mirror of
https://github.com/zitadel/zitadel.git
synced 2025-08-11 14:47:33 +00:00
fix: remove operator (#3195)
This commit is contained in:
@@ -1,63 +0,0 @@
|
||||
package databases
|
||||
|
||||
import (
|
||||
"github.com/caos/orbos/mntr"
|
||||
"github.com/caos/orbos/pkg/git"
|
||||
"github.com/caos/orbos/pkg/kubernetes"
|
||||
"github.com/caos/orbos/pkg/tree"
|
||||
"github.com/caos/zitadel/operator/api/database"
|
||||
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||
)
|
||||
|
||||
func GitOpsInstantBackup(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
gitClient *git.Client,
|
||||
name string,
|
||||
) error {
|
||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return instantBackup(monitor, k8sClient, desired, name)
|
||||
}
|
||||
|
||||
func CrdInstantBackup(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
name string,
|
||||
) error {
|
||||
desired, err := database.ReadCrd(k8sClient)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return instantBackup(monitor, k8sClient, desired, name)
|
||||
}
|
||||
|
||||
func instantBackup(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
desired *tree.Tree,
|
||||
name string,
|
||||
) error {
|
||||
current := &tree.Tree{}
|
||||
|
||||
query, _, _, _, _, _, err := orbdb.AdaptFunc(name, nil, false, "instantbackup")(monitor, desired, current)
|
||||
if err != nil {
|
||||
monitor.Error(err)
|
||||
return err
|
||||
}
|
||||
|
||||
queried := map[string]interface{}{}
|
||||
ensure, err := query(k8sClient, queried)
|
||||
if err != nil {
|
||||
monitor.Error(err)
|
||||
return err
|
||||
}
|
||||
|
||||
if err := ensure(k8sClient); err != nil {
|
||||
monitor.Error(err)
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
@@ -1,57 +0,0 @@
|
||||
package databases
|
||||
|
||||
import (
|
||||
"github.com/caos/orbos/mntr"
|
||||
"github.com/caos/orbos/pkg/git"
|
||||
"github.com/caos/orbos/pkg/kubernetes"
|
||||
"github.com/caos/orbos/pkg/tree"
|
||||
"github.com/caos/zitadel/operator/api/database"
|
||||
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||
)
|
||||
|
||||
func GitOpsListBackups(
|
||||
monitor mntr.Monitor,
|
||||
gitClient *git.Client,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
) (
|
||||
[]string,
|
||||
error,
|
||||
) {
|
||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return listBackups(monitor, k8sClient, desired)
|
||||
}
|
||||
|
||||
func CrdListBackups(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
) (
|
||||
[]string,
|
||||
error,
|
||||
) {
|
||||
desired, err := database.ReadCrd(k8sClient)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return listBackups(monitor, k8sClient, desired)
|
||||
}
|
||||
|
||||
func listBackups(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
desired *tree.Tree,
|
||||
) (
|
||||
[]string,
|
||||
error,
|
||||
) {
|
||||
backups, err := orbdb.BackupListFunc()(monitor, k8sClient, desired)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return backups, nil
|
||||
}
|
@@ -1,61 +0,0 @@
|
||||
package databases
|
||||
|
||||
import (
|
||||
"github.com/caos/orbos/mntr"
|
||||
"github.com/caos/orbos/pkg/git"
|
||||
"github.com/caos/orbos/pkg/kubernetes"
|
||||
"github.com/caos/orbos/pkg/tree"
|
||||
"github.com/caos/zitadel/operator/api/database"
|
||||
"github.com/caos/zitadel/operator/database/kinds/databases/managed"
|
||||
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||
)
|
||||
|
||||
func GitOpsClear(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
gitClient *git.Client,
|
||||
) error {
|
||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return clear(monitor, k8sClient, desired, true)
|
||||
}
|
||||
|
||||
func CrdClear(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
) error {
|
||||
desired, err := database.ReadCrd(k8sClient)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return clear(monitor, k8sClient, desired, false)
|
||||
}
|
||||
|
||||
func clear(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
desired *tree.Tree,
|
||||
gitops bool,
|
||||
) error {
|
||||
current := &tree.Tree{}
|
||||
|
||||
query, _, _, _, _, _, err := orbdb.AdaptFunc("", nil, gitops, managed.Clean)(monitor, desired, current)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
queried := map[string]interface{}{}
|
||||
ensure, err := query(k8sClient, queried)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := ensure(k8sClient); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
@@ -1,62 +0,0 @@
|
||||
package databases
|
||||
|
||||
import (
|
||||
"github.com/caos/orbos/mntr"
|
||||
"github.com/caos/orbos/pkg/git"
|
||||
"github.com/caos/orbos/pkg/kubernetes"
|
||||
"github.com/caos/orbos/pkg/tree"
|
||||
"github.com/caos/zitadel/operator/api/database"
|
||||
coredb "github.com/caos/zitadel/operator/database/kinds/databases/core"
