diff --git a/.github/workflows/e2e.yaml b/.github/workflows/e2e.yaml index 97af7e78..e7d2e19a 100644 --- a/.github/workflows/e2e.yaml +++ b/.github/workflows/e2e.yaml @@ -146,6 +146,20 @@ jobs: --chart=podinfo \ --chart-version="5.0.x" \ --service-account=dev-team + - name: flux create image repository + run: | + ./bin/flux create image repository podinfo \ + --image=ghcr.io/stefanprodan/podinfo \ + --interval=1m + - name: flux create image policy + run: | + ./bin/flux create image policy podinfo \ + --image-ref=podinfo \ + --interval=1m \ + --semver=5.0.x + - name: flux get image policy + run: | + ./bin/flux get image policy podinfo | grep '5.0.3' - name: flux2-kustomize-helm-example run: | ./bin/flux create source git flux-system \ diff --git a/.goreleaser.yml b/.goreleaser.yml index 8a6de6a0..dd0e4b69 100644 --- a/.goreleaser.yml +++ b/.goreleaser.yml @@ -1,3 +1,4 @@ +project_name: flux builds: - <<: &build_defaults binary: flux diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 5a5b7b07..cbd76fa9 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -1,7 +1,6 @@ # Contributing -Flux is [Apache 2.0 -licensed](https://github.com/fluxcd/flux2/blob/main/LICENSE) and +Flux is [Apache 2.0 licensed](https://github.com/fluxcd/flux2/blob/main/LICENSE) and accepts contributions via GitHub pull requests. This document outlines some of the conventions on to make it easier to get your contribution accepted. @@ -14,9 +13,18 @@ code. By contributing to this project you agree to the Developer Certificate of Origin (DCO). This document was created by the Linux Kernel community and is a simple statement that you, as a contributor, have the legal right to make the -contribution. No action from you is required, but it's a good idea to see the -[DCO](DCO) file for details before you start contributing code to FluxCD -organization. +contribution. + +We require all commits to be signed. By signing off with your signature, you +certify that you wrote the patch or otherwise have the right to contribute the +material by the rules of the [DCO](DCO): + +`Signed-off-by: Jane Doe ` + +The signature must contain your real name +(sorry, no pseudonyms or anonymous contributions) +If your `user.name` and `user.email` are configured in your Git config, +you can sign your commit automatically with `git commit -s`. ## Communications diff --git a/README.md b/README.md index 22b94cb1..a7615f98 100644 --- a/README.md +++ b/README.md @@ -108,17 +108,18 @@ Depending on what you want to do, some of the following bits might be your first - Check out [how to contribute](CONTRIBUTING.md) to the project ### Upcoming Events - -- 14 Dec 2020 - [The Power of GitOps with Flux and Flagger with Leigh Capili](https://www.meetup.com/GitOps-Community/events/274924513/) +- 11 Jan 2021 - [Helm + GitOps = ⚡️⚡️⚡️ with Scott Rigby](https://www.meetup.com/GitOps-Community/events/275348736/) +- 25 Jan 2021 - [GitOps Core Concepts & How to Teach Your Teams with Leigh Capili](https://www.meetup.com/GitOps-Community/events/275625806/) ### Featured Talks - +- 14 Dec 2020 - [The Power of GitOps with Flux and Flagger (GitOps Hands-On) with Leigh Capili](https://youtu.be/cB7iXeNLteE) +- 30 Nov 2020 - [The Power of GitOps with Flux 2 - Part 3 with Leigh Capili](https://youtu.be/N_K5g7o9JKg) - 24 Nov 2020 - [Flux CD v2 with GitOps Toolkit - Kubernetes Deployment and Sync Mechanism](https://youtu.be/R6OeIgb7lUI) +- 02 Nov 2020 - [The Power of GitOps with Flux & GitOps Toolkit - Part 2 with Leigh Capili](https://youtu.be/fC2YCxQRUwU) - 28 Oct 2020 - [The Kubelist Podcast: Flux with Michael Bridgen](https://www.heavybit.com/library/podcasts/the-kubelist-podcast/ep-5-flux-with-michael-bridgen-of-weaveworks/) - 19 Oct 2020 - [The Power of GitOps with Flux & GitOps Toolkit - Part 1 with Leigh Capili](https://youtu.be/0v5bjysXTL8) -- 30 Nov 2020 - [The Power of GitOps with Flux 2 - Part 3 with Leigh Capili](https://youtu.be/N_K5g7o9JKg) - 12 Oct 2020 - [Rawkode Live: Introduction to GitOps Toolkit with