|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
sourcev1 "github.com/fluxcd/source-controller/api/v1alpha1"
|
|
|
|
"github.com/manifoldco/promptui"
|
|
|
|
"github.com/spf13/cobra"
|
|
|
|
"io/ioutil"
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
|
|
|
"k8s.io/apimachinery/pkg/api/errors"
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
"k8s.io/apimachinery/pkg/types"
|
|
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
|
|
"net/url"
|
|
|
|
"os"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
|
|
|
var createSourceGitCmd = &cobra.Command{
|
|
|
|
Use: "git [name]",
|
|
|
|
Short: "Create or update a git source",
|
|
|
|
Long: `
|
|
|
|
The create source command generates a GitRepository resource and waits for it to sync.
|
|
|
|
For Git over SSH, host and SSH keys are automatically generated and stored in a Kubernetes secret.
|
|
|
|
For private Git repositories, the basic authentication credentials are stored in a Kubernetes secret.`,
|
|
|
|
Example: ` # Create a source from a public Git repository master branch
|
|
|
|
create source git podinfo \
|
|
|
|
--url=https://github.com/stefanprodan/podinfo \
|
|
|
|
--branch=master
|
|
|
|
|
|
|
|
# Create a source from a Git repository pinned to specific git tag
|
|
|
|
create source git podinfo \
|
|
|
|
--url=https://github.com/stefanprodan/podinfo \
|
|
|
|
--tag="3.2.3"
|
|
|
|
|
|
|
|
# Create a source from a public Git repository tag that matches a semver range
|
|
|
|
create source git podinfo \
|
|
|
|
--url=https://github.com/stefanprodan/podinfo \
|
|
|
|
--tag-semver=">=3.2.0 <3.3.0"
|
|
|
|
|
|
|
|
# Create a source from a Git repository using SSH authentication
|
|
|
|
create source git podinfo \
|
|
|
|
--url=ssh://git@github.com/stefanprodan/podinfo \
|
|
|
|
--branch=master
|
|
|
|
|
|
|
|
# Create a source from a Git repository using basic authentication
|
|
|
|
create source git podinfo \
|
|
|
|
--url=https://github.com/stefanprodan/podinfo \
|
|
|
|
--username=username \
|
|
|
|
--password=password
|
|
|
|
`,
|
|
|
|
RunE: createSourceGitCmdRun,
|
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
|
|
|
sourceGitURL string
|
|
|
|
sourceGitBranch string
|
|
|
|
sourceGitTag string
|
|
|
|
sourceGitSemver string
|
|
|
|
sourceGitUsername string
|
|
|
|
sourceGitPassword string
|
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
createSourceGitCmd.Flags().StringVar(&sourceGitURL, "url", "", "git address, e.g. ssh://git@host/org/repository")
|
|
|
|
createSourceGitCmd.Flags().StringVar(&sourceGitBranch, "branch", "master", "git branch")
|
|
|
|
createSourceGitCmd.Flags().StringVar(&sourceGitTag, "tag", "", "git tag")
|
|
|
|
createSourceGitCmd.Flags().StringVar(&sourceGitSemver, "tag-semver", "", "git tag semver range")
|
|
|
|
createSourceGitCmd.Flags().StringVarP(&sourceGitUsername, "username", "u", "", "basic authentication username")
|
|
|
|
createSourceGitCmd.Flags().StringVarP(&sourceGitPassword, "password", "p", "", "basic authentication password")
|
|
|
|
|
|
|
|
createSourceCmd.AddCommand(createSourceGitCmd)
|
|
|
|
}
|
|
|
|
|
|
|
|
func createSourceGitCmdRun(cmd *cobra.Command, args []string) error {
|
|
|
|
if len(args) < 1 {
|
|
|
|
return fmt.Errorf("source name is required")
|
|
|
|
}
|
|
|
|
name := args[0]
|
|
|
|
|
|
|
|
if sourceGitURL == "" {
|
|
|
|
return fmt.Errorf("git-url is required")
