zitadel/cmd/zitadelctl/cmds/takeoff.go
Elio Bischof fe4f6a963e
feat(operator): enable specifying custom acme authority for subdomains (#1634)
* feat: enable specifying custom acme authority for subdomains

* test: none authority

* chore: use latest ORBOS

* chore: use latest ORBOS

* test: host tls secret is unmanaged if not provided

* chore: use latest ORBOS

* chore: use latest ORBOS

* fix: default acme authority to "none"

* chore: use latest ORBOS

* chore: compile with latest ORBOS
2021-04-28 11:00:56 +02:00

168 lines
3.5 KiB
Go

package cmds
import (
"github.com/caos/orbos/pkg/kubernetes/cli"
"gopkg.in/yaml.v3"
orbdb "github.com/caos/zitadel/operator/database/kinds/orb"
"github.com/caos/orbos/mntr"
"github.com/caos/orbos/pkg/git"
"github.com/caos/orbos/pkg/kubernetes"
orbzit "github.com/caos/zitadel/operator/zitadel/kinds/orb"
"github.com/spf13/cobra"
_ "k8s.io/client-go/plugin/pkg/client/auth/gcp"
)
func TakeoffCommand(getRv GetRootValues) *cobra.Command {
var (
cmd = &cobra.Command{
Use: "takeoff",
Short: "Launch a ZITADEL operator and database operator on the orb",
Long: "Ensures a desired state of the resources on the orb",
}
)
cmd.RunE = func(cmd *cobra.Command, args []string) error {
rv, err := getRv()
if err != nil {
return err
}
defer func() {
err = rv.ErrFunc(err)
}()
monitor := rv.Monitor
orbConfig := rv.OrbConfig
gitClient := rv.GitClient
k8sClient, err := cli.Client(
monitor,
orbConfig,
gitClient,
rv.Kubeconfig,
rv.Gitops,
true,
)
if err != nil {
return err
}
if err := kubernetes.EnsureCaosSystemNamespace(monitor, k8sClient); err != nil {
monitor.Info("failed to apply common resources into k8s-cluster")
return err
}
if rv.Gitops {
orbConfigBytes, err := yaml.Marshal(orbConfig)
if err != nil {
return err
}
if err := kubernetes.EnsureOrbconfigSecret(monitor, k8sClient, orbConfigBytes); err != nil {
monitor.Info("failed to apply configuration resources into k8s-cluster")
return err
}
}
if err := deployOperator(
monitor,
gitClient,
k8sClient,
rv.Version,
rv.Gitops,
); err != nil {
monitor.Error(err)
}
if err := deployDatabase(
monitor,
gitClient,
k8sClient,
rv.Version,
rv.Gitops,
); err != nil {
monitor.Error(err)
}
return nil
}
return cmd
}
func deployOperator(monitor mntr.Monitor, gitClient *git.Client, k8sClient kubernetes.ClientInt, version string, gitops bool) error {
if gitops {
if gitClient.Exists(git.ZitadelFile) {
desiredTree, err := gitClient.ReadTree(git.ZitadelFile)
if err != nil {
return err
}
desired, err := orbzit.ParseDesiredV0(desiredTree)
if err != nil {
return err
}
spec := desired.Spec
// at takeoff the artifacts have to be applied
spec.SelfReconciling = true
if err := orbzit.Reconcile(monitor, spec, gitops)(k8sClient); err != nil {
return err
}
}
} else {
// at takeoff the artifacts have to be applied
spec := &orbzit.Spec{
Version: version,
SelfReconciling: true,
}
if err := orbzit.Reconcile(monitor, spec, gitops)(k8sClient); err != nil {
return err
}
}
return nil
}
func deployDatabase(monitor mntr.Monitor, gitClient *git.Client, k8sClient kubernetes.ClientInt, version string, gitops bool) error {
if gitops {
if gitClient.Exists(git.DatabaseFile) {
desiredTree, err := gitClient.ReadTree(git.DatabaseFile)
if err != nil {
return err
}
desired, err := orbdb.ParseDesiredV0(desiredTree)
if err != nil {
return err
}
spec := desired.Spec
// at takeoff the artifacts have to be applied
spec.SelfReconciling = true
if err := orbdb.Reconcile(
monitor,
spec,
gitops,
)(k8sClient); err != nil {
return err
}
}
} else {
// at takeoff the artifacts have to be applied
spec := &orbdb.Spec{
Version: version,
SelfReconciling: true,
}
if err := orbdb.Reconcile(
monitor,
spec,
gitops,
)(k8sClient); err != nil {
return err
}
}
return nil
}