mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-13 19:44:21 +00:00
425a8b5fd5
* fix(zitadelctl): implement takedown command * fix(zitadelctl): correct destroy flow * fix(zitadelctl): correct backup commands to read crds beforehand * fix: add of destroyfile * fix: clean for userlist * fix: change backup and restore to crdb native * fix: timeout for delete pvc for cockroachdb * fix: corrected unit tests * fix: add ignored file for scale * fix: correct handling of gitops in backup command * feat: add s3 backup kind * fix: backuplist for s3 and timeout for pv deletion * fix(database): fix nil pointer with binary version * fix(database): cleanup of errors which cam with merging of the s3 logic * fix: correct unit tests * fix: cleanup monitor output Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix: backup imagepullpolixy to ifnotpresent Co-authored-by: Elio Bischof <eliobischof@gmail.com>
55 lines
1.4 KiB
Go
55 lines
1.4 KiB
Go
package s3
|
|
|
|
import (
|
|
"github.com/caos/orbos/pkg/secret"
|
|
)
|
|
|
|
func getSecretsMap(desiredKind *DesiredV0) (map[string]*secret.Secret, map[string]*secret.Existing) {
|
|
|
|
var (
|
|
secrets = make(map[string]*secret.Secret, 0)
|
|
existing = make(map[string]*secret.Existing, 0)
|
|
)
|
|
if desiredKind.Spec == nil {
|
|
desiredKind.Spec = &Spec{}
|
|
}
|
|
|
|
if desiredKind.Spec.AccessKeyID == nil {
|
|
desiredKind.Spec.AccessKeyID = &secret.Secret{}
|
|
}
|
|
|
|
if desiredKind.Spec.ExistingAccessKeyID == nil {
|
|
desiredKind.Spec.ExistingAccessKeyID = &secret.Existing{}
|
|
}
|
|
|
|
akikey := "accesskeyid"
|
|
secrets[akikey] = desiredKind.Spec.AccessKeyID
|
|
existing[akikey] = desiredKind.Spec.ExistingAccessKeyID
|
|
|
|
if desiredKind.Spec.SecretAccessKey == nil {
|
|
desiredKind.Spec.SecretAccessKey = &secret.Secret{}
|
|
}
|
|
|
|
if desiredKind.Spec.ExistingSecretAccessKey == nil {
|
|
desiredKind.Spec.ExistingSecretAccessKey = &secret.Existing{}
|
|
}
|
|
|
|
sakkey := "secretaccesskey"
|
|
secrets[sakkey] = desiredKind.Spec.SecretAccessKey
|
|
existing[sakkey] = desiredKind.Spec.ExistingSecretAccessKey
|
|
|
|
if desiredKind.Spec.SessionToken == nil {
|
|
desiredKind.Spec.SessionToken = &secret.Secret{}
|
|
}
|
|
|
|
if desiredKind.Spec.ExistingSessionToken == nil {
|
|
desiredKind.Spec.ExistingSessionToken = &secret.Existing{}
|
|
}
|
|
|
|
stkey := "sessiontoken"
|
|
secrets[stkey] = desiredKind.Spec.SessionToken
|
|
existing[stkey] = desiredKind.Spec.ExistingSessionToken
|
|
|
|
return secrets, existing
|
|
}
|