired, name, databases)
|
||||||
|
}
|
||||||
|
|
||||||
|
func CrdRestore(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
k8sClient kubernetes.ClientInt,
|
||||||
|
name string,
|
||||||
|
databases []string,
|
||||||
|
) error {
|
||||||
|
desired, err := database.ReadCrd(k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return restore(monitor, k8sClient, desired, name, databases)
|
||||||
|
}
|
||||||
|
|
||||||
|
func restore(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
k8sClient kubernetes.ClientInt,
|
||||||
|
desired *tree.Tree,
|
||||||
|
name string,
|
||||||
|
databases []string,
|
||||||
|
) error {
|
||||||
current := &tree.Tree{}
|
current := &tree.Tree{}
|
||||||
|
|
||||||
query, _, _, _, _, _, err := orbdb.AdaptFunc(name, nil, false, "restore")(monitor, desired, current)
|
query, _, _, _, _, _, err := orbdb.AdaptFunc(name, nil, false, "restore")(monitor, desired, current)
|
||||||
@ -29,7 +52,7 @@ func Restore(
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
queried := map[string]interface{}{}
|
queried := map[string]interface{}{}
|
||||||
core.SetQueriedForDatabaseDBList(queried, databases)
|
core.SetQueriedForDatabaseDBList(queried, databases, []string{})
|
||||||
|
|
||||||
ensure, err := query(k8sClient, queried)
|
ensure, err := query(k8sClient, queried)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -16,6 +16,14 @@ import (
|
|||||||
mach "k8s.io/apimachinery/pkg/apis/meta/v1"
|
mach "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
namespace = "caos-system"
|
||||||
|
)
|
||||||
|
|
||||||
|
func getZitadelOperatorNameLabels(apiLabels *labels.API) *labels.Name {
|
||||||
|
return toNameLabels(apiLabels, "zitadel-operator")
|
||||||
|
}
|
||||||
|
|
||||||
func EnsureZitadelOperatorArtifacts(
|
func EnsureZitadelOperatorArtifacts(
|
||||||
monitor mntr.Monitor,
|
monitor mntr.Monitor,
|
||||||
apiLabels *labels.API,
|
apiLabels *labels.API,
|
||||||
@ -31,7 +39,7 @@ func EnsureZitadelOperatorArtifacts(
|
|||||||
"zitadel": version,
|
"zitadel": version,
|
||||||
}).Debug("Ensuring zitadel artifacts")
|
}).Debug("Ensuring zitadel artifacts")
|
||||||
|
|
||||||
nameLabels := labels.MustForName(labels.MustForComponent(apiLabels, "operator"), "zitadel-operator")
|
nameLabels := getZitadelOperatorNameLabels(apiLabels)
|
||||||
k8sNameLabels := labels.MustK8sMap(nameLabels)
|
k8sNameLabels := labels.MustK8sMap(nameLabels)
|
||||||
k8sPodSelector := labels.MustK8sMap(labels.DeriveNameSelector(nameLabels, false))
|
k8sPodSelector := labels.MustK8sMap(labels.DeriveNameSelector(nameLabels, false))
|
||||||
|
|
||||||
@ -42,7 +50,7 @@ func EnsureZitadelOperatorArtifacts(
|
|||||||
if err := client.ApplyServiceAccount(&core.ServiceAccount{
|
if err := client.ApplyServiceAccount(&core.ServiceAccount{
|
||||||
ObjectMeta: mach.ObjectMeta{
|
ObjectMeta: mach.ObjectMeta{
|
||||||
Name: nameLabels.Name(),
|
Name: nameLabels.Name(),
|
||||||
Namespace: "caos-system",
|
Namespace: namespace,
|
||||||
},
|
},
|
||||||
}); err != nil {
|
}); err != nil {
|
||||||
return err
|
return err
|
||||||
@ -76,7 +84,7 @@ func EnsureZitadelOperatorArtifacts(
|
|||||||
Subjects: []rbac.Subject{{
|
Subjects: []rbac.Subject{{
|
||||||
Kind: "ServiceAccount",
|
Kind: "ServiceAccount",
|
||||||
Name: nameLabels.Name(),
|
Name: nameLabels.Name(),
|
||||||
Namespace: "caos-system",
|
Namespace: namespace,
|
||||||
}},
|
}},
|
||||||
}); err != nil {
|
}); err != nil {
|
||||||
return err
|
return err
|
||||||
@ -251,7 +259,7 @@ status:
|
|||||||
deployment := &apps.Deployment{
|
deployment := &apps.Deployment{
|
||||||