|
||||
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||
)
|
||||
|
||||
func CrdGetConnectionInfo(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
) (string, string, error) {
|
||||
desired, err := database.ReadCrd(k8sClient)
|
||||
if err != nil {
|
||||
return "", "", err
|
||||
}
|
||||
|
||||
return getConnectionInfo(monitor, k8sClient, desired, false)
|
||||
}
|
||||
|
||||
func GitOpsGetConnectionInfo(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
gitClient *git.Client,
|
||||
) (string, string, error) {
|
||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||
if err != nil {
|
||||
monitor.Error(err)
|
||||
return "", "", err
|
||||
}
|
||||
|
||||
return getConnectionInfo(monitor, k8sClient, desired, true)
|
||||
}
|
||||
|
||||
func getConnectionInfo(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
desired *tree.Tree,
|
||||
gitOps bool,
|
||||
) (string, string, error) {
|
||||
current := &tree.Tree{}
|
||||
|
||||
query, _, _, _, _, _, err := orbdb.AdaptFunc("", nil, gitOps, "database")(monitor, desired, current)
|
||||
if err != nil {
|
||||
return "", "", err
|
||||
}
|
||||
|
||||
queried := map[string]interface{}{}
|
||||
_, err = query(k8sClient, queried)
|
||||
if err != nil {
|
||||
return "", "", err
|
||||
}
|
||||
currentDB, err := coredb.ParseQueriedForDatabase(queried)
|
||||
if err != nil {
|
||||
return "", "", err
|
||||
}
|
||||
return currentDB.GetURL(), currentDB.GetPort(), nil
|
||||
}
|
@@ -1,62 +0,0 @@
|
||||
package databases
|
||||
|
||||
import (
|
||||
"github.com/caos/orbos/mntr"
|
||||
"github.com/caos/orbos/pkg/git"
|
||||
"github.com/caos/orbos/pkg/kubernetes"
|
||||
"github.com/caos/orbos/pkg/tree"
|
||||
"github.com/caos/zitadel/operator/api/database"
|
||||
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||
)
|
||||
|
||||
func GitOpsRestore(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
gitClient *git.Client,
|
||||
name string,
|
||||
) error {
|
||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return restore(monitor, k8sClient, desired, name)
|
||||
}
|
||||
|
||||
func CrdRestore(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
name string,
|
||||
) error {
|
||||
desired, err := database.ReadCrd(k8sClient)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return restore(monitor, k8sClient, desired, name)
|
||||
}
|
||||
|
||||
func restore(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
desired *tree.Tree,
|
||||
name string,
|
||||
) error {
|
||||
current := &tree.Tree{}
|
||||
|
||||
query, _, _, _, _, _, err := orbdb.AdaptFunc(name, nil, false, "restore")(monitor, desired, current)
|
||||
if err != nil {
|
||||
monitor.Error(err)
|
||||
return err
|
||||
}
|
||||
queried := map[string]interface{}{}
|
||||
ensure, err := query(k8sClient, queried)
|
||||
if err != nil {
|
||||
monitor.Error(err)
|
||||
return err
|
||||
}
|
||||
|
||||
if err := ensure(k8sClient); err != nil {
|
||||
monitor.Error(err)
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
@@ -1,195 +0,0 @@
|
||||
package databases
|
||||
|
||||
import (
|
||||
"github.com/caos/orbos/mntr"
|
||||
"github.com/caos/orbos/pkg/git"
|
||||
"github.com/caos/orbos/pkg/kubernetes"
|
||||
"github.com/caos/orbos/pkg/tree"
|
||||
"github.com/caos/zitadel/operator/api/database"
|
||||
coredb "github.com/caos/zitadel/operator/database/kinds/databases/core"
|
||||
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
|
||||
)
|
||||
|
||||
func CrdListUsers(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
) ([]string, error) {
|
||||
desired, err := database.ReadCrd(k8sClient)
|
||||
if err != nil {
|
||||
monitor.Error(err)
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return listUsers(monitor, k8sClient, desired)
|
||||
}
|
||||
|
||||
func GitOpsListUsers(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
gitClient *git.Client,
|
||||
) ([]string, error) {
|
||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||
if err != nil {
|
||||
monitor.Error(err)
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return listUsers(monitor, k8sClient, desired)
|
||||
}
|
||||
|
||||
func listUsers(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
desired *tree.Tree,
|
||||
) ([]string, error) {
|
||||
current := &tree.Tree{}
|
||||
|
||||
query, _, _, _, _, _, err := orbdb.AdaptFunc("", nil, false, "database")(monitor, desired, current)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
queried := map[string]interface{}{}
|
||||
_, err = query(k8sClient, queried)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
currentDB, err := coredb.ParseQueriedForDatabase(queried)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
list, err := currentDB.GetListUsersFunc()(k8sClient)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