Stefan Prodan](https://youtu.be/HqTzuOBP0eY) -- 4 Sep 2020 - [KubeCon Europe: The road to Flux v2 and Progressive Delivery with Stefan Prodan & Hidde Beydals](https://youtu.be/8v94nUkXsxU) -- 25 June 2020 - [Cloud Native Nordics: Introduction to GitOps & GitOps Toolkit with Alexis Richardson & Stefan Prodan](https://youtu.be/qQBtSkgl7tI) +- 04 Sep 2020 - [KubeCon Europe: The road to Flux v2 and Progressive Delivery with Stefan Prodan & Hidde Beydals](https://youtu.be/8v94nUkXsxU) +- 25 Jun 2020 - [Cloud Native Nordics: Introduction to GitOps & GitOps Toolkit with Alexis Richardson & Stefan Prodan](https://youtu.be/qQBtSkgl7tI) -We are looking forward to seeing you with us! +We look forward to seeing you with us! diff --git a/cmd/flux/bootstrap.go b/cmd/flux/bootstrap.go index 55b80e93..5e70e3a2 100644 --- a/cmd/flux/bootstrap.go +++ b/cmd/flux/bootstrap.go @@ -55,7 +55,7 @@ var ( bootstrapWatchAllNamespaces bool bootstrapNetworkPolicy bool bootstrapManifestsPath string - bootstrapArch = flags.Arch(defaults.Arch) + bootstrapArch flags.Arch bootstrapLogLevel = flags.LogLevel(defaults.LogLevel) bootstrapRequiredComponents = []string{"source-controller", "kustomize-controller"} bootstrapTokenAuth bool @@ -90,6 +90,7 @@ func init() { bootstrapCmd.PersistentFlags().StringVar(&bootstrapManifestsPath, "manifests", "", "path to the manifest directory") bootstrapCmd.PersistentFlags().StringVar(&bootstrapClusterDomain, "cluster-domain", defaults.ClusterDomain, "internal cluster domain") bootstrapCmd.PersistentFlags().MarkHidden("manifests") + bootstrapCmd.PersistentFlags().MarkDeprecated("arch", "multi-arch container image is now available for AMD64, ARMv7 and ARM64") rootCmd.AddCommand(bootstrapCmd) } @@ -104,6 +105,11 @@ func bootstrapValidate() error { return fmt.Errorf("component %s is required", component) } } + + if err := utils.ValidateComponents(components); err != nil { + return err + } + return nil } @@ -115,7 +121,6 @@ func generateInstallManifests(targetPath, namespace, tmpDir string, localManifes Components: bootstrapComponents(), Registry: bootstrapRegistry, ImagePullSecret: bootstrapImagePullSecret, - Arch: bootstrapArch.String(), WatchAllNamespaces: bootstrapWatchAllNamespaces, NetworkPolicy: bootstrapNetworkPolicy, LogLevel: bootstrapLogLevel.String(), @@ -159,13 +164,14 @@ func applyInstallManifests(ctx context.Context, manifestPath string, components func generateSyncManifests(url, branch, name, namespace, targetPath, tmpDir string, interval time.Duration) (string, error) { opts := sync.Options{ - Name: name, - Namespace: namespace, - URL: url, - Branch: branch, - Interval: interval, - TargetPath: targetPath, - ManifestFile: sync.MakeDefaultOptions().ManifestFile, + Name: name, + Namespace: namespace, + URL: url, + Branch: branch, + Interval: interval, + TargetPath: targetPath, + ManifestFile: sync.MakeDefaultOptions().ManifestFile, + GitImplementation: sync.MakeDefaultOptions().GitImplementation, } manifest, err := sync.Generate(opts) @@ -234,7 +240,7 @@ func shouldCreateDeployKey(ctx context.Context, kubeClient client.Client, namesp } func generateDeployKey(ctx context.Context, kubeClient client.Client, url *url.URL, namespace string) (string, error) { - pair, err := generateKeyPair(ctx) + pair, err := generateKeyPair(ctx, sourceGitKeyAlgorithm, sourceGitRSABits, sourceGitECDSACurve) if err != nil { return "", err } @@ -261,3 +267,20 @@ func generateDeployKey(ctx context.Context, kubeClient client.Client, url *url.U return string(pair.PublicKey), nil } + +func checkIfBootstrapPathDiffers(ctx context.Context, kubeClient client.Client, namespace string, path string) (string, bool) { + namespacedName := types.NamespacedName{ + Name: namespace, + Namespace: namespace, + } + var fluxSystemKustomization kustomizev1.Kustomization + err := kubeClient.Get(ctx, namespacedName, &fluxSystemKustomization) + if err != nil { + return "", false + } + if fluxSystemKustomization.Spec.Path == path { + return "", false + } + + return fluxSystemKustomization.Spec.Path, true +} diff --git a/cmd/flux/bootstrap_github.go b/cmd/flux/bootstrap_github.go index f85e1ec1..336423de 100644 --- a/cmd/flux/bootstrap_github.go +++ b/cmd/flux/bootstrap_github.go @@ -23,6 +23,7 @@ import ( "net/url" "os" "path" + "path/filepath" "time" "github.com/spf13/cobra" @@ -56,7 +57,7 @@ the bootstrap command will perform an upgrade if needed.