mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-16 12:58:00 +00:00
fbe0f311f2
* feat: comprehensive sentry instrumentation * test: pass * fix: only fetch zitadel dsn in zitadel-operator * chore: use dns for sentry environment as soon as parsed * fix: trust ca certs * ci: update orbos * docs: add usage data explanation * fix: dont send validation errors * docs: improve ingestion data explanation * style: rename flag --disable-ingestion to --disable-analytics * fix: pass --disable-analytics flag to self deployments * fix: destroy command for sentry * fix: update orbos * fix: only switch environment if analytics is enabled * fix: ensure SENTRY_DSN is always set * test: test empty sentry dsn * ci: invalidate build caches * chore: use zitadel-dev if no version is passed * chore: combine dev releases in sentry * refactor: only check for semrel if sentry is enabled
269 lines
7.6 KiB
Go
269 lines
7.6 KiB
Go
package managed
|
|
|
|
import (
|
|
"fmt"
|
|
"strconv"
|
|
"strings"
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
|
"k8s.io/apimachinery/pkg/api/resource"
|
|
|
|
"github.com/caos/orbos/mntr"
|
|
"github.com/caos/orbos/pkg/kubernetes"
|
|
"github.com/caos/orbos/pkg/kubernetes/resources/pdb"
|
|
"github.com/caos/orbos/pkg/labels"
|
|
"github.com/caos/orbos/pkg/secret"
|
|
"github.com/caos/orbos/pkg/tree"
|
|
|
|
"github.com/caos/zitadel/operator"
|
|
"github.com/caos/zitadel/operator/common"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups"
|
|
"github.com/caos/zitadel/operator/database/kinds/databases/core"
|
|
"github.com/caos/zitadel/operator/database/kinds/databases/managed/certificate"
|
|
"github.com/caos/zitadel/operator/database/kinds/databases/managed/rbac"
|
|
"github.com/caos/zitadel/operator/database/kinds/databases/managed/services"
|
|
"github.com/caos/zitadel/operator/database/kinds/databases/managed/statefulset"
|
|
)
|
|
|
|
const (
|
|
SfsName = "cockroachdb"
|
|
pdbName = SfsName + "-budget"
|
|
serviceAccountName = SfsName
|
|
PublicServiceName = SfsName + "-public"
|
|
privateServiceName = SfsName
|
|
cockroachPort = int32(26257)
|
|
cockroachHTTPPort = int32(8080)
|
|
)
|
|
|
|
func Adapter(
|
|
componentLabels *labels.Component,
|
|
namespace string,
|
|
timestamp string,
|
|
nodeselector map[string]string,
|
|
tolerations []corev1.Toleration,
|
|
version string,
|
|
features []string,
|
|
customImageRegistry string,
|
|
) operator.AdaptFunc {
|
|
|
|
return func(
|
|
monitor mntr.Monitor,
|
|
desired *tree.Tree,
|
|
current *tree.Tree,
|
|
) (
|
|
_ operator.QueryFunc,
|
|
_ operator.DestroyFunc,
|
|
_ operator.ConfigureFunc,
|
|
_ map[string]*secret.Secret,
|
|
_ map[string]*secret.Existing,
|
|
migrate bool,
|
|
err error,
|
|
) {
|
|
|
|
defer func() {
|
|
if err != nil {
|
|
err = fmt.Errorf("adapting managed database failed: %w", err)
|
|
}
|
|
}()
|
|
|
|
var (
|
|
internalMonitor = monitor.WithField("kind", "cockroachdb")
|
|
allSecrets = make(map[string]*secret.Secret)
|
|
allExisting = make(map[string]*secret.Existing)
|
|
)
|
|
|
|
desiredKind, err := parseDesiredV0(desired)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, fmt.Errorf("parsing desired state failed: %w", err)
|
|
}
|
|
desired.Parsed = desiredKind
|
|
|
|
storageCapacity, err := resource.ParseQuantity(desiredKind.Spec.StorageCapacity)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, mntr.ToUserError(fmt.Errorf("parsing storage capacity format failed: %w", err))
|
|
}
|
|
|
|
if !monitor.IsVerbose() && desiredKind.Spec.Verbose {
|
|
internalMonitor.Verbose()
|
|
}
|
|
|
|
var (
|
|
isFeatureDatabase bool
|
|
isFeatureRestore bool
|
|
)
|
|
for _, feature := range features {
|
|
switch feature {
|
|
case "database":
|
|
isFeatureDatabase = true
|
|
case "restore":
|
|
isFeatureRestore = true
|
|
}
|
|
}
|
|
|
|
queryCert, destroyCert, addUser, deleteUser, listUsers, err := certificate.AdaptFunc(internalMonitor, namespace, componentLabels, desiredKind.Spec.ClusterDns, isFeatureDatabase)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, err
|
|
}
|
|
addRoot, err := addUser("root")
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, err
|
|
}
|
|
destroyRoot, err := deleteUser("root")
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, err
|
|
}
|
|
|
|
queryRBAC, destroyRBAC, err := rbac.AdaptFunc(internalMonitor, namespace, labels.MustForName(componentLabels, serviceAccountName))
|
|
|
|
cockroachNameLabels := labels.MustForName(componentLabels, SfsName)
|
|