users := []string{}
|
||||
for _, listedUser := range list {
|
||||
if listedUser != "root" {
|
||||
users = append(users, listedUser)
|
||||
}
|
||||
}
|
||||
|
||||
return users, nil
|
||||
}
|
||||
|
||||
func CrdAddUser(
|
||||
monitor mntr.Monitor,
|
||||
user string,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
) error {
|
||||
desired, err := database.ReadCrd(k8sClient)
|
||||
if err != nil {
|
||||
monitor.Error(err)
|
||||
return err
|
||||
}
|
||||
return addUser(monitor, user, k8sClient, desired)
|
||||
}
|
||||
|
||||
func GitOpsAddUser(
|
||||
monitor mntr.Monitor,
|
||||
user string,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
gitClient *git.Client,
|
||||
) error {
|
||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||
if err != nil {
|
||||
monitor.Error(err)
|
||||
return err
|
||||
}
|
||||
return addUser(monitor, user, k8sClient, desired)
|
||||
}
|
||||
|
||||
func addUser(
|
||||
monitor mntr.Monitor,
|
||||
user string,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
desired *tree.Tree,
|
||||
) error {
|
||||
current := &tree.Tree{}
|
||||
|
||||
query, _, _, _, _, _, err := orbdb.AdaptFunc("", nil, false, "database")(monitor, desired, current)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
queried := map[string]interface{}{}
|
||||
_, err = query(k8sClient, queried)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
currentDB, err := coredb.ParseQueriedForDatabase(queried)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
queryUser, err := currentDB.GetAddUserFunc()(user)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
ensureUser, err := queryUser(k8sClient, queried)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return ensureUser(k8sClient)
|
||||
}
|
||||
|
||||
func GitOpsDeleteUser(
|
||||
monitor mntr.Monitor,
|
||||
user string,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
gitClient *git.Client,
|
||||
) error {
|
||||
desired, err := gitClient.ReadTree(git.DatabaseFile)
|
||||
if err != nil {
|
||||
monitor.Error(err)
|
||||
return err
|
||||
}
|
||||
|
||||
return deleteUser(monitor, user, k8sClient, desired)
|
||||
}
|
||||
|
||||
func CrdDeleteUser(
|
||||
monitor mntr.Monitor,
|
||||
user string,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
) error {
|
||||
desired, err := database.ReadCrd(k8sClient)
|
||||
if err != nil {
|
||||
monitor.Error(err)
|
||||
return err
|
||||
}
|
||||
|
||||
return deleteUser(monitor, user, k8sClient, desired)
|
||||
}
|
||||
|
||||
func deleteUser(
|
||||
monitor mntr.Monitor,
|
||||
user string,
|
||||
k8sClient kubernetes.ClientInt,
|
||||
desired *tree.Tree,
|
||||
) error {
|
||||
current := &tree.Tree{}
|
||||
|
||||
query, _, _, _, _, _, err := orbdb.AdaptFunc("", nil, false, "database")(monitor, desired, current)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
queried := map[string]interface{}{}
|
||||
_, err = query(k8sClient, queried)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
currentDB, err := coredb.ParseQueriedForDatabase(queried)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
deleteUser, err := currentDB.GetDeleteUserFunc()(user)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return deleteUser(k8sClient)
|
||||
}
|
@@ -1,703 +0,0 @@
|
||||
package kubernetes
|
||||
|
||||
import (
|
||||
"github.com/caos/zitadel/operator/common"
|
||||
|
||||
"gopkg.in/yaml.v3"
|
||||
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
||||
|
||||
"github.com/caos/orbos/mntr"
|
||||
"github.com/caos/orbos/pkg/kubernetes"
|
||||
"github.com/caos/orbos/pkg/labels"
|
||||
apps "k8s.io/api/apps/v1"
|
||||
core "k8s.io/api/core/v1"
|
||||
rbac "k8s.io/api/rbac/v1"
|
||||
"k8s.io/apimachinery/pkg/api/resource"
|
||||
mach "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
)
|
||||
|
||||
const (
|
||||
namespace = "caos-system"
|
||||
)
|
||||
|
||||
func getZitadelOperatorNameLabels(apiLabels *labels.API) *labels.Name {
|
||||
return toNameLabels(apiLabels, "zitadel-operator")
|
||||
}
|
||||
|
||||
func EnsureZitadelOperatorArtifacts(
|
||||
monitor mntr.Monitor,
|
||||
apiLabels *labels.API,
|
||||
client kubernetes.ClientInt,
|
||||
version string,
|
||||
nodeselector map[string]string,
|
||||
tolerations []core.Toleration,
|
||||
customImageRegistry string,
|
||||
gitops bool,
|
||||
) error {
|
||||
|
||||
monitor.WithFields(map[string]interface{}{
|
||||
"zitadel": version,
|
||||
}).Debug("Ensuring zitadel artifacts")
|
||||
|
||||
nameLabels := getZitadelOperatorNameLabels(apiLabels)
|
||||
k8sNameLabels := labels.MustK8sMap(nameLabels)
|
||||
k8sPodSelector := labels.MustK8sMap(labels.DeriveNameSelector(nameLabels, false))
|
||||
|
||||
if version == "" {
|
||||
return nil
|
||||
}
|
||||
|
||||
