Compare commits

..

1 Commits

Author SHA1 Message Date
Morten Olsen
8591e4e2d3 Added storage provisioner 2025-08-11 11:01:48 +02:00
8 changed files with 20 additions and 60 deletions

View File

@@ -33,14 +33,6 @@ spec:
imagePullPolicy: {{ .Values.image.pullPolicy }} imagePullPolicy: {{ .Values.image.pullPolicy }}
resources: resources:
{{- toYaml .Values.resources | nindent 12 }} {{- toYaml .Values.resources | nindent 12 }}
volumeMounts:
- name: data-volumes
mountPath: {{ .Values.storage.path }}
volumes:
- name: data-volumes
hostPath:
path: {{ .Values.storage.path }}
type: DirectoryOrCreate
{{- with .Values.nodeSelector }} {{- with .Values.nodeSelector }}
nodeSelector: nodeSelector:
{{- toYaml . | nindent 8 }} {{- toYaml . | nindent 8 }}

View File

@@ -9,11 +9,8 @@ image:
tag: main tag: main
imagePullSecrets: [] imagePullSecrets: []
nameOverride: '' nameOverride: ""
fullnameOverride: '' fullnameOverride: ""
storage:
path: /data/volumes
serviceAccount: serviceAccount:
# Specifies whether a service account should be created # Specifies whether a service account should be created
@@ -22,7 +19,7 @@ serviceAccount:
annotations: {} annotations: {}
# The name of the service account to use. # The name of the service account to use.
# If not set and create is true, a name is generated using the fullname template # If not set and create is true, a name is generated using the fullname template
name: '' name: ""
podAnnotations: {} podAnnotations: {}
@@ -53,4 +50,4 @@ nodeSelector: {}
tolerations: [] tolerations: []
affinity: {} affinity: {}

View File

@@ -1,15 +0,0 @@
#!/usr/bin/env node
import { K8sService } from '../src/services/k8s/k8s.ts';
import { Services } from '../src/utils/service.ts';
const services = new Services();
const k8s = services.get(K8sService);
const manifests = await k8s.extensionsApi.listCustomResourceDefinition();
for (const manifest of manifests.items) {
for (const version of manifest.spec.versions) {
console.log(`group: ${manifest.spec.group}, plural: ${manifest.spec.names.plural}, version: ${version.name}`);
}
}

View File

@@ -37,8 +37,8 @@ class GenerateSecretResource extends CustomResource<typeof generateSecretSpecSch
const current = decodeSecret(this.#secretResource.data) || {}; const current = decodeSecret(this.#secretResource.data) || {};
const expected = { const expected = {
...secrets,
...current, ...current,
...secrets,
}; };
if (!isDeepSubset(current, expected)) { if (!isDeepSubset(current, expected)) {

View File

@@ -9,7 +9,6 @@ const postgresDatabaseSecretSchema = z.object({
port: z.string(), port: z.string(),
user: z.string(), user: z.string(),
password: z.string(), password: z.string(),
database: z.string().optional(),
}); });
const postgresDatabaseConnectionSecretSchema = z.object({ const postgresDatabaseConnectionSecretSchema = z.object({

View File

@@ -95,7 +95,6 @@ class PostgresDatabaseResource extends CustomResource<typeof postgresDatabaseSpe
port: serverSecretData.data.port, port: serverSecretData.data.port,
user: this.#userName, user: this.#userName,
database: this.#dbName, database: this.#dbName,
...databaseSecretData.data,
}; };
if (!isDeepSubset(databaseSecretData.data, expectedSecret)) { if (!isDeepSubset(databaseSecretData.data, expectedSecret)) {
@@ -133,7 +132,7 @@ class PostgresDatabaseResource extends CustomResource<typeof postgresDatabaseSpe
}; };
} }
const secretData = postgresDatabaseConnectionSecretSchema.safeParse(decodeSecret(this.#databaseSecret.data)); const secretData = postgresDatabaseConnectionSecretSchema.safeParse(decodeSecret(this.#serverSecret.current?.data));
if (!secretData.success || !secretData.data) { if (!secretData.success || !secretData.data) {
return { return {
ready: false, ready: false,
@@ -146,7 +145,6 @@ class PostgresDatabaseResource extends CustomResource<typeof postgresDatabaseSpe
const database = postgresService.get({ const database = postgresService.get({
...connectionSecretData.data, ...connectionSecretData.data,
port: connectionSecretData.data.port ? Number(connectionSecretData.data.port) : 5432, port: connectionSecretData.data.port ? Number(connectionSecretData.data.port) : 5432,
database: connectionSecretData.data.database,
}); });
await database.upsertRole({ await database.upsertRole({
name: secretData.data.user, name: secretData.data.user,
@@ -168,8 +166,8 @@ class PostgresDatabaseResource extends CustomResource<typeof postgresDatabaseSpe
} }
this.#updateSecret(); this.#updateSecret();
await Promise.allSettled([ await Promise.allSettled([
this.reconcileSubresource(DATABASE_READY_CONDITION, this.#reconcileDatabase), await this.reconcileSubresource(DATABASE_READY_CONDITION, this.#reconcileDatabase),
this.reconcileSubresource(SECRET_READY_CONDITION, this.#reconcileSecret), await this.reconcileSubresource(SECRET_READY_CONDITION, this.#reconcileSecret),
]); ]);
const secretReady = this.conditions.get(SECRET_READY_CONDITION)?.status === 'True'; const secretReady = this.conditions.get(SECRET_READY_CONDITION)?.status === 'True';

