mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-21 23:37:31 +00:00
425a8b5fd5
* fix(zitadelctl): implement takedown command * fix(zitadelctl): correct destroy flow * fix(zitadelctl): correct backup commands to read crds beforehand * fix: add of destroyfile * fix: clean for userlist * fix: change backup and restore to crdb native * fix: timeout for delete pvc for cockroachdb * fix: corrected unit tests * fix: add ignored file for scale * fix: correct handling of gitops in backup command * feat: add s3 backup kind * fix: backuplist for s3 and timeout for pv deletion * fix(database): fix nil pointer with binary version * fix(database): cleanup of errors which cam with merging of the s3 logic * fix: correct unit tests * fix: cleanup monitor output Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix: backup imagepullpolixy to ifnotpresent Co-authored-by: Elio Bischof <eliobischof@gmail.com>
153 lines
4.1 KiB
Go
153 lines
4.1 KiB
Go
package orb
|
|
|
|
import (
|
|
"fmt"
|
|
"github.com/caos/zitadel/operator/database/kinds/databases/managed"
|
|
|
|
"github.com/caos/orbos/mntr"
|
|
"github.com/caos/orbos/pkg/kubernetes"
|
|
"github.com/caos/orbos/pkg/kubernetes/resources/namespace"
|
|
"github.com/caos/orbos/pkg/labels"
|
|
"github.com/caos/orbos/pkg/secret"
|
|
"github.com/caos/orbos/pkg/tree"
|
|
"github.com/caos/orbos/pkg/treelabels"
|
|
|
|
"github.com/caos/zitadel/operator"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/backup"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/restore"
|
|
"github.com/caos/zitadel/operator/database/kinds/databases"
|
|
)
|
|
|
|
const (
|
|
NamespaceStr = "caos-zitadel"
|
|
)
|
|
|
|
func OperatorSelector() *labels.Selector {
|
|
return labels.OpenOperatorSelector("ZITADEL", "database.caos.ch")
|
|
}
|
|
|
|
func AdaptFunc(
|
|
timestamp string,
|
|
binaryVersion *string,
|
|
gitops bool,
|
|
features ...string,
|
|
) operator.AdaptFunc {
|
|
|
|
return func(
|
|
monitor mntr.Monitor,
|
|
orbDesiredTree *tree.Tree,
|
|
currentTree *tree.Tree,
|
|
) (
|
|
queryFunc operator.QueryFunc,
|
|
destroyFunc operator.DestroyFunc,
|
|
configureFunc operator.ConfigureFunc,
|
|
secrets map[string]*secret.Secret,
|
|
existing map[string]*secret.Existing,
|
|
migrate bool,
|
|
err error,
|
|
) {
|
|
defer func() {
|
|
if err != nil {
|
|
err = fmt.Errorf("building %s failed: %w", orbDesiredTree.Common.Kind, err)
|
|
}
|
|
}()
|
|
|
|
orbMonitor := monitor.WithField("kind", "orb")
|
|
|
|
desiredKind, err := ParseDesiredV0(orbDesiredTree)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, migrate, fmt.Errorf("parsing desired state failed: %w", err)
|
|
}
|
|
orbDesiredTree.Parsed = desiredKind
|
|
currentTree = &tree.Tree{}
|
|
|
|
if desiredKind.Spec.Verbose && !orbMonitor.IsVerbose() {
|
|
orbMonitor = orbMonitor.Verbose()
|
|
}
|
|
|
|
queryNS, err := namespace.AdaptFuncToEnsure(NamespaceStr)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, migrate, err
|
|
}
|
|
/*destroyNS, err := namespace.AdaptFuncToDestroy(NamespaceStr)
|
|
if err != nil {
|
|
return nil, nil, nil, err
|
|
}*/
|
|
|
|
databaseCurrent := &tree.Tree{}
|
|
|
|
operatorLabels := mustDatabaseOperator(binaryVersion)
|
|
version := ""
|
|
if binaryVersion != nil {
|
|
version = *binaryVersion
|
|
}
|
|
|
|
queryDB, destroyDB, configureDB, secrets, existing, migrate, err := databases.Adapt(
|
|
orbMonitor,
|
|
desiredKind.Database,
|
|
databaseCurrent,
|
|
NamespaceStr,
|
|
treelabels.MustForAPI(desiredKind.Database, operatorLabels),
|
|
timestamp,
|
|
desiredKind.Spec.NodeSelector,
|
|
desiredKind.Spec.Tolerations,
|
|
version,
|
|
features,
|
|
desiredKind.Spec.CustomImageRegistry,
|
|
)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, migrate, err
|
|
}
|
|
|
|
rec, _ := Reconcile(monitor, desiredKind.Spec, gitops)
|
|
|
|
destroyers := make([]operator.DestroyFunc, 0)
|
|
queriers := make([]operator.QueryFunc, 0)
|
|
dbOrBackup := false
|
|
for _, feature := range features {
|
|
switch feature {
|
|
case "database", backup.Instant, backup.Normal, restore.Instant, managed.Clean:
|
|
if !dbOrBackup {
|
|
dbOrBackup = true
|
|
queriers = append(queriers,
|
|
operator.ResourceQueryToZitadelQuery(queryNS),
|
|
queryDB,
|
|
)
|
|
destroyers = append(destroyers,
|
|
destroyDB,
|
|
)
|
|
}
|
|
case "operator":
|
|
queriers = append(queriers,
|
|
operator.ResourceQueryToZitadelQuery(queryNS),
|
|
operator.EnsureFuncToQueryFunc(rec),
|
|
)
|
|
}
|
|
}
|
|
|
|
currentTree.Parsed = &DesiredV0{
|
|
Common: tree.NewCommon("databases.caos.ch/Orb", "v0", false),
|
|
Database: databaseCurrent,
|
|
}
|
|
|
|
return func(k8sClient kubernetes.ClientInt, queried map[string]interface{}) (operator.EnsureFunc, error) {
|
|
if queried == nil {
|
|
queried = map[string]interface{}{}
|
|
}
|
|
monitor.WithField("queriers", len(queriers)).Info("Querying")
|
|
return operator.QueriersToEnsureFunc(monitor, true, queriers, k8sClient, queried)
|
|
},
|
|
func(k8sClient kubernetes.ClientInt) error {
|
|
monitor.WithField("destroyers", len(queriers)).Info("Destroy")
|
|
return operator.DestroyersToDestroyFunc(monitor, destroyers)(k8sClient)
|
|
},
|
|
func(k8sClient kubernetes.ClientInt, queried map[string]interface{}, gitops bool) error {
|
|
return configureDB(k8sClient, queried, gitops)
|
|
},
|
|
secrets,
|
|
existing,
|
|
migrate,
|
|
nil
|
|
}
|
|
}
|