if err := client.ApplyServiceAccount(&core.ServiceAccount{
|
||||
ObjectMeta: mach.ObjectMeta{
|
||||
Name: nameLabels.Name(),
|
||||
Namespace: namespace,
|
||||
},
|
||||
}); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := client.ApplyClusterRole(&rbac.ClusterRole{
|
||||
ObjectMeta: mach.ObjectMeta{
|
||||
Name: nameLabels.Name(),
|
||||
Labels: k8sNameLabels,
|
||||
},
|
||||
Rules: []rbac.PolicyRule{{
|
||||
APIGroups: []string{"*"},
|
||||
Resources: []string{"*"},
|
||||
Verbs: []string{"*"},
|
||||
}},
|
||||
}); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := client.ApplyClusterRoleBinding(&rbac.ClusterRoleBinding{
|
||||
ObjectMeta: mach.ObjectMeta{
|
||||
Name: nameLabels.Name(),
|
||||
Labels: k8sNameLabels,
|
||||
},
|
||||
|
||||
RoleRef: rbac.RoleRef{
|
||||
APIGroup: "rbac.authorization.k8s.io",
|
||||
Kind: "ClusterRole",
|
||||
Name: nameLabels.Name(),
|
||||
},
|
||||
Subjects: []rbac.Subject{{
|
||||
Kind: "ServiceAccount",
|
||||
Name: nameLabels.Name(),
|
||||
Namespace: namespace,
|
||||
}},
|
||||
}); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if !gitops {
|
||||
crd := `apiVersion: apiextensions.k8s.io/v1
|
||||
kind: CustomResourceDefinition
|
||||
metadata:
|
||||
annotations:
|
||||
controller-gen.kubebuilder.io/version: v0.7.0
|
||||
creationTimestamp: null
|
||||
name: zitadels.caos.ch
|
||||
spec:
|
||||
group: caos.ch
|
||||
names:
|
||||
kind: Zitadel
|
||||
listKind: ZitadelList
|
||||
plural: zitadels
|
||||
singular: zitadel
|
||||
scope: Namespaced
|
||||
versions:
|
||||
- name: v1
|
||||
schema:
|
||||
openAPIV3Schema:
|
||||
properties:
|
||||
apiVersion:
|
||||
description: 'APIVersion defines the versioned schema of this representation
|
||||
of an object. Servers should convert recognized schemas to the latest
|
||||
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||
type: string
|
||||
kind:
|
||||
description: 'Kind is a string value representing the REST resource this
|
||||
object represents. Servers may infer this from the endpoint the client
|
||||
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||
type: string
|
||||
metadata:
|
||||
type: object
|
||||
spec:
|
||||
properties:
|
||||
apiVersion:
|
||||
description: Don't access X_ApiVersion, it is only exported for (de-)serialization.
|
||||
Use Version and OverwriteVersion methods instead.
|
||||
type: string
|
||||
iam:
|
||||
type: object
|
||||
kind:
|
||||
type: string
|
||||
spec:
|
||||
properties:
|
||||
customImageRegistry:
|
||||
description: 'Use this registry to pull container images from
|
||||
@default: <multiple public registries>'
|
||||
type: string
|
||||
nodeSelector:
|
||||
additionalProperties:
|
||||
type: string
|
||||
type: object
|
||||
selfReconciling:
|
||||
type: boolean
|
||||
tolerations:
|
||||
items:
|
||||
description: The pod this Toleration is attached to tolerates
|
||||
any taint that matches the triple <key,value,effect> using
|
||||
the matching operator <operator>.
|
||||
properties:
|
||||
effect:
|
||||
description: Effect indicates the taint effect to match.
|
||||
Empty means match all taint effects. When specified, allowed
|
||||
values are NoSchedule, PreferNoSchedule and NoExecute.
|
||||
type: string
|
||||
key:
|
||||
description: Key is the taint key that the toleration applies
|
||||
to. Empty means match all taint keys. If the key is empty,
|
||||
operator must be Exists; this combination means to match
|
||||
all values and all keys.
|
||||
type: string
|
||||
operator:
|
||||
description: Operator represents a key's relationship to
|
||||
the value. Valid operators are Exists and Equal. Defaults
|
||||
to Equal. Exists is equivalent to wildcard for value,
|
||||
so that a pod can tolerate all taints of a particular
|
||||
category.
|
||||
type: string
|
||||
tolerationSeconds:
|
||||
description: TolerationSeconds represents the period of
|
||||
time the toleration (which must be of effect NoExecute,
|
||||
otherwise this field is ignored) tolerates the taint.
|
||||
By default, it is not set, which means tolerate the taint
|
||||
forever (do not evict). Zero and negative values will
|
||||
be treated as 0 (evict immediately) by the system.
|
||||
format: int64
|
||||
type: integer
|
||||
value:
|
||||
description: Value is the taint value the toleration matches
|
||||
to. If the operator is Exists, the value should be empty,
|
||||
otherwise just a regular string.
|
||||
type: string
|
||||
type: object
|
||||
type: array
|
||||
verbose:
|
||||
type: boolean
|
||||
version:
|
||||
type: string
|
||||
required:
|
||||
- selfReconciling
|
||||
- verbose
|
||||
type: object
|
||||
version:
|
||||
description: Don't access X_Version, it is only exported for (de-)serialization.
|
||||
Use Version and OverwriteVersion methods instead.
