mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-15 20:38:00 +00:00
425a8b5fd5
* fix(zitadelctl): implement takedown command * fix(zitadelctl): correct destroy flow * fix(zitadelctl): correct backup commands to read crds beforehand * fix: add of destroyfile * fix: clean for userlist * fix: change backup and restore to crdb native * fix: timeout for delete pvc for cockroachdb * fix: corrected unit tests * fix: add ignored file for scale * fix: correct handling of gitops in backup command * feat: add s3 backup kind * fix: backuplist for s3 and timeout for pv deletion * fix(database): fix nil pointer with binary version * fix(database): cleanup of errors which cam with merging of the s3 logic * fix: correct unit tests * fix: cleanup monitor output Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix: backup imagepullpolixy to ifnotpresent Co-authored-by: Elio Bischof <eliobischof@gmail.com>
150 lines
4.8 KiB
Go
150 lines
4.8 KiB
Go
package s3
|
|
|
|
import (
|
|
kubernetesmock "github.com/caos/orbos/pkg/kubernetes/mock"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/backup"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/restore"
|
|
"github.com/caos/zitadel/operator/database/kinds/databases/core"
|
|
"github.com/golang/mock/gomock"
|
|
corev1 "k8s.io/api/core/v1"
|
|
macherrs "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
)
|
|
|
|
func SetQueriedForDatabases(databases, users []string) map[string]interface{} {
|
|
queried := map[string]interface{}{}
|
|
core.SetQueriedForDatabaseDBList(queried, databases, users)
|
|
|
|
return queried
|
|
}
|
|
|
|
func SetInstantBackup(
|
|
k8sClient *kubernetesmock.MockClientInt,
|
|
namespace string,
|
|
backupName string,
|
|
labelsAKID map[string]string,
|
|
labelsSAK map[string]string,
|
|
labelsST map[string]string,
|
|
akid, sak, st string,
|
|
) {
|
|
k8sClient.EXPECT().ApplySecret(&corev1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: accessKeyIDName,
|
|
Namespace: namespace,
|
|
Labels: labelsAKID,
|
|
},
|
|
StringData: map[string]string{accessKeyIDKey: akid},
|
|
Type: "Opaque",
|
|
}).MinTimes(1).MaxTimes(1).Return(nil)
|
|
|
|
k8sClient.EXPECT().ApplySecret(&corev1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: secretAccessKeyName,
|
|
Namespace: namespace,
|
|
Labels: labelsSAK,
|
|
},
|
|
StringData: map[string]string{secretAccessKeyKey: sak},
|
|
Type: "Opaque",
|
|
}).MinTimes(1).MaxTimes(1).Return(nil)
|
|
|
|
k8sClient.EXPECT().ApplySecret(&corev1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: sessionTokenName,
|
|
Namespace: namespace,
|
|
Labels: labelsST,
|
|
},
|
|
StringData: map[string]string{sessionTokenKey: st},
|
|
Type: "Opaque",
|
|
}).MinTimes(1).MaxTimes(1).Return(nil)
|
|
|
|
k8sClient.EXPECT().ApplyJob(gomock.Any()).Times(1).Return(nil)
|
|
k8sClient.EXPECT().GetJob(namespace, backup.GetJobName(backupName)).Times(1).Return(nil, macherrs.NewNotFound(schema.GroupResource{"batch", "jobs"}, backup.GetJobName(backupName)))
|
|
k8sClient.EXPECT().WaitUntilJobCompleted(namespace, backup.GetJobName(backupName), gomock.Any()).Times(1).Return(nil)
|
|
k8sClient.EXPECT().DeleteJob(namespace, backup.GetJobName(backupName)).Times(1).Return(nil)
|
|
}
|
|
|
|
func SetBackup(
|
|
k8sClient *kubernetesmock.MockClientInt,
|
|
namespace string,
|
|
labelsAKID map[string]string,
|
|
labelsSAK map[string]string,
|
|
labelsST map[string]string,
|
|
akid, sak, st string,
|
|
) {
|
|
k8sClient.EXPECT().ApplySecret(&corev1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: accessKeyIDName,
|
|
Namespace: namespace,
|
|
Labels: labelsAKID,
|
|
},
|
|
StringData: map[string]string{accessKeyIDKey: akid},
|
|
Type: "Opaque",
|
|
}).MinTimes(1).MaxTimes(1).Return(nil)
|
|
|
|
k8sClient.EXPECT().ApplySecret(&corev1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: secretAccessKeyName,
|
|
Namespace: namespace,
|
|
Labels: labelsSAK,
|
|
},
|
|
StringData: map[string]string{secretAccessKeyKey: sak},
|
|
Type: "Opaque",
|
|
}).MinTimes(1).MaxTimes(1).Return(nil)
|
|
|
|
k8sClient.EXPECT().ApplySecret(&corev1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: sessionTokenName,
|
|
Namespace: namespace,
|
|
Labels: labelsST,
|
|
},
|
|
StringData: map[string]string{sessionTokenKey: st},
|
|
Type: "Opaque",
|
|
}).MinTimes(1).MaxTimes(1).Return(nil)
|
|
k8sClient.EXPECT().ApplyCronJob(gomock.Any()).Times(1).Return(nil)
|
|
}
|
|
|
|
func SetRestore(
|
|
k8sClient *kubernetesmock.MockClientInt,
|
|
namespace string,
|
|
backupName string,
|
|
labelsAKID map[string]string,
|
|
labelsSAK map[string]string,
|
|
labelsST map[string]string,
|
|
akid, sak, st string,
|
|
) {
|
|
k8sClient.EXPECT().ApplySecret(&corev1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: accessKeyIDName,
|
|
Namespace: namespace,
|
|
Labels: labelsAKID,
|
|
},
|
|
StringData: map[string]string{accessKeyIDKey: akid},
|
|
Type: "Opaque",
|
|
}).MinTimes(1).MaxTimes(1).Return(nil)
|
|
|
|
k8sClient.EXPECT().ApplySecret(&corev1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: secretAccessKeyName,
|
|
Namespace: namespace,
|
|
Labels: labelsSAK,
|
|
},
|
|
StringData: map[string]string{secretAccessKeyKey: sak},
|
|
Type: "Opaque",
|
|
}).MinTimes(1).MaxTimes(1).Return(nil)
|
|
|
|
k8sClient.EXPECT().ApplySecret(&corev1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: sessionTokenName,
|
|
Namespace: namespace,
|
|
Labels: labelsST,
|
|
},
|
|
StringData: map[string]string{sessionTokenKey: st},
|
|
Type: "Opaque",
|
|
}).MinTimes(1).MaxTimes(1).Return(nil)
|
|
k8sClient.EXPECT().ApplyJob(gomock.Any()).Times(1).Return(nil)
|
|
k8sClient.EXPECT().GetJob(namespace, restore.GetJobName(backupName)).Times(1).Return(nil, macherrs.NewNotFound(schema.GroupResource{"batch", "jobs"}, restore.GetJobName(backupName)))
|
|
k8sClient.EXPECT().WaitUntilJobCompleted(namespace, restore.GetJobName(backupName), gomock.Any()).Times(1).Return(nil)
|
|
k8sClient.EXPECT().DeleteJob(namespace, restore.GetJobName(backupName)).Times(1).Return(nil)
|
|
}
|