|
|
|
|
}
|
|
|
|
|
|
|
|
tmpDir, err := ioutil.TempDir("", name)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
|
|
|
|
u, err := url.Parse(sourceGitURL)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("git URL parse failed: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), timeout)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
withAuth := false
|
|
|
|
if strings.HasPrefix(sourceGitURL, "ssh") {
|
|
|
|
if err := generateSSH(ctx, name, u.Host, tmpDir); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
withAuth = true
|
|
|
|
} else if sourceGitUsername != "" && sourceGitPassword != "" {
|
|
|
|
if err := generateBasicAuth(ctx, name); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
withAuth = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if withAuth {
|
|
|
|
logSuccess("authentication configured")
|
|
|
|
}
|
|
|
|
|
|
|
|
logGenerate("generating source")
|
|
|
|
|
|
|
|
gitRepository := sourcev1.GitRepository{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: name,
|
|
|
|
Namespace: namespace,
|
|
|
|
},
|
|
|
|
Spec: sourcev1.GitRepositorySpec{
|
|
|
|
URL: sourceGitURL,
|
|
|
|
Interval: metav1.Duration{
|
|
|
|
Duration: interval,
|
|
|
|
},
|
|
|
|
Reference: &sourcev1.GitRepositoryRef{},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
if withAuth {
|
|
|
|
gitRepository.Spec.SecretRef = &corev1.LocalObjectReference{
|
|
|
|
Name: name,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if sourceGitSemver != "" {
|
|
|
|
gitRepository.Spec.Reference.SemVer = sourceGitSemver
|
|
|
|
} else if sourceGitTag != "" {
|
|
|
|
gitRepository.Spec.Reference.Tag = sourceGitTag
|
|
|
|
} else {
|
|
|
|
gitRepository.Spec.Reference.Branch = sourceGitBranch
|
|
|
|
}
|
|
|
|
|
|
|
|
kubeClient, err := utils.kubeClient(kubeconfig)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
logAction("applying source")
|
|
|
|
if err := upsertGitRepository(ctx, kubeClient, gitRepository); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
logWaiting("waiting for git sync")
|
|
|
|
if err := wait.PollImmediate(pollInterval, timeout,
|
|
|
|
isGitRepositoryReady(ctx, kubeClient, name, namespace)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
logSuccess("git sync completed")
|
|
|
|
|
|
|
|
namespacedName := types.NamespacedName{
|
|
|
|
Namespace: namespace,
|
|
|
|
Name: name,
|
|
|
|
}
|
|
|
|
err = kubeClient.Get(ctx, namespacedName, &gitRepository)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("git sync failed: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if gitRepository.Status.Artifact != nil {
|
|
|
|
logSuccess("fetched revision %s", gitRepository.Status.Artifact.Revision)
|
|
|
|
} else {
|
|
|
|
return fmt.Errorf("git sync failed, artifact not found")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func generateBasicAuth(ctx context.Context, name string) error {
|
|
|
|
logAction("saving credentials")
|
|
|
|
credentials := fmt.Sprintf("--from-literal=username='%s' --from-literal=password='%s'",
|
|
|
|
sourceGitUsername, sourceGitPassword)
|
|
|
|
secret := fmt.Sprintf("kubectl -n %s create secret generic %s %s --dry-run=client -oyaml | kubectl apply -f-",
|
|
|
|
namespace, name, credentials)
|
|
|
|
if _, err := utils.execCommand(ctx, ModeOS, secret); err != nil {
|
|
|
|