|
||||
type: string
|
||||
required:
|
||||
- iam
|
||||
- kind
|
||||
- spec
|
||||
type: object
|
||||
status:
|
||||
type: object
|
||||
type: object
|
||||
served: true
|
||||
storage: true
|
||||
status:
|
||||
acceptedNames:
|
||||
kind: ""
|
||||
plural: ""
|
||||
conditions: []
|
||||
storedVersions: []`
|
||||
|
||||
crdDefinition := &unstructured.Unstructured{}
|
||||
if err := yaml.Unmarshal([]byte(crd), &crdDefinition.Object); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := client.ApplyCRDResource(
|
||||
crdDefinition,
|
||||
); err != nil {
|
||||
return err
|
||||
}
|
||||
monitor.WithFields(map[string]interface{}{
|
||||
"version": version,
|
||||
}).Debug("Database Operator crd ensured")
|
||||
}
|
||||
|
||||
var (
|
||||
cmd = []string{"/zitadelctl", "operator", "--kubeconfig", ""}
|
||||
volumes []core.Volume
|
||||
volumeMounts []core.VolumeMount
|
||||
)
|
||||
|
||||
if gitops {
|
||||
cmd = append(cmd, "--gitops", "-f", "/secrets/orbconfig")
|
||||
volumes = []core.Volume{{
|
||||
Name: "orbconfig",
|
||||
VolumeSource: core.VolumeSource{
|
||||
Secret: &core.SecretVolumeSource{
|
||||
SecretName: "caos",
|
||||
},
|
||||
},
|
||||
}}
|
||||
volumeMounts = []core.VolumeMount{{
|
||||
Name: "orbconfig",
|
||||
ReadOnly: true,
|
||||
MountPath: "/secrets",
|
||||
}}
|
||||
}
|
||||
|
||||
if _, _, analyticsEnabled := mntr.Environment(); !analyticsEnabled {
|
||||
cmd = append(cmd, "--disable-analytics")
|
||||
}
|
||||
|
||||
deployment := &apps.Deployment{
|
||||
ObjectMeta: mach.ObjectMeta{
|
||||
Name: nameLabels.Name(),
|
||||
Namespace: namespace,
|
||||
Labels: k8sNameLabels,
|
||||
},
|
||||
Spec: apps.DeploymentSpec{
|
||||
Replicas: int32Ptr(1),
|
||||
Selector: &mach.LabelSelector{
|
||||
MatchLabels: k8sPodSelector,
|
||||
},
|
||||
Template: core.PodTemplateSpec{
|
||||
ObjectMeta: mach.ObjectMeta{
|
||||
Labels: labels.MustK8sMap(labels.AsSelectable(nameLabels)),
|
||||
},
|
||||
Spec: core.PodSpec{
|
||||
ServiceAccountName: nameLabels.Name(),
|
||||
Containers: []core.Container{{
|
||||
Name: "zitadel",
|
||||
ImagePullPolicy: core.PullIfNotPresent,
|
||||
Image: common.ZITADELOperatorImage.Reference(customImageRegistry, version),
|
||||
Command: cmd,
|
||||
Args: []string{},
|
||||
Ports: []core.ContainerPort{{
|
||||
Name: "metrics",
|
||||
ContainerPort: 2112,
|
||||
Protocol: "TCP",
|
||||
}},
|
||||
VolumeMounts: volumeMounts,
|
||||
Resources: core.ResourceRequirements{
|
||||
Limits: core.ResourceList{
|
||||
"cpu": resource.MustParse("500m"),
|
||||
"memory": resource.MustParse("500Mi"),
|
||||
},
|
||||
Requests: core.ResourceList{
|
||||
"cpu": resource.MustParse("250m"),
|
||||
"memory": resource.MustParse("250Mi"),
|
||||
},
|
||||
},
|
||||
}},
|
||||
NodeSelector: nodeselector,
|
||||
Tolerations: tolerations,
|
||||
Volumes: volumes,
|
||||
TerminationGracePeriodSeconds: int64Ptr(10),
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
if err := client.ApplyDeployment(deployment, true); err != nil {
|
||||
return err
|
||||
}
|
||||
monitor.WithFields(map[string]interface{}{
|
||||
"version": version,
|
||||
}).Debug("Zitadel Operator deployment ensured")
|
||||
|
||||
return nil
|
||||
}
|
||||
func DestroyZitadelOperator(
|
||||
monitor mntr.Monitor,
|
||||
apiLabels *labels.API,
|
||||
client kubernetes.ClientInt,
|
||||
gitops bool,
|
||||
) error {
|
||||
nameLabels := getZitadelOperatorNameLabels(apiLabels)
|
||||
|
||||
monitor.WithFields(map[string]interface{}{}).Debug("Destroying zitadel artifacts")
|
||||
|
||||
if err := client.DeleteServiceAccount(namespace, nameLabels.Name()); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := client.DeleteClusterRole(nameLabels.Name()); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := client.DeleteClusterRoleBinding(nameLabels.Name()); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if !gitops {
|
||||
if err := client.DeleteCRDResource("apiextensions.k8s.io", "v1beta1", "CustomResourceDefinition", "zitadels.caos.ch"); err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
if err := client.DeleteDeployment(namespace, nameLabels.Name()); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func ScaleZitadelOperator(
|
||||
monitor mntr.Monitor,
|
||||
client kubernetes.ClientInt,
|
||||
replicaCount int,
|
||||
) error {
|
||||
monitor.Debug("Scaling zitadel-operator")
|
||||
return client.ScaleDeployment(namespace, "zitadel-operator", replicaCount)
|
||||
}
|
||||
|
||||
func ScaleDatabaseOperator(
|
||||
monitor mntr.Monitor,
|
||||
client kubernetes.ClientInt,
|
||||
replicaCount int,
|
||||
) error {
|
||||
monitor.Debug("Scaling database-operator")
|
||||
return client.ScaleDeployment(namespace, "database-operator", replicaCount)
|
||||
}
|
||||
|
||||
func int32Ptr(i int32) *int32 { return &i }
|
||||
