mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-19 06:17:32 +00:00
c0878e4509
* docs: describe crd mode * docs: fix links * docs: fix commands and crdb resources * feat: add configure command * chore: use latest ORBOS * chore: use latest ORBOS * docs: start gitops docs * fix: compile * chore: fix build script path * chore: remove redundant prebuild * chore: add configure.go * docs: describe gitops mode * docs: point template links to main branch * docs: fix versions * feat: initialize empty keys * feat: reconfigure running ZITADEL * docs: describe crd mode * docs: fix links * docs: fix commands and crdb resources * feat: add configure command * chore: use latest ORBOS * chore: use latest ORBOS * docs: start gitops docs * fix: compile * chore: fix build script path * chore: remove redundant prebuild * chore: add configure.go * docs: describe gitops mode * docs: point template links to main branch * docs: fix versions * feat: initialize empty keys * feat: reconfigure running ZITADEL * test: fix * docs: keys are generated with configure * docs: remove keys from template * chore: pass compile time data * chore: use latest ORBOS * fix: when in-cluster, use in-cluster k8s client * fix: try in-cluster config if kubeconfig is empty * fix: reduce unneeded side effects for configure command * docs: boom version * chore: use latest ORBOS * chore: use latest ORBOS * initial commit * inital changes * commit WIP Information Architecture * commit a working state * add static assets and project * add org and fix img names * add plausible * remove img * change sidebar to easier mgmt * add openid oauth and domains * lint md * quickstarts * add auth flow * identity brokering * remove site * fix broken links * extend footer * extend readme * fix: styling * fix: zitadel logo on index * styling * border * fix: nav * fix: nav * fix: index * fix: corrected zitadelctl examples * fix: rename architecture to concepts * fix: introductions * fix: introductions * fix: introductions * docs: cli r/w secrets examples * docs: finish ZITADEL Enterprise Cloud * docs: mention ZITADEL Enterprise Cloud tier * docs: comment configuration options * docs: fix broken links * docs: move some introduction texts around * docs: twilio and email are mandatory * docs: download latest binaries Co-authored-by: Florian Forster <florian@caos.ch> Co-authored-by: fabi <fabienne.gerschwiler@gmail.com> Co-authored-by: Livio Amstutz <livio.a@gmail.com> Co-authored-by: Stefan Benz <stefan@caos.ch>
179 lines
6.3 KiB
Go
179 lines
6.3 KiB
Go
package managed
|
|
|
|
import (
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/caos/orbos/mntr"
|
|
kubernetesmock "github.com/caos/orbos/pkg/kubernetes/mock"
|
|
"github.com/caos/orbos/pkg/labels"
|
|
"github.com/caos/orbos/pkg/secret"
|
|
"github.com/caos/orbos/pkg/tree"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/backup"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/clean"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/restore"
|
|
"github.com/golang/mock/gomock"
|
|
"github.com/stretchr/testify/assert"
|
|
corev1 "k8s.io/api/core/v1"
|
|
)
|
|
|
|
func getTreeWithDBAndBackup(t *testing.T, masterkey string, saJson string, backupName string) *tree.Tree {
|
|
|
|
bucketDesired := getDesiredTree(t, masterkey, &bucket.DesiredV0{
|
|
Common: &tree.Common{
|
|
Kind: "databases.caos.ch/BucketBackup",
|
|
Version: "v0",
|
|
},
|
|
Spec: &bucket.Spec{
|
|
Verbose: true,
|
|
Cron: "testCron",
|
|
Bucket: "testBucket",
|
|
ServiceAccountJSON: &secret.Secret{
|
|
Value: saJson,
|
|
},
|
|
},
|
|
})
|
|
bucketDesiredKind, err := bucket.ParseDesiredV0(bucketDesired)
|
|
assert.NoError(t, err)
|
|
bucketDesired.Parsed = bucketDesiredKind
|
|
|
|
return getDesiredTree(t, masterkey, &DesiredV0{
|
|
Common: &tree.Common{
|
|
Kind: "databases.caos.ch/CockroachDB",
|
|
Version: "v0",
|
|
},
|
|
Spec: Spec{
|
|
Verbose: false,
|
|
ReplicaCount: 1,
|
|
StorageCapacity: "368Gi",
|
|
StorageClass: "testSC",
|
|
NodeSelector: map[string]string{},
|
|
ClusterDns: "testDns",
|
|
Backups: map[string]*tree.Tree{backupName: bucketDesired},
|
|
},
|
|
})
|
|
}
|
|
|
|
func TestManaged_AdaptBucketBackup(t *testing.T) {
|
|
monitor := mntr.Monitor{}
|
|
componentLabels := labels.MustForComponent(labels.MustForAPI(labels.MustForOperator("testProd", "testOp", "testVersion"), "testKind", "v0"), "database")
|
|
|
|
labels := map[string]string{
|
|
"app.kubernetes.io/component": "backup",
|
|
"app.kubernetes.io/managed-by": "testOp",
|
|
"app.kubernetes.io/name": "backup-serviceaccountjson",
|
|
"app.kubernetes.io/part-of": "testProd",
|
|