ObjectMeta: mach.ObjectMeta{
|
ObjectMeta: mach.ObjectMeta{
|
||||||
Name: nameLabels.Name(),
|
Name: nameLabels.Name(),
|
||||||
Namespace: "caos-system",
|
Namespace: namespace,
|
||||||
Labels: k8sNameLabels,
|
Labels: k8sNameLabels,
|
||||||
},
|
},
|
||||||
Spec: apps.DeploymentSpec{
|
Spec: apps.DeploymentSpec{
|
||||||
@ -305,6 +313,40 @@ status:
|
|||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
func DestroyZitadelOperator(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
apiLabels *labels.API,
|
||||||
|
client kubernetes.ClientInt,
|
||||||
|
gitops bool,
|
||||||
|
) error {
|
||||||
|
nameLabels := getZitadelOperatorNameLabels(apiLabels)
|
||||||
|
|
||||||
|
monitor.WithFields(map[string]interface{}{}).Debug("Destroying zitadel artifacts")
|
||||||
|
|
||||||
|
if err := client.DeleteServiceAccount(namespace, nameLabels.Name()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := client.DeleteClusterRole(nameLabels.Name()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := client.DeleteClusterRoleBinding(nameLabels.Name()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !gitops {
|
||||||
|
if err := client.DeleteCRDResource("apiextensions.k8s.io", "v1beta1", "CustomResourceDefinition", "zitadels.caos.ch"); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := client.DeleteDeployment(namespace, nameLabels.Name()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
func ScaleZitadelOperator(
|
func ScaleZitadelOperator(
|
||||||
monitor mntr.Monitor,
|
monitor mntr.Monitor,
|
||||||
@ -312,7 +354,16 @@ func ScaleZitadelOperator(
|
|||||||
replicaCount int,
|
replicaCount int,
|
||||||
) error {
|
) error {
|
||||||
monitor.Debug("Scaling zitadel-operator")
|
monitor.Debug("Scaling zitadel-operator")
|
||||||
return client.ScaleDeployment("caos-system", "zitadel-operator", replicaCount)
|
return client.ScaleDeployment(namespace, "zitadel-operator", replicaCount)
|
||||||
|
}
|
||||||
|
|
||||||
|
func ScaleDatabaseOperator(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
client *kubernetes.Client,
|
||||||
|
replicaCount int,
|
||||||
|
) error {
|
||||||
|
monitor.Debug("Scaling database-operator")
|
||||||
|
return client.ScaleDeployment(namespace, "database-operator", replicaCount)
|
||||||
}
|
}
|
||||||
|
|
||||||
func int32Ptr(i int32) *int32 { return &i }
|
func int32Ptr(i int32) *int32 { return &i }
|
||||||
@ -322,6 +373,10 @@ func toNameLabels(apiLabels *labels.API, operatorName string) *labels.Name {
|
|||||||
return labels.MustForName(labels.MustForComponent(apiLabels, "operator"), operatorName)
|
return labels.MustForName(labels.MustForComponent(apiLabels, "operator"), operatorName)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func getDatabaseOperatorNameLabels(apiLabels *labels.API) *labels.Name {
|
||||||
|
return toNameLabels(apiLabels, "database-operator")
|
||||||
|
}
|
||||||
|
|
||||||
func EnsureDatabaseArtifacts(
|
func EnsureDatabaseArtifacts(
|
||||||
monitor mntr.Monitor,
|
monitor mntr.Monitor,
|
||||||
apiLabels *labels.API,
|
apiLabels *labels.API,
|
||||||
@ -345,8 +400,8 @@ func EnsureDatabaseArtifacts(
|
|||||||
|
|
||||||
if err := client.ApplyServiceAccount(&core.ServiceAccount{
|
if err := client.ApplyServiceAccount(&core.ServiceAccount{
|
||||||
ObjectMeta: mach.ObjectMeta{
|
ObjectMeta: mach.ObjectMeta{
|
||||||
Name: "database-operator",
|
Name: nameLabels.Name(),
|
||||||
Namespace: "caos-system",
|
Namespace: namespace,
|
||||||
Labels: k8sNameLabels,
|
Labels: k8sNameLabels,
|
||||||
},
|
},
|
||||||
}); err != nil {
|
}); err != nil {
|
||||||
@ -355,7 +410,7 @@ func EnsureDatabaseArtifacts(