View File

@@ -10,7 +10,6 @@ type PostgresInstanceOptions = {
port?: number; port?: number;
user: string; user: string;
password: string; password: string;
database?: string;
}; };
class PostgresInstance { class PostgresInstance {
@@ -24,7 +23,6 @@ class PostgresInstance {
user: process.env.FORCE_PG_USER ?? options.user, user: process.env.FORCE_PG_USER ?? options.user,
password: process.env.FORCE_PG_PASSWORD ?? options.password, password: process.env.FORCE_PG_PASSWORD ?? options.password,
port: process.env.FORCE_PG_PORT ? parseInt(process.env.FORCE_PG_PORT) : options.port, port: process.env.FORCE_PG_PORT ? parseInt(process.env.FORCE_PG_PORT) : options.port,
database: options.database,
}, },
}); });
} }

View File

@@ -7,6 +7,7 @@ import type { Services } from '../utils/service.ts';
import { ResourceService, type Resource } from '../services/resources/resources.ts'; import { ResourceService, type Resource } from '../services/resources/resources.ts';
const PROVISIONER = 'reuse-local-path-provisioner'; const PROVISIONER = 'reuse-local-path-provisioner';
const LABEL_SELECTOR = `provisioner=${PROVISIONER}`;
class StorageProvider { class StorageProvider {
#watcher: Watcher<V1PersistentVolumeClaim>; #watcher: Watcher<V1PersistentVolumeClaim>;
@@ -16,36 +17,26 @@ class StorageProvider {
this.#services = services; this.#services = services;
const watchService = this.#services.get(WatcherService); const watchService = this.#services.get(WatcherService);
this.#watcher = watchService.create({ this.#watcher = watchService.create({
path: '/api/v1/persistentvolumeclaims', path: '/api/v1/persistantvolumeclaims',
transform: (manifest) => ({ list: (k8s) =>
apiVersion: 'v1', k8s.api.listPersistentVolumeClaimForAllNamespaces({
kind: 'PersistentVolumeClaim', labelSelector: LABEL_SELECTOR,
...manifest, }),
}),
list: async (k8s) => {
const current = await k8s.api.listPersistentVolumeClaimForAllNamespaces();
return current;
},
verbs: ['add', 'update', 'delete'], verbs: ['add', 'update', 'delete'],
selector: LABEL_SELECTOR,
}); });
this.#watcher.on('changed', this.#handleChange); this.#watcher.on('changed', this.#handleChange);
} }
#handleChange = async (pvc: Resource<V1PersistentVolumeClaim>) => { #handleChange = async (pvc: Resource<V1PersistentVolumeClaim>) => {
if (pvc.metadata?.annotations?.['volume.kubernetes.io/storage-provisioner'] !== PROVISIONER) {
return;
}
const target = `/data/volumes/${pvc.namespace}/${pvc.name}`; const target = `/data/volumes/${pvc.namespace}/${pvc.name}`;
try { await mkdir(target, { recursive: true });
await mkdir(target, { recursive: true });
} catch (err) {
console.error(err);
}
const resourceService = this.#services.get(ResourceService); const resourceService = this.#services.get(ResourceService);
const pv = resourceService.get<V1PersistentVolume>({ const pv = resourceService.get<V1PersistentVolume>({
apiVersion: 'v1', apiVersion: 'v1',
kind: 'PersistentVolume', kind: 'PersistantVolume',
name: `${pvc.namespace}-${pvc.name}`, name: pvc.name,
namespace: pvc.namespace,
}); });
await pv.load(); await pv.load();
await pv.patch({ await pv.patch({
@@ -59,7 +50,7 @@ class StorageProvider {
path: target, path: target,
}, },
capacity: { capacity: {
storage: pvc.spec?.resources?.requests?.storage ?? '1Gi', storage: pvc.spec?.resources?.requests?.storage ?? '1GB',
}, },
persistentVolumeReclaimPolicy: 'Retain', persistentVolumeReclaimPolicy: 'Retain',
accessModes: pvc.spec?.accessModes, accessModes: pvc.spec?.accessModes,