mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-14 03:54:21 +00:00
fbe0f311f2
* feat: comprehensive sentry instrumentation * test: pass * fix: only fetch zitadel dsn in zitadel-operator * chore: use dns for sentry environment as soon as parsed * fix: trust ca certs * ci: update orbos * docs: add usage data explanation * fix: dont send validation errors * docs: improve ingestion data explanation * style: rename flag --disable-ingestion to --disable-analytics * fix: pass --disable-analytics flag to self deployments * fix: destroy command for sentry * fix: update orbos * fix: only switch environment if analytics is enabled * fix: ensure SENTRY_DSN is always set * test: test empty sentry dsn * ci: invalidate build caches * chore: use zitadel-dev if no version is passed * chore: combine dev releases in sentry * refactor: only check for semrel if sentry is enabled
149 lines
4.0 KiB
Go
149 lines
4.0 KiB
Go
package orb
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/caos/orbos/mntr"
|
|
"github.com/caos/orbos/pkg/kubernetes"
|
|
"github.com/caos/orbos/pkg/kubernetes/resources/namespace"
|
|
"github.com/caos/orbos/pkg/labels"
|
|
"github.com/caos/orbos/pkg/secret"
|
|
"github.com/caos/orbos/pkg/tree"
|
|
"github.com/caos/orbos/pkg/treelabels"
|
|
|
|
"github.com/caos/zitadel/operator"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/backup"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/clean"
|
|
"github.com/caos/zitadel/operator/database/kinds/backups/bucket/restore"
|
|
"github.com/caos/zitadel/operator/database/kinds/databases"
|
|
)
|
|
|
|
const (
|
|
NamespaceStr = "caos-zitadel"
|
|
)
|
|
|
|
func OperatorSelector() *labels.Selector {
|
|
return labels.OpenOperatorSelector("ZITADEL", "database.caos.ch")
|
|
}
|
|
|
|
func AdaptFunc(
|
|
timestamp string,
|
|
binaryVersion *string,
|
|
gitops bool,
|
|
features ...string,
|
|
) operator.AdaptFunc {
|
|
|
|
return func(
|
|
monitor mntr.Monitor,
|
|
orbDesiredTree *tree.Tree,
|
|
currentTree *tree.Tree,
|
|
) (
|
|
queryFunc operator.QueryFunc,
|
|
destroyFunc operator.DestroyFunc,
|
|
configureFunc operator.ConfigureFunc,
|
|
secrets map[string]*secret.Secret,
|
|
existing map[string]*secret.Existing,
|
|
migrate bool,
|
|
err error,
|
|
) {
|
|
defer func() {
|
|
if err != nil {
|
|
err = fmt.Errorf("building %s failed: %w", orbDesiredTree.Common.Kind, err)
|
|
}
|
|
}()
|
|
|
|
orbMonitor := monitor.WithField("kind", "orb")
|
|
|
|
desiredKind, err := ParseDesiredV0(orbDesiredTree)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, migrate, fmt.Errorf("parsing desired state failed: %w", err)
|
|
}
|
|
orbDesiredTree.Parsed = desiredKind
|
|
currentTree = &tree.Tree{}
|
|
|
|
if desiredKind.Spec.Verbose && !orbMonitor.IsVerbose() {
|
|
orbMonitor = orbMonitor.Verbose()
|
|
}
|
|
|
|
queryNS, err := namespace.AdaptFuncToEnsure(NamespaceStr)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, migrate, err
|
|
}
|
|
/*destroyNS, err := namespace.AdaptFuncToDestroy(NamespaceStr)
|
|
if err != nil {
|
|
return nil, nil, nil, err
|
|
}*/
|
|
|
|
databaseCurrent := &tree.Tree{}
|
|
|
|
operatorLabels := mustDatabaseOperator(binaryVersion)
|
|
|
|
queryDB, destroyDB, configureDB, secrets, existing, migrate, err := databases.Adapt(
|
|
orbMonitor,
|
|
desiredKind.Database,
|
|
databaseCurrent,
|
|
NamespaceStr,
|
|
treelabels.MustForAPI(desiredKind.Database, operatorLabels),
|
|
timestamp,
|
|
desiredKind.Spec.NodeSelector,
|
|
desiredKind.Spec.Tolerations,
|
|
desiredKind.Spec.Version,
|
|
features,
|
|
desiredKind.Spec.CustomImageRegistry,
|
|
)
|
|
if err != nil {
|
|
return nil, nil, nil, nil, nil, migrate, err
|
|
}
|
|
|
|
rec, _ := Reconcile(monitor, desiredKind.Spec, gitops)
|
|
|
|
destroyers := make([]operator.DestroyFunc, 0)
|
|
queriers := make([]operator.QueryFunc, 0)
|
|
dbOrBackup := false
|
|
for _, feature := range features {
|
|
switch feature {
|
|
case "database", backup.Instant, backup.Normal, restore.Instant, clean.Instant:
|
|
if !dbOrBackup {
|
|
dbOrBackup = true
|
|
queriers = append(queriers,
|
|
operator.ResourceQueryToZitadelQuery(queryNS),
|
|
queryDB,
|
|
)
|
|
destroyers = append(destroyers,
|
|
destroyDB,
|
|
)
|
|
}
|
|
case "operator":
|
|
queriers = append(queriers,
|
|
operator.ResourceQueryToZitadelQuery(queryNS),
|
|
operator.EnsureFuncToQueryFunc(rec),
|
|
)
|
|
}
|
|
}
|
|
|
|
currentTree.Parsed = &DesiredV0{
|
|
Common: tree.NewCommon("databases.caos.ch/Orb", "v0", false),
|
|
Database: databaseCurrent,
|
|
}
|
|
|
|
return func(k8sClient kubernetes.ClientInt, queried map[string]interface{}) (operator.EnsureFunc, error) {
|
|
if queried == nil {
|
|
queried = map[string]interface{}{}
|
|
}
|
|
monitor.WithField("queriers", len(queriers)).Info("Querying")
|
|
return operator.QueriersToEnsureFunc(monitor, true, queriers, k8sClient, queried)
|
|
},
|
|
func(k8sClient kubernetes.ClientInt) error {
|
|
monitor.WithField("destroyers", len(queriers)).Info("Destroy")
|
|
return operator.DestroyersToDestroyFunc(monitor, destroyers)(k8sClient)
|
|
},
|
|
func(k8sClient kubernetes.ClientInt, queried map[string]interface{}, gitops bool) error {
|
|
return configureDB(k8sClient, queried, gitops)
|
|
},
|
|
secrets,
|
|
existing,
|
|
migrate,
|
|
nil
|
|
}
|
|
}
|