return fmt.Errorf("kubectl create secret failed")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func generateSSH(ctx context.Context, name, host, tmpDir string) error {
|
|
|
|
logGenerate("generating host key for %s", host)
|
|
|
|
|
|
|
|
command := fmt.Sprintf("ssh-keyscan %s > %s/known_hosts", host, tmpDir)
|
|
|
|
if _, err := utils.execCommand(ctx, ModeStderrOS, command); err != nil {
|
|
|
|
return fmt.Errorf("ssh-keyscan failed")
|
|
|
|
}
|
|
|
|
|
|
|
|
logGenerate("generating deploy key")
|
|
|
|
|
|
|
|
command = fmt.Sprintf("ssh-keygen -b 2048 -t rsa -f %s/identity -q -N \"\"", tmpDir)
|
|
|
|
if _, err := utils.execCommand(ctx, ModeStderrOS, command); err != nil {
|
|
|
|
return fmt.Errorf("ssh-keygen failed")
|
|
|
|
}
|
|
|
|
|
|
|
|
command = fmt.Sprintf("cat %s/identity.pub", tmpDir)
|
|
|
|
if deployKey, err := utils.execCommand(ctx, ModeCapture, command); err != nil {
|
|
|
|
return fmt.Errorf("unable to read identity.pub: %w", err)
|
|
|
|
} else {
|
|
|
|
fmt.Print(deployKey)
|
|
|
|
}
|
|
|
|
|
|
|
|
prompt := promptui.Prompt{
|
|
|
|
Label: "Have you added the deploy key to your repository",
|
|
|
|
IsConfirm: true,
|
|
|
|
}
|
|
|
|
if _, err := prompt.Run(); err != nil {
|
|
|
|
return fmt.Errorf("aborting")
|
|
|
|
}
|
|
|
|
|
|
|
|
logAction("saving keys")
|
|
|
|
files := fmt.Sprintf("--from-file=%s/identity --from-file=%s/identity.pub --from-file=%s/known_hosts",
|
|
|
|
tmpDir, tmpDir, tmpDir)
|
|
|
|
secret := fmt.Sprintf("kubectl -n %s create secret generic %s %s --dry-run=client -oyaml | kubectl apply -f-",
|
|
|
|
namespace, name, files)
|
|
|
|
if _, err := utils.execCommand(ctx, ModeOS, secret); err != nil {
|
|
|
|
return fmt.Errorf("create secret failed")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func upsertGitRepository(ctx context.Context, kubeClient client.Client, gitRepository sourcev1.GitRepository) error {
|
|
|
|
namespacedName := types.NamespacedName{
|
|
|
|
Namespace: gitRepository.GetNamespace(),
|
|
|
|
Name: gitRepository.GetName(),
|
|
|
|
}
|
|
|
|
|
|
|
|
var existing sourcev1.GitRepository
|
|
|
|
err := kubeClient.Get(ctx, namespacedName, &existing)
|
|
|
|
if err != nil {
|
|
|
|
if errors.IsNotFound(err) {
|
|
|
|
if err := kubeClient.Create(ctx, &gitRepository); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
logSuccess("source created")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
existing.Spec = gitRepository.Spec
|
|
|
|
if err := kubeClient.Update(ctx, &existing); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
logSuccess("source updated")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func isGitRepositoryReady(ctx context.Context, kubeClient client.Client, name, namespace string) wait.ConditionFunc {
|
|
|
|
return func() (bool, error) {
|
|
|
|
var gitRepository sourcev1.GitRepository
|
|
|
|
namespacedName := types.NamespacedName{
|
|
|
|
Namespace: namespace,
|
|
|
|
Name: name,
|
|
|
|
}
|
|
|
|
|
|
|
|
err := kubeClient.Get(ctx, namespacedName, &gitRepository)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, condition := range gitRepository.Status.Conditions {
|
|
|
|
if condition.Type == sourcev1.ReadyCondition {
|
|
|
|
if condition.Status == corev1.ConditionTrue {
|
|
|
|
return true, nil
|
|
|
|
} else if condition.Status == corev1.ConditionFalse {
|
|
|
|
return false, fmt.Errorf(condition.Message)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
}
|