func int64Ptr(i int64) *int64 { return &i }
|
||||
|
||||
func toNameLabels(apiLabels *labels.API, operatorName string) *labels.Name {
|
||||
return labels.MustForName(labels.MustForComponent(apiLabels, "operator"), operatorName)
|
||||
}
|
||||
|
||||
func getDatabaseOperatorNameLabels(apiLabels *labels.API) *labels.Name {
|
||||
return toNameLabels(apiLabels, "database-operator")
|
||||
}
|
||||
|
||||
func EnsureDatabaseArtifacts(
|
||||
monitor mntr.Monitor,
|
||||
apiLabels *labels.API,
|
||||
client kubernetes.ClientInt,
|
||||
version string,
|
||||
nodeselector map[string]string,
|
||||
tolerations []core.Toleration,
|
||||
customImageRegistry string,
|
||||
gitops bool) error {
|
||||
|
||||
monitor.WithFields(map[string]interface{}{
|
||||
"database": version,
|
||||
}).Debug("Ensuring database artifacts")
|
||||
|
||||
if version == "" {
|
||||
return nil
|
||||
}
|
||||
|
||||
nameLabels := toNameLabels(apiLabels, "database-operator")
|
||||
k8sNameLabels := labels.MustK8sMap(nameLabels)
|
||||
|
||||
if err := client.ApplyServiceAccount(&core.ServiceAccount{
|
||||
ObjectMeta: mach.ObjectMeta{
|
||||
Name: nameLabels.Name(),
|
||||
Namespace: namespace,
|
||||
Labels: k8sNameLabels,
|
||||
},
|
||||
}); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := client.ApplyClusterRole(&rbac.ClusterRole{
|
||||
ObjectMeta: mach.ObjectMeta{
|
||||
Name: nameLabels.Name(),
|
||||
Labels: k8sNameLabels,
|
||||
},
|
||||
Rules: []rbac.PolicyRule{{
|
||||
APIGroups: []string{"*"},
|
||||
Resources: []string{"*"},
|
||||
Verbs: []string{"*"},
|
||||
}},
|
||||
}); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := client.ApplyClusterRoleBinding(&rbac.ClusterRoleBinding{
|
||||
ObjectMeta: mach.ObjectMeta{
|
||||
Name: nameLabels.Name(),
|
||||
Labels: k8sNameLabels,
|
||||
},
|
||||
|
||||
RoleRef: rbac.RoleRef{
|
||||
APIGroup: "rbac.authorization.k8s.io",
|
||||
Kind: "ClusterRole",
|
||||
Name: nameLabels.Name(),
|
||||
},
|
||||
Subjects: []rbac.Subject{{
|
||||
Kind: "ServiceAccount",
|
||||
Name: nameLabels.Name(),
|
||||
Namespace: namespace,
|
||||
}},
|
||||
}); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if !gitops {
|
||||
crd := `apiVersion: apiextensions.k8s.io/v1
|
||||
kind: CustomResourceDefinition
|
||||
metadata:
|
||||
annotations:
|
||||
controller-gen.kubebuilder.io/version: v0.7.0
|
||||
creationTimestamp: null
|
||||
name: databases.caos.ch
|
||||
spec:
|
||||
group: caos.ch
|
||||
names:
|
||||
kind: Database
|
||||
listKind: DatabaseList
|
||||
plural: databases
|
||||
singular: database
|
||||
scope: Namespaced
|
||||
versions:
|
||||
- name: v1
|
||||
schema:
|
||||
openAPIV3Schema:
|
||||
properties:
|
||||
apiVersion:
|
||||
description: 'APIVersion defines the versioned schema of this representation
|
||||
of an object. Servers should convert recognized schemas to the latest
|
||||
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||
type: string
|
||||
kind:
|
||||
description: 'Kind is a string value representing the REST resource this
|
||||
object represents. Servers may infer this from the endpoint the client
|
||||
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||
type: string
|
||||
metadata:
|
||||
type: object
|
||||
spec:
|
||||
properties:
|
||||
apiVersion:
|
||||
description: Don't access X_ApiVersion, it is only exported for (de-)serialization.
|
||||
Use Version and OverwriteVersion methods instead.
|
||||
type: string
|
||||
database:
|
||||
type: object
|
||||
kind:
|
||||
type: string
|
||||
spec:
|
||||
properties:
|
||||
customImageRegistry:
|
||||
description: 'Use this registry to pull container images from
|
||||
@default: <multiple public registries>'
|
||||
type: string
|
||||
nodeSelector:
|
||||
additionalProperties:
|
||||
type: string
|
||||
type: object
|
||||
selfReconciling:
|
||||
type: boolean
|
||||
tolerations:
|
||||
items:
|
||||
description: The pod this Toleration is attached to tolerates
|
||||
any taint that matches the triple <key,value,effect> using
|
||||
the matching operator <operator>.
|
||||
properties:
|
||||
effect:
|
||||
description: Effect indicates the taint effect to match.
|
||||
Empty means match all taint effects. When specified, allowed
|
||||
values are NoSchedule, PreferNoSchedule and NoExecute.
|
||||
type: string
|
||||
key:
|
||||
description: Key is the taint key that the toleration applies
|
||||
to. Empty means match all taint keys. If the key is empty,
|
||||
operator must be Exists; this combination means to match
|
||||
all values and all keys.
|
||||
type: string
|
||||
operator:
|
||||
description: Operator represents a key's relationship to
|
||||
the value. Valid operators are Exists and Equal. Defaults
|
||||
to Equal. Exists is equivalent to wildcard for value,
|
||||
so that a pod can tolerate all taints of a particular
|
||||
category.