|
|||||||
|
|
||||||
if err := client.ApplyClusterRole(&rbac.ClusterRole{
|
if err := client.ApplyClusterRole(&rbac.ClusterRole{
|
||||||
ObjectMeta: mach.ObjectMeta{
|
ObjectMeta: mach.ObjectMeta{
|
||||||
Name: "database-operator-clusterrole",
|
Name: nameLabels.Name(),
|
||||||
Labels: k8sNameLabels,
|
Labels: k8sNameLabels,
|
||||||
},
|
},
|
||||||
Rules: []rbac.PolicyRule{{
|
Rules: []rbac.PolicyRule{{
|
||||||
@ -369,19 +424,19 @@ func EnsureDatabaseArtifacts(
|
|||||||
|
|
||||||
if err := client.ApplyClusterRoleBinding(&rbac.ClusterRoleBinding{
|
if err := client.ApplyClusterRoleBinding(&rbac.ClusterRoleBinding{
|
||||||
ObjectMeta: mach.ObjectMeta{
|
ObjectMeta: mach.ObjectMeta{
|
||||||
Name: "database-operator-clusterrolebinding",
|
Name: nameLabels.Name(),
|
||||||
Labels: k8sNameLabels,
|
Labels: k8sNameLabels,
|
||||||
},
|
},
|
||||||
|
|
||||||
RoleRef: rbac.RoleRef{
|
RoleRef: rbac.RoleRef{
|
||||||
APIGroup: "rbac.authorization.k8s.io",
|
APIGroup: "rbac.authorization.k8s.io",
|
||||||
Kind: "ClusterRole",
|
Kind: "ClusterRole",
|
||||||
Name: "database-operator-clusterrole",
|
Name: nameLabels.Name(),
|
||||||
},
|
},
|
||||||
Subjects: []rbac.Subject{{
|
Subjects: []rbac.Subject{{
|
||||||
Kind: "ServiceAccount",
|
Kind: "ServiceAccount",
|
||||||
Name: "database-operator",
|
Name: nameLabels.Name(),
|
||||||
Namespace: "caos-system",
|
Namespace: namespace,
|
||||||
}},
|
}},
|
||||||
}); err != nil {
|
}); err != nil {
|
||||||
return err
|
return err
|
||||||
@ -548,8 +603,8 @@ status:
|
|||||||
|
|
||||||
deployment := &apps.Deployment{
|
deployment := &apps.Deployment{
|
||||||
ObjectMeta: mach.ObjectMeta{
|
ObjectMeta: mach.ObjectMeta{
|
||||||
Name: "database-operator",
|
Name: nameLabels.Name(),
|
||||||
Namespace: "caos-system",
|
Namespace: namespace,
|
||||||
Labels: k8sNameLabels,
|
Labels: k8sNameLabels,
|
||||||
},
|
},
|
||||||
Spec: apps.DeploymentSpec{
|
Spec: apps.DeploymentSpec{
|
||||||
@ -562,7 +617,7 @@ status:
|
|||||||
Labels: labels.MustK8sMap(labels.AsSelectable(nameLabels)),
|
Labels: labels.MustK8sMap(labels.AsSelectable(nameLabels)),
|
||||||
},
|
},
|
||||||
Spec: core.PodSpec{
|
Spec: core.PodSpec{
|
||||||
ServiceAccountName: "database-operator",
|
ServiceAccountName: nameLabels.Name(),
|
||||||
Containers: []core.Container{{
|
Containers: []core.Container{{
|
||||||
Name: "database",
|
Name: "database",
|
||||||
ImagePullPolicy: core.PullIfNotPresent,
|
ImagePullPolicy: core.PullIfNotPresent,
|
||||||
@ -604,3 +659,38 @@ status:
|
|||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func DestroyDatabaseOperator(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
apiLabels *labels.API,
|
||||||
|
client kubernetes.ClientInt,
|
||||||
|
gitops bool,
|
||||||
|
) error {
|
||||||
|
nameLabels := getDatabaseOperatorNameLabels(apiLabels)
|
||||||
|
|
||||||
|
monitor.WithFields(map[string]interface{}{}).Debug("Destroying database artifacts")
|
||||||
|
|
||||||
|
if err := client.DeleteServiceAccount(namespace, nameLabels.Name()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := client.DeleteClusterRole(nameLabels.Name()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := client.DeleteClusterRoleBinding(nameLabels.Name()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !gitops {
|
||||||
|
if err := client.DeleteCRDResource("apiextensions.k8s.io", "v1beta1", "CustomResourceDefinition", "databases.caos.ch"); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := client.DeleteDeployment(namespace, nameLabels.Name()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
