Stefan Benz 425a8b5fd5
feat(crdb): use crdb native backup and s3 backup added (#1915)
* fix(zitadelctl): implement takedown command

* fix(zitadelctl): correct destroy flow

* fix(zitadelctl): correct backup commands to read crds beforehand

* fix: add of destroyfile

* fix: clean for userlist

* fix: change backup and restore to crdb native

* fix: timeout for delete pvc for cockroachdb

* fix: corrected unit tests

* fix: add ignored file for scale

* fix: correct handling of gitops in backup command

* feat: add s3 backup kind

* fix: backuplist for s3 and timeout for pv deletion

* fix(database): fix nil pointer with binary version

* fix(database): cleanup of errors which cam with merging of the s3 logic

* fix: correct unit tests

* fix: cleanup monitor output

Co-authored-by: Elio Bischof <eliobischof@gmail.com>

* fix: backup imagepullpolixy to ifnotpresent

Co-authored-by: Elio Bischof <eliobischof@gmail.com>
2021-10-13 14:34:03 +02:00

153 lines
4.1 KiB
Go

package orb
import (
"fmt"
"github.com/caos/zitadel/operator/database/kinds/databases/managed"
"github.com/caos/orbos/mntr"
"github.com/caos/orbos/pkg/kubernetes"
"github.com/caos/orbos/pkg/kubernetes/resources/namespace"
"github.com/caos/orbos/pkg/labels"
"github.com/caos/orbos/pkg/secret"
"github.com/caos/orbos/pkg/tree"
"github.com/caos/orbos/pkg/treelabels"
"github.com/caos/zitadel/operator"
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/backup"
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/restore"
"github.com/caos/zitadel/operator/database/kinds/databases"
)
const (
NamespaceStr = "caos-zitadel"
)
func OperatorSelector() *labels.Selector {
return labels.OpenOperatorSelector("ZITADEL", "database.caos.ch")
}
func AdaptFunc(
timestamp string,
binaryVersion *string,
gitops bool,
features ...string,
) operator.AdaptFunc {
return func(
monitor mntr.Monitor,
orbDesiredTree *tree.Tree,
currentTree *tree.Tree,
) (
queryFunc operator.QueryFunc,
destroyFunc operator.DestroyFunc,
configureFunc operator.ConfigureFunc,
secrets map[string]*secret.Secret,
existing map[string]*secret.Existing,
migrate bool,
err error,
) {
defer func() {
if err != nil {
err = fmt.Errorf("building %s failed: %w", orbDesiredTree.Common.Kind, err)
}
}()
orbMonitor := monitor.WithField("kind", "orb")
desiredKind, err := ParseDesiredV0(orbDesiredTree)
if err != nil {
return nil, nil, nil, nil, nil, migrate, fmt.Errorf("parsing desired state failed: %w", err)
}
orbDesiredTree.Parsed = desiredKind
currentTree = &tree.Tree{}
if desiredKind.Spec.Verbose && !orbMonitor.IsVerbose() {
orbMonitor = orbMonitor.Verbose()
}
queryNS, err := namespace.AdaptFuncToEnsure(NamespaceStr)
if err != nil {
return nil, nil, nil, nil, nil, migrate, err
}
/*destroyNS, err := namespace.AdaptFuncToDestroy(NamespaceStr)
if err != nil {
return nil, nil, nil, err
}*/
databaseCurrent := &tree.Tree{}
operatorLabels := mustDatabaseOperator(binaryVersion)
version := ""
if binaryVersion != nil {
version = *binaryVersion
}
queryDB, destroyDB, configureDB, secrets, existing, migrate, err := databases.Adapt(
orbMonitor,
desiredKind.Database,
databaseCurrent,
NamespaceStr,
treelabels.MustForAPI(desiredKind.Database, operatorLabels),
timestamp,
desiredKind.Spec.NodeSelector,
desiredKind.Spec.Tolerations,
version,
features,
desiredKind.Spec.CustomImageRegistry,
)
if err != nil {
return nil, nil, nil, nil, nil, migrate, err
}
rec, _ := Reconcile(monitor, desiredKind.Spec, gitops)
destroyers := make([]operator.DestroyFunc, 0)
queriers := make([]operator.QueryFunc, 0)
dbOrBackup := false
for _, feature := range features {
switch feature {
case "database", backup.Instant, backup.Normal, restore.Instant, managed.Clean:
if !dbOrBackup {
dbOrBackup = true
queriers = append(queriers,
operator.ResourceQueryToZitadelQuery(queryNS),
queryDB,
)
destroyers = append(destroyers,
destroyDB,
)
}
case "operator":
queriers = append(queriers,
operator.ResourceQueryToZitadelQuery(queryNS),
operator.EnsureFuncToQueryFunc(rec),
)
}
}
currentTree.Parsed = &DesiredV0{
Common: tree.NewCommon("databases.caos.ch/Orb", "v0", false),
Database: databaseCurrent,
}
return func(k8sClient kubernetes.ClientInt, queried map[string]interface{}) (operator.EnsureFunc, error) {
if queried == nil {
queried = map[string]interface{}{}
}
monitor.WithField("queriers", len(queriers)).Info("Querying")
return operator.QueriersToEnsureFunc(monitor, true, queriers, k8sClient, queried)
},
func(k8sClient kubernetes.ClientInt) error {
monitor.WithField("destroyers", len(queriers)).Info("Destroy")
return operator.DestroyersToDestroyFunc(monitor, destroyers)(k8sClient)
},
func(k8sClient kubernetes.ClientInt, queried map[string]interface{}, gitops bool) error {
return configureDB(k8sClient, queried, gitops)
},
secrets,
existing,
migrate,
nil
}
}