|
||||
type: string
|
||||
tolerationSeconds:
|
||||
description: TolerationSeconds represents the period of
|
||||
time the toleration (which must be of effect NoExecute,
|
||||
otherwise this field is ignored) tolerates the taint.
|
||||
By default, it is not set, which means tolerate the taint
|
||||
forever (do not evict). Zero and negative values will
|
||||
be treated as 0 (evict immediately) by the system.
|
||||
format: int64
|
||||
type: integer
|
||||
value:
|
||||
description: Value is the taint value the toleration matches
|
||||
to. If the operator is Exists, the value should be empty,
|
||||
otherwise just a regular string.
|
||||
type: string
|
||||
type: object
|
||||
type: array
|
||||
verbose:
|
||||
type: boolean
|
||||
version:
|
||||
type: string
|
||||
required:
|
||||
- selfReconciling
|
||||
- verbose
|
||||
type: object
|
||||
version:
|
||||
description: Don't access X_Version, it is only exported for (de-)serialization.
|
||||
Use Version and OverwriteVersion methods instead.
|
||||
type: string
|
||||
required:
|
||||
- database
|
||||
- kind
|
||||
- spec
|
||||
type: object
|
||||
status:
|
||||
type: object
|
||||
type: object
|
||||
served: true
|
||||
storage: true
|
||||
status:
|
||||
acceptedNames:
|
||||
kind: ""
|
||||
plural: ""
|
||||
conditions: []
|
||||
storedVersions: []`
|
||||
|
||||
crdDefinition := &unstructured.Unstructured{}
|
||||
if err := yaml.Unmarshal([]byte(crd), &crdDefinition.Object); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := client.ApplyCRDResource(
|
||||
crdDefinition,
|
||||
); err != nil {
|
||||
return err
|
||||
}
|
||||
monitor.WithFields(map[string]interface{}{
|
||||
"version": version,
|
||||
}).Debug("Database Operator crd ensured")
|
||||
}
|
||||
|
||||
var (
|
||||
cmd = []string{"/zitadelctl", "database", "--kubeconfig", ""}
|
||||
volumes []core.Volume
|
||||
volumeMounts []core.VolumeMount
|
||||
)
|
||||
|
||||
if gitops {
|
||||
cmd = append(cmd, "--gitops", "-f", "/secrets/orbconfig")
|
||||
volumes = []core.Volume{{
|
||||
Name: "orbconfig",
|
||||
VolumeSource: core.VolumeSource{
|
||||
Secret: &core.SecretVolumeSource{
|
||||
SecretName: "caos",
|
||||
},
|
||||
},
|
||||
}}
|
||||
volumeMounts = []core.VolumeMount{{
|
||||
Name: "orbconfig",
|
||||
ReadOnly: true,
|
||||
MountPath: "/secrets",
|
||||
}}
|
||||
}
|
||||
|
||||
if _, _, analyticsEnabled := mntr.Environment(); !analyticsEnabled {
|
||||
cmd = append(cmd, "--disable-analytics")
|
||||
}
|
||||
|
||||
deployment := &apps.Deployment{
|
||||
ObjectMeta: mach.ObjectMeta{
|
||||
Name: nameLabels.Name(),
|
||||
Namespace: namespace,
|
||||
Labels: k8sNameLabels,
|
||||
},
|
||||
Spec: apps.DeploymentSpec{
|
||||
Replicas: int32Ptr(1),
|
||||
Selector: &mach.LabelSelector{
|
||||
MatchLabels: labels.MustK8sMap(labels.DeriveNameSelector(nameLabels, false)),
|
||||
},
|
||||
Template: core.PodTemplateSpec{
|
||||
ObjectMeta: mach.ObjectMeta{
|
||||
Labels: labels.MustK8sMap(labels.AsSelectable(nameLabels)),
|
||||
},
|
||||
Spec: core.PodSpec{
|
||||
ServiceAccountName: nameLabels.Name(),
|
||||
Containers: []core.Container{{
|
||||
Name: "database",
|
||||
ImagePullPolicy: core.PullIfNotPresent,
|
||||
Image: common.ZITADELOperatorImage.Reference(customImageRegistry, version),
|
||||
Command: cmd,
|
||||
Args: []string{},
|
||||
Ports: []core.ContainerPort{{
|
||||
Name: "metrics",
|
||||
ContainerPort: 2112,
|
||||
Protocol: "TCP",
|
||||
}},
|
||||
VolumeMounts: volumeMounts,
|
||||
Resources: core.ResourceRequirements{
|
||||
Limits: core.ResourceList{
|
||||
"cpu": resource.MustParse("500m"),
|
||||
"memory": resource.MustParse("500Mi"),
|
||||
},
|
||||
Requests: core.ResourceList{
|
||||
"cpu": resource.MustParse("250m"),
|
||||
"memory": resource.MustParse("250Mi"),
|
||||
},
|
||||
},
|
||||
}},
|
||||
NodeSelector: nodeselector,
|
||||
Tolerations: tolerations,
|
||||
Volumes: volumes,
|
||||
TerminationGracePeriodSeconds: int64Ptr(10),
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
if err := client.ApplyDeployment(deployment, true); err != nil {
|
||||
return err
|
||||
}
|
||||
monitor.WithFields(map[string]interface{}{
|
||||
"version": version,
|
||||
}).Debug("Database Operator deployment ensured")
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func DestroyDatabaseOperator(
|
||||
monitor mntr.Monitor,
|
||||
apiLabels *labels.API,
|
||||
client kubernetes.ClientInt,
|
||||
gitops bool,
|
||||
) error {
|
||||
nameLabels := getDatabaseOperatorNameLabels(apiLabels)
|
||||
|
||||
monitor.WithFields(map[string]interface{}{}).Debug("Destroying database artifacts")