103
pkg/zitadel/clearmigraterestore.go
Normal file
103
pkg/zitadel/clearmigraterestore.go
Normal file
@ -0,0 +1,103 @@
|
|||||||
|
package zitadel
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/git"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
orbconfig "github.com/caos/orbos/pkg/orb"
|
||||||
|
"github.com/caos/zitadel/pkg/databases"
|
||||||
|
kubernetes2 "github.com/caos/zitadel/pkg/kubernetes"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
databasesList = []string{
|
||||||
|
"notification",
|
||||||
|
"adminapi",
|
||||||
|
"auth",
|
||||||
|
"authz",
|
||||||
|
"eventstore",
|
||||||
|
"management",
|
||||||
|
}
|
||||||
|
userList = []string{
|
||||||
|
"notification",
|
||||||
|
"adminapi",
|
||||||
|
"auth",
|
||||||
|
"authz",
|
||||||
|
"eventstore",
|
||||||
|
"management",
|
||||||
|
"queries",
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
func GitOpsClearMigrateRestore(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
gitClient *git.Client,
|
||||||
|
orbCfg *orbconfig.Orb,
|
||||||
|
k8sClient *kubernetes.Client,
|
||||||
|
backup string,
|
||||||
|
version *string,
|
||||||
|
) error {
|
||||||
|
|
||||||
|
if err := kubernetes2.ScaleZitadelOperator(monitor, k8sClient, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
time.Sleep(5 * time.Second)
|
||||||
|
|
||||||
|
if err := GitOpsScaleDown(monitor, orbCfg, gitClient, k8sClient, version); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := databases.GitOpsClear(monitor, k8sClient, gitClient, databasesList, userList); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := GitOpsMigrations(monitor, orbCfg, gitClient, k8sClient, version); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := databases.GitOpsRestore(monitor, k8sClient, gitClient, backup, databasesList); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := kubernetes2.ScaleZitadelOperator(monitor, k8sClient, 1); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func CrdClearMigrateRestore(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
k8sClient *kubernetes.Client,
|
||||||
|
backup string,
|
||||||
|
version *string,
|
||||||
|
) error {
|
||||||
|
|
||||||
|
if err := kubernetes2.ScaleZitadelOperator(monitor, k8sClient, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
time.Sleep(5 * time.Second)
|
||||||
|
|
||||||
|
if err := CrdScaleDown(monitor, k8sClient, version); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := databases.CrdClear(monitor, k8sClient, databasesList, userList); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := CrdMigrations(monitor, k8sClient, version); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := databases.CrdRestore(monitor, k8sClient, backup, databasesList); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := kubernetes2.ScaleZitadelOperator(monitor, k8sClient, 1); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
67
pkg/zitadel/migration.go
Normal file
67
pkg/zitadel/migration.go
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
package zitadel
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/git"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
orbconfig "github.com/caos/orbos/pkg/orb"
|
||||||
|
"github.com/caos/orbos/pkg/tree"
|
||||||
|
"github.com/caos/zitadel/operator/api/zitadel"
|
||||||
|
"github.com/caos/zitadel/operator/zitadel/kinds/orb"
|
||||||
|
)
|
||||||
|
|
||||||
|
//Take care! to use this function you have to include migration files into the binary
|
||||||
|
func CrdMigrations(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
k8sClient *kubernetes.Client,
|
||||||
