mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-15 20:38:00 +00:00
fbe0f311f2
* feat: comprehensive sentry instrumentation * test: pass * fix: only fetch zitadel dsn in zitadel-operator * chore: use dns for sentry environment as soon as parsed * fix: trust ca certs * ci: update orbos * docs: add usage data explanation * fix: dont send validation errors * docs: improve ingestion data explanation * style: rename flag --disable-ingestion to --disable-analytics * fix: pass --disable-analytics flag to self deployments * fix: destroy command for sentry * fix: update orbos * fix: only switch environment if analytics is enabled * fix: ensure SENTRY_DSN is always set * test: test empty sentry dsn * ci: invalidate build caches * chore: use zitadel-dev if no version is passed * chore: combine dev releases in sentry * refactor: only check for semrel if sentry is enabled
294 lines
6.7 KiB
Go
294 lines
6.7 KiB
Go
package bucket
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
|
|
|
"github.com/caos/orbos/mntr"
|
|
"github.com/caos/orbos/pkg/kubernetes"
|
|
"github.com/caos/orbos/pkg/kubernetes/resources/secret"
|
|
"github.com/caos/orbos/pkg/labels"
|
|
secretpkg "github.com/caos/orbos/pkg/secret"
|
|
"github.com/caos/orbos/pkg/secret/read"
|
|
"github.com/caos/orbos/pkg/tree"
|
|
coreDB "github.com/caos/zitadel/operator/database/kinds/databases/core"
|
|
|
|
"github.com/caos/zitadel/operator"
|
|
"github.com/caos/zitadel/operator/common"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/backup"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/clean"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/restore"
|
|
)
|
|
|
|
const (
|
|
secretName = "backup-serviceaccountjson"
|
|
secretKey = "serviceaccountjson"
|
|
)
|
|
|
|
func AdaptFunc(
|
|
name string,
|
|
namespace string,
|
|
componentLabels *labels.Component,
|
|
checkDBReady operator.EnsureFunc,
|
|
timestamp string,
|
|
nodeselector map[string]string,
|
|
tolerations []corev1.Toleration,
|
|
version string,
|
|
features []string,
|
|
customImageRegistry string,
|
|
) operator.AdaptFunc {
|
|
return func(
|
|
monitor mntr.Monitor,
|
|
desired *tree.Tree,
|
|
current *tree.Tree,
|
|
) (
|
|
operator.QueryFunc,
|
|
operator.DestroyFunc,
|
|
operator.ConfigureFunc,
|
|
map[string]*secretpkg.Secret,
|
|
map[string]*secretpkg.Existing,
|
|
bool,
|
|
error,
|
|
) {
|
|
|
|
internalMonitor := monitor.WithField("component", "backup")
|
|
|
|
desiredKind, err := ParseDesiredV0(desired)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, fmt.Errorf("parsing desired state failed: %w", err)
|
|
}
|
|
desired.Parsed = desiredKind
|
|
|
|
secrets, existing := getSecretsMap(desiredKind)
|
|
|
|
if !monitor.IsVerbose() && desiredKind.Spec.Verbose {
|
|
internalMonitor.Verbose()
|
|
}
|
|
|
|
destroyS, err := secret.AdaptFuncToDestroy(namespace, secretName)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, err
|
|
}
|
|
|
|
image := common.BackupImage.Reference(customImageRegistry, version)
|
|
|
|
_, destroyB, err := backup.AdaptFunc(
|
|
internalMonitor,
|
|
name,
|
|
namespace,
|
|
componentLabels,
|
|
[]string{},
|
|
checkDBReady,
|
|
desiredKind.Spec.Bucket,
|
|
desiredKind.Spec.Cron,
|
|
secretName,
|
|
secretKey,
|
|
timestamp,
|
|
nodeselector,
|
|
tolerations,
|
|
features,
|
|
image,
|
|
)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, err
|
|
}
|
|
|
|
_, destroyR, err := restore.AdaptFunc(
|
|
monitor,
|
|
name,
|
|
namespace,
|
|
componentLabels,
|
|
[]string{},
|
|
desiredKind.Spec.Bucket,
|
|
timestamp,
|
|
nodeselector,
|
|
tolerations,
|
|
checkDBReady,
|
|
secretName,
|
|
secretKey,
|
|
image,
|
|
)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, err
|
|
}
|
|
|
|
_, destroyC, err := clean.AdaptFunc(
|
|
monitor,
|
|
name,
|
|
namespace,
|
|
componentLabels,
|
|
[]string{},
|
|
[]string{},
|
|
nodeselector,
|
|
tolerations,
|
|
checkDBReady,
|
|
secretName,
|
|
secretKey,