"app.kubernetes.io/version": "testVersion",
|
|
"caos.ch/apiversion": "v0",
|
|
"caos.ch/kind": "BucketBackup",
|
|
}
|
|
namespace := "testNs"
|
|
timestamp := "testTs"
|
|
nodeselector := map[string]string{"test": "test"}
|
|
tolerations := []corev1.Toleration{}
|
|
version := "testVersion"
|
|
k8sClient := kubernetesmock.NewMockClientInt(gomock.NewController(t))
|
|
backupName := "testBucket"
|
|
saJson := "testSA"
|
|
masterkey := "testMk"
|
|
|
|
desired := getTreeWithDBAndBackup(t, masterkey, saJson, backupName)
|
|
|
|
features := []string{backup.Normal}
|
|
bucket.SetBackup(k8sClient, namespace, labels, saJson)
|
|
k8sClient.EXPECT().WaitUntilStatefulsetIsReady(namespace, SfsName, true, true, 60*time.Second)
|
|
|
|
query, _, _, _, _, _, err := Adapter(componentLabels, namespace, timestamp, nodeselector, tolerations, version, features)(monitor, desired, &tree.Tree{})
|
|
assert.NoError(t, err)
|
|
|
|
databases := []string{"test1", "test2"}
|
|
queried := bucket.SetQueriedForDatabases(databases)
|
|
ensure, err := query(k8sClient, queried)
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, ensure)
|
|
|
|
assert.NoError(t, ensure(k8sClient))
|
|
}
|
|
|
|
func TestManaged_AdaptBucketInstantBackup(t *testing.T) {
|
|
monitor := mntr.Monitor{}
|
|
componentLabels := labels.MustForComponent(labels.MustForAPI(labels.MustForOperator("testProd", "testOp", "testVersion"), "testKind", "v0"), "database")
|
|
labels := map[string]string{
|
|
"app.kubernetes.io/component": "backup",
|
|
"app.kubernetes.io/managed-by": "testOp",
|
|
"app.kubernetes.io/name": "backup-serviceaccountjson",
|
|
"app.kubernetes.io/part-of": "testProd",
|
|
"app.kubernetes.io/version": "testVersion",
|
|
"caos.ch/apiversion": "v0",
|
|
"caos.ch/kind": "BucketBackup",
|
|
}
|
|
namespace := "testNs"
|
|
timestamp := "testTs"
|
|
nodeselector := map[string]string{"test": "test"}
|
|
tolerations := []corev1.Toleration{}
|
|
version := "testVersion"
|
|
masterkey := "testMk"
|
|
k8sClient := kubernetesmock.NewMockClientInt(gomock.NewController(t))
|
|
saJson := "testSA"
|
|
backupName := "testBucket"
|
|
|
|
features := []string{backup.Instant}
|
|
bucket.SetInstantBackup(k8sClient, namespace, backupName, labels, saJson)
|
|
k8sClient.EXPECT().WaitUntilStatefulsetIsReady(namespace, SfsName, true, true, 60*time.Second)
|
|
|
|
desired := getTreeWithDBAndBackup(t, masterkey, saJson, backupName)
|
|
|
|
query, _, _, _, _, _, err := Adapter(componentLabels, namespace, timestamp, nodeselector, tolerations, version, features)(monitor, desired, &tree.Tree{})
|
|
assert.NoError(t, err)
|
|
|
|
databases := []string{"test1", "test2"}
|
|
queried := bucket.SetQueriedForDatabases(databases)
|
|
ensure, err := query(k8sClient, queried)
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, ensure)
|
|
|
|
assert.NoError(t, ensure(k8sClient))
|
|
}
|
|
|
|
func TestManaged_AdaptBucketCleanAndRestore(t *testing.T) {
|
|
monitor := mntr.Monitor{}
|
|
componentLabels := labels.MustForComponent(labels.MustForAPI(labels.MustForOperator("testProd", "testOp", "testVersion"), "testKind", "v0"), "database")
|
|
labels := map[string]string{
|
|
"app.kubernetes.io/component": "backup",
|
|
"app.kubernetes.io/managed-by": "testOp",
|
|
"app.kubernetes.io/name": "backup-serviceaccountjson",
|
|
"app.kubernetes.io/part-of": "testProd",
|
|
"app.kubernetes.io/version": "testVersion",
|
|
"caos.ch/apiversion": "v0",
|
|
"caos.ch/kind": "BucketBackup",
|
|
}
|
|
namespace := "testNs"
|
|
timestamp := "testTs"
|
|
nodeselector := map[string]string{"test": "test"}
|
|
tolerations := []corev1.Toleration{}
|
|
version := "testVersion"
|
|
masterkey := "testMk"
|
|
k8sClient := kubernetesmock.NewMockClientInt(gomock.NewController(t))
|
|
saJson := "testSA"
|
|
backupName := "testBucket"
|
|
|
|
features := []string{restore.Instant, clean.Instant}
|
|
bucket.SetRestore(k8sClient, namespace, backupName, labels, saJson)
|
|
bucket.SetClean(k8sClient, namespace, backupName, labels, saJson)
|
|
k8sClient.EXPECT().WaitUntilStatefulsetIsReady(namespace, SfsName, true, true, 60*time.Second).Times(2)
|
|
|
|
desired := getTreeWithDBAndBackup(t, masterkey, saJson, backupName)
|
|
|
|
query, _, _, _, _, _, err := Adapter(componentLabels, namespace, timestamp, nodeselector, tolerations, version, features)(monitor, desired, &tree.Tree{})
|
|
assert.NoError(t, err)
|
|
|
|
databases := []string{"test1", "test2"}
|
|
queried := bucket.SetQueriedForDatabases(databases)
|
|
ensure, err := query(k8sClient, queried)
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, ensure)
|
|
|
|
assert.NoError(t, ensure(k8sClient))
|
|
}
|