cockroachSelector := labels.DeriveNameSelector(cockroachNameLabels, false)
|
|
cockroachSelectabel := labels.AsSelectable(cockroachNameLabels)
|
|
querySFS, destroySFS, ensureInit, checkDBReady, listDatabases, err := statefulset.AdaptFunc(
|
|
internalMonitor,
|
|
cockroachSelectabel,
|
|
cockroachSelector,
|
|
desiredKind.Spec.Force,
|
|
namespace,
|
|
common.CockroachImage.Reference(customImageRegistry),
|
|
serviceAccountName,
|
|
desiredKind.Spec.ReplicaCount,
|
|
storageCapacity,
|
|
cockroachPort,
|
|
cockroachHTTPPort,
|
|
desiredKind.Spec.StorageClass,
|
|
desiredKind.Spec.NodeSelector,
|
|
desiredKind.Spec.Tolerations,
|
|
desiredKind.Spec.Resources,
|
|
)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, err
|
|
}
|
|
|
|
queryS, destroyS, err := services.AdaptFunc(
|
|
internalMonitor,
|
|
namespace,
|
|
labels.MustForName(componentLabels, PublicServiceName),
|
|
labels.MustForName(componentLabels, privateServiceName),
|
|
cockroachSelector,
|
|
cockroachPort,
|
|
cockroachHTTPPort,
|
|
)
|
|
|
|
queryPDB, err := pdb.AdaptFuncToEnsure(namespace, labels.MustForName(componentLabels, pdbName), cockroachSelector, "1")
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, err
|
|
}
|
|
|
|
currentDB := &Current{
|
|
Common: tree.NewCommon("databases.caos.ch/CockroachDB", "v0", false),
|
|
Current: &CurrentDB{
|
|
CA: &certificate.Current{},
|
|
},
|
|
}
|
|
current.Parsed = currentDB
|
|
|
|
var (
|
|
queriers = make([]operator.QueryFunc, 0)
|
|
destroyers = make([]operator.DestroyFunc, 0)
|
|
configurers = make([]operator.ConfigureFunc, 0)
|
|
)
|
|
if isFeatureDatabase {
|
|
queriers = append(queriers,
|
|
queryRBAC,
|
|
queryCert,
|
|
addRoot,
|
|
operator.ResourceQueryToZitadelQuery(querySFS),
|
|
operator.ResourceQueryToZitadelQuery(queryPDB),
|
|
queryS,
|
|
operator.EnsureFuncToQueryFunc(ensureInit),
|
|
)
|
|
}
|
|
|
|
if isFeatureDatabase {
|
|
destroyers = append(destroyers,
|
|
destroyS,
|
|
operator.ResourceDestroyToZitadelDestroy(destroySFS),
|
|
destroyRBAC,
|
|
destroyCert,
|
|
destroyRoot,
|
|
)
|
|
}
|
|
|
|
if desiredKind.Spec.Backups != nil {
|
|
|
|
oneBackup := false
|
|
for backupName := range desiredKind.Spec.Backups {
|
|
if timestamp != "" && strings.HasPrefix(timestamp, backupName) {
|
|
oneBackup = true
|
|
}
|
|
}
|
|
|
|
for backupName, desiredBackup := range desiredKind.Spec.Backups {
|
|
currentBackup := &tree.Tree{}
|
|
if timestamp == "" || !oneBackup || (timestamp != "" && strings.HasPrefix(timestamp, backupName)) {
|
|
queryB, destroyB, configureB, secrets, existing, migrateB, err := backups.Adapt(
|
|
internalMonitor,
|
|
desiredBackup,
|
|
currentBackup,
|
|
backupName,
|
|
namespace,
|
|
componentLabels,
|
|
checkDBReady,
|
|
strings.TrimPrefix(timestamp, backupName+"."),
|
|
nodeselector,
|
|
tolerations,
|
|
version,
|
|
features,
|
|
customImageRegistry,
|
|
)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, false, err
|
|
}
|
|
|
|
migrate = migrate || migrateB
|
|
|
|
secret.AppendSecrets(backupName, allSecrets, secrets, allExisting, existing)
|
|
destroyers = append(destroyers, destroyB)
|
|
queriers = append(queriers, queryB)
|
|
configurers = append(configurers, configureB)
|
|
}
|
|
}
|
|
}
|
|
|
|
return func(k8sClient kubernetes.ClientInt, queried map[string]interface{}) (operator.EnsureFunc, error) {
|
|
if !isFeatureRestore {
|
|
queriedCurrentDB, err := core.ParseQueriedForDatabase(queried)
|
|
if err != nil || queriedCurrentDB == nil {
|
|
// TODO: query system state
|
|
currentDB.Current.Port = strconv.Itoa(int(cockroachPort))
|
|
currentDB.Current.URL = PublicServiceName
|
|
currentDB.Current.ReadyFunc = checkDBReady
|
|
currentDB.Current.AddUserFunc = addUser
|
|
currentDB.Current.DeleteUserFunc = deleteUser
|
|
currentDB.Current.ListUsersFunc = listUsers
|
|
currentDB.Current.ListDatabasesFunc = listDatabases
|
|
|
|
core.SetQueriedForDatabase(queried, current)
|
|
internalMonitor.Info("set current state of managed database")
|
|
}
|
|
}
|
|
|
|
ensure, err := operator.QueriersToEnsureFunc(internalMonitor, true, queriers, k8sClient, queried)
|
|
return ensure, err
|
|
},
|
|
operator.DestroyersToDestroyFunc(internalMonitor, destroyers),
|
|
func(k8sClient kubernetes.ClientInt, queried map[string]interface{}, gitops bool) error {
|
|
for i := range configurers {
|
|
if err := configurers[i](k8sClient, queried, gitops); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
},
|
|
allSecrets,
|
|
allExisting,
|
|
migrate,
|
|
nil
|
|
}
|
|
}
|