|
|
image,
|
|
)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, err
|
|
}
|
|
|
|
destroyers := make([]operator.DestroyFunc, 0)
|
|
for _, feature := range features {
|
|
switch feature {
|
|
case backup.Normal, backup.Instant:
|
|
destroyers = append(destroyers,
|
|
operator.ResourceDestroyToZitadelDestroy(destroyS),
|
|
destroyB,
|
|
)
|
|
case clean.Instant:
|
|
destroyers = append(destroyers,
|
|
destroyC,
|
|
)
|
|
case restore.Instant:
|
|
destroyers = append(destroyers,
|
|
destroyR,
|
|
)
|
|
}
|
|
}
|
|
|
|
return func(k8sClient kubernetes.ClientInt, queried map[string]interface{}) (operator.EnsureFunc, error) {
|
|
|
|
if err := desiredKind.validateSecrets(); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
currentDB, err := coreDB.ParseQueriedForDatabase(queried)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
databases, err := currentDB.GetListDatabasesFunc()(k8sClient)
|
|
if err != nil {
|
|
databases = []string{}
|
|
}
|
|
|
|
users, err := currentDB.GetListUsersFunc()(k8sClient)
|
|
if err != nil {
|
|
users = []string{}
|
|
}
|
|
|
|
value, err := read.GetSecretValue(k8sClient, desiredKind.Spec.ServiceAccountJSON, desiredKind.Spec.ExistingServiceAccountJSON)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
queryS, err := secret.AdaptFuncToEnsure(namespace, labels.MustForName(componentLabels, secretName), map[string]string{secretKey: value})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
queryB, _, err := backup.AdaptFunc(
|
|
internalMonitor,
|
|
name,
|
|
namespace,
|
|
componentLabels,
|
|
databases,
|
|
checkDBReady,
|
|
desiredKind.Spec.Bucket,
|
|
desiredKind.Spec.Cron,
|
|
secretName,
|
|
secretKey,
|
|
timestamp,
|
|
nodeselector,
|
|
tolerations,
|
|
features,
|
|
image,
|
|
)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
queryR, _, err := restore.AdaptFunc(
|
|
monitor,
|
|
name,
|
|
namespace,
|
|
componentLabels,
|
|
databases,
|
|
desiredKind.Spec.Bucket,
|
|
timestamp,
|
|
nodeselector,
|
|
tolerations,
|
|
checkDBReady,
|
|
secretName,
|
|
secretKey,
|
|
image,
|
|
)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
queryC, _, err := clean.AdaptFunc(
|
|
monitor,
|
|
name,
|
|
namespace,
|
|
componentLabels,
|
|
databases,
|
|
users,
|
|
nodeselector,
|
|
tolerations,
|
|
checkDBReady,
|
|
secretName,
|
|
secretKey,
|
|
image,
|
|
)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
queriers := make([]operator.QueryFunc, 0)
|
|
cleanupQueries := make([]operator.QueryFunc, 0)
|
|
if databases != nil && len(databases) != 0 {
|
|
for _, feature := range features {
|
|
switch feature {
|
|
case backup.Normal:
|
|
queriers = append(queriers,
|
|
operator.ResourceQueryToZitadelQuery(queryS),
|
|
queryB,
|
|
)
|
|
case backup.Instant:
|
|
queriers = append(queriers,
|
|
operator.ResourceQueryToZitadelQuery(queryS),
|
|
queryB,
|
|
)
|
|
cleanupQueries = append(cleanupQueries,
|
|
operator.EnsureFuncToQueryFunc(backup.GetCleanupFunc(monitor, namespace, name)),
|
|
)
|
|
case clean.Instant:
|
|
queriers = append(queriers,
|
|
operator.ResourceQueryToZitadelQuery(queryS),
|
|
queryC,
|
|
)
|
|
cleanupQueries = append(cleanupQueries,
|
|
operator.EnsureFuncToQueryFunc(clean.GetCleanupFunc(monitor, namespace, name)),
|
|
)
|
|
case restore.Instant:
|
|
queriers = append(queriers,
|
|
operator.ResourceQueryToZitadelQuery(queryS),
|
|
queryR,
|
|
)
|
|
cleanupQueries = append(cleanupQueries,
|
|
operator.EnsureFuncToQueryFunc(restore.GetCleanupFunc(monitor, namespace, name)),
|
|
)
|
|
}
|
|
}
|
|
}
|
|
|
|
for _, cleanup := range cleanupQueries {
|
|
queriers = append(queriers, cleanup)
|
|
}
|
|
|
|
return operator.QueriersToEnsureFunc(internalMonitor, false, queriers, k8sClient, queried)
|
|
},
|
|
operator.DestroyersToDestroyFunc(internalMonitor, destroyers),
|
|
func(kubernetes.ClientInt, map[string]interface{}, bool) error { return nil },
|
|
secrets,
|
|
existing,
|
|
false,
|
|
nil
|
|
}
|
|
}
|