|
||||
|
||||
if err := client.DeleteServiceAccount(namespace, nameLabels.Name()); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := client.DeleteClusterRole(nameLabels.Name()); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := client.DeleteClusterRoleBinding(nameLabels.Name()); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if !gitops {
|
||||
if err := client.DeleteCRDResource("apiextensions.k8s.io", "v1beta1", "CustomResourceDefinition", "databases.caos.ch"); err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
if err := client.DeleteDeployment(namespace, nameLabels.Name()); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
@@ -1,67 +0,0 @@
|
||||
package zitadel
|
||||
|
||||
import (
|
||||
"github.com/caos/orbos/mntr"
|
||||
"github.com/caos/orbos/pkg/git"
|
||||
"github.com/caos/orbos/pkg/kubernetes"
|
||||
orbconfig "github.com/caos/orbos/pkg/orb"
|
||||
"github.com/caos/orbos/pkg/tree"
|
||||
"github.com/caos/zitadel/operator/api/zitadel"
|
||||
"github.com/caos/zitadel/operator/zitadel/kinds/orb"
|
||||
)
|
||||
|
||||
//Take care! to use this function you have to include migration files into the binary
|
||||
func CrdMigrations(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient *kubernetes.Client,
|
||||
version *string,
|
||||
) error {
|
||||
desired, err := zitadel.ReadCrd(k8sClient)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return migrations(monitor, nil, k8sClient, false, version, desired)
|
||||
}
|
||||
|
||||
//Take care! to use this function you have to include migration files into the binary
|
||||
func GitOpsMigrations(
|
||||
monitor mntr.Monitor,
|
||||
orbCfg *orbconfig.Orb,
|
||||
gitClient *git.Client,
|
||||
k8sClient *kubernetes.Client,
|
||||
version *string,
|
||||
) error {
|
||||
desired, err := gitClient.ReadTree(git.ZitadelFile)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return migrations(monitor, orbCfg, k8sClient, true, version, desired)
|
||||
}
|
||||
|
||||
//Take care! to use this function you have to include migration files into the binary
|
||||
func migrations(
|
||||
monitor mntr.Monitor,
|
||||
orbCfg *orbconfig.Orb,
|
||||
k8sClient *kubernetes.Client,
|
||||
gitops bool,
|
||||
version *string,
|
||||
desired *tree.Tree,
|
||||
) error {
|
||||
current := &tree.Tree{}
|
||||
query, _, _, _, _, _, err := orb.AdaptFunc(orbCfg, "migration", version, gitops, []string{"migration"})(monitor, desired, current)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
ensure, err := query(k8sClient, map[string]interface{}{})
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := ensure(k8sClient); err != nil {
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
@@ -1,65 +0,0 @@
|
||||
package zitadel
|
||||
|
||||
import (
|
||||
"github.com/caos/orbos/mntr"
|
||||
"github.com/caos/orbos/pkg/git"
|
||||
"github.com/caos/orbos/pkg/kubernetes"
|
||||
orbconfig "github.com/caos/orbos/pkg/orb"
|
||||
"github.com/caos/orbos/pkg/tree"
|
||||
"github.com/caos/zitadel/operator/api/zitadel"
|
||||
"github.com/caos/zitadel/operator/zitadel/kinds/orb"
|
||||
)
|
||||
|
||||
func CrdScaleDown(
|
||||
monitor mntr.Monitor,
|
||||
k8sClient *kubernetes.Client,
|
||||
version *string,
|
||||
) error {
|
||||
desired, err := zitadel.ReadCrd(k8sClient)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return scaleDown(monitor, nil, k8sClient, false, version, desired)
|
||||
}
|
||||
|
||||
func GitOpsScaleDown(
|
||||
monitor mntr.Monitor,
|
||||
orbCfg *orbconfig.Orb,
|
||||
gitClient *git.Client,
|
||||
k8sClient *kubernetes.Client,
|
||||
version *string,
|
||||
) error {
|
||||
desired, err := gitClient.ReadTree(git.ZitadelFile)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return scaleDown(monitor, orbCfg, k8sClient, true, version, desired)
|
||||
}
|
||||
|
||||
//Take care! to use this function you have to include migration files into the binary
|
||||
func scaleDown(
|
||||
monitor mntr.Monitor,
|
||||
orbCfg *orbconfig.Orb,
|
||||
k8sClient *kubernetes.Client,
|
||||
gitops bool,
|
||||
version *string,
|
||||
desired *tree.Tree,
|
||||
) error {
|
||||
current := &tree.Tree{}
|
||||
query, _, _, _, _, _, err := orb.AdaptFunc(orbCfg, "scaledown", version, gitops, []string{"scaledown"})(monitor, desired, current)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
ensure, err := query(k8sClient, map[string]interface{}{})
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := ensure(k8sClient); err != nil {
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
Reference in New Issue
Block a user