|
version *string,
|
||||||
|
) error {
|
||||||
|
desired, err := zitadel.ReadCrd(k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return migrations(monitor, nil, k8sClient, false, version, desired)
|
||||||
|
}
|
||||||
|
|
||||||
|
//Take care! to use this function you have to include migration files into the binary
|
||||||
|
func GitOpsMigrations(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
orbCfg *orbconfig.Orb,
|
||||||
|
gitClient *git.Client,
|
||||||
|
k8sClient *kubernetes.Client,
|
||||||
|
version *string,
|
||||||
|
) error {
|
||||||
|
desired, err := gitClient.ReadTree(git.ZitadelFile)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return migrations(monitor, orbCfg, k8sClient, true, version, desired)
|
||||||
|
}
|
||||||
|
|
||||||
|
//Take care! to use this function you have to include migration files into the binary
|
||||||
|
func migrations(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
orbCfg *orbconfig.Orb,
|
||||||
|
k8sClient *kubernetes.Client,
|
||||||
|
gitops bool,
|
||||||
|
version *string,
|
||||||
|
desired *tree.Tree,
|
||||||
|
) error {
|
||||||
|
current := &tree.Tree{}
|
||||||
|
query, _, _, _, _, _, err := orb.AdaptFunc(orbCfg, "migration", version, gitops, []string{"migration"})(monitor, desired, current)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
ensure, err := query(k8sClient, map[string]interface{}{})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := ensure(k8sClient); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
65
pkg/zitadel/zitadel.go
Normal file
65
pkg/zitadel/zitadel.go
Normal file
@ -0,0 +1,65 @@
|
|||||||
|
package zitadel
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/caos/orbos/mntr"
|
||||||
|
"github.com/caos/orbos/pkg/git"
|
||||||
|
"github.com/caos/orbos/pkg/kubernetes"
|
||||||
|
orbconfig "github.com/caos/orbos/pkg/orb"
|
||||||
|
"github.com/caos/orbos/pkg/tree"
|
||||||
|
"github.com/caos/zitadel/operator/api/zitadel"
|
||||||
|
"github.com/caos/zitadel/operator/zitadel/kinds/orb"
|
||||||
|
)
|
||||||
|
|
||||||
|
func CrdScaleDown(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
k8sClient *kubernetes.Client,
|
||||||
|
version *string,
|
||||||
|
) error {
|
||||||
|
desired, err := zitadel.ReadCrd(k8sClient)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return scaleDown(monitor, nil, k8sClient, false, version, desired)
|
||||||
|
}
|
||||||
|
|
||||||
|
func GitOpsScaleDown(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
orbCfg *orbconfig.Orb,
|
||||||
|
gitClient *git.Client,
|
||||||
|
k8sClient *kubernetes.Client,
|
||||||
|
version *string,
|
||||||
|
) error {
|
||||||
|
desired, err := gitClient.ReadTree(git.ZitadelFile)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return scaleDown(monitor, orbCfg, k8sClient, true, version, desired)
|
||||||
|
}
|
||||||
|
|
||||||
|
//Take care! to use this function you have to include migration files into the binary
|
||||||
|
func scaleDown(
|
||||||
|
monitor mntr.Monitor,
|
||||||
|
orbCfg *orbconfig.Orb,
|
||||||
|
k8sClient *kubernetes.Client,
|
||||||
|
gitops bool,
|
||||||
|
version *string,
|
||||||
|
desired *tree.Tree,
|
||||||
|
) error {
|
||||||
|
current := &tree.Tree{}
|
||||||
|
query, _, _, _, _, _, err := orb.AdaptFunc(orbCfg, "scaledown", version, gitops, []string{"scaledown"})(monitor, desired, current)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
ensure, err := query(k8sClient, map[string]interface{}{})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := ensure(k8sClient); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user