`, flux bootstrap github --owner= --repository= --path=dev-cluster # Run bootstrap for a public repository on a personal account - flux bootstrap github --owner= --repository= --private=false --personal=true + flux bootstrap github --owner= --repository= --private=false --personal=true # Run bootstrap for a private repo hosted on GitHub Enterprise using SSH auth flux bootstrap github --owner= --repository= --hostname= --ssh-hostname= @@ -114,6 +115,20 @@ func bootstrapGitHubCmdRun(cmd *cobra.Command, args []string) error { return err } + ctx, cancel := context.WithTimeout(context.Background(), timeout) + defer cancel() + + kubeClient, err := utils.KubeClient(kubeconfig, kubecontext) + if err != nil { + return err + } + + usedPath, bootstrapPathDiffers := checkIfBootstrapPathDiffers(ctx, kubeClient, namespace, filepath.ToSlash(ghPath.String())) + + if bootstrapPathDiffers { + return fmt.Errorf("cluster already bootstrapped to %v path", usedPath) + } + repository, err := git.NewRepository(ghRepository, ghOwner, ghHostname, ghToken, "flux", ghOwner+"@users.noreply.github.com") if err != nil { return err @@ -134,9 +149,6 @@ func bootstrapGitHubCmdRun(cmd *cobra.Command, args []string) error { } defer os.RemoveAll(tmpDir) - ctx, cancel := context.WithTimeout(context.Background(), timeout) - defer cancel() - if ghDelete { if err := provider.DeleteRepository(ctx, repository); err != nil { return err @@ -197,11 +209,6 @@ func bootstrapGitHubCmdRun(cmd *cobra.Command, args []string) error { logger.Successf("components are up to date") } - kubeClient, err := utils.KubeClient(kubeconfig, kubecontext) - if err != nil { - return err - } - // determine if repo synchronization is working isInstall := shouldInstallManifests(ctx, kubeClient, namespace) @@ -261,7 +268,7 @@ func bootstrapGitHubCmdRun(cmd *cobra.Command, args []string) error { // configure repo synchronization logger.Actionf("generating sync manifests") - syncManifests, err := generateSyncManifests(repoURL, bootstrapBranch, namespace, namespace, ghPath.String(), tmpDir, ghInterval) + syncManifests, err := generateSyncManifests(repoURL, bootstrapBranch, namespace, namespace, filepath.ToSlash(ghPath.String()), tmpDir, ghInterval) if err != nil { return err } diff --git a/cmd/flux/bootstrap_gitlab.go b/cmd/flux/bootstrap_gitlab.go index 022c131f..5767a0e0 100644 --- a/cmd/flux/bootstrap_gitlab.go +++ b/cmd/flux/bootstrap_gitlab.go @@ -23,6 +23,8 @@ import ( "net/url" "os" "path" + "path/filepath" + "regexp" "time" "github.com/spf13/cobra" @@ -46,7 +48,7 @@ the bootstrap command will perform an upgrade if needed.`, Example: ` # Create a GitLab API token and export it as an env var export GITLAB_TOKEN= - # Run bootstrap for a private repo using HTTPS token authentication + # Run bootstrap for a private repo using HTTPS token authentication flux bootstrap gitlab --owner= --repository= --token-auth # Run bootstrap for a private repo using SSH authentication @@ -58,7 +60,7 @@ the bootstrap command will perform an upgrade if needed.`, # Run bootstrap for a public repository on a personal account flux bootstrap gitlab --owner= --repository= --private=false --personal --token-auth - # Run bootstrap for a private repo hosted on a GitLab server + # Run bootstrap for a private repo hosted on a GitLab server flux bootstrap gitlab --owner= --repository= --hostname= --token-auth # Run bootstrap for a an existing repository with a branch named main @@ -67,6 +69,10 @@ the bootstrap command will perform an upgrade if needed.`, RunE: bootstrapGitLabCmdRun, } +const ( + gitlabProjectRegex = `\A[[:alnum:]\x{00A9}-\x{1f9ff}_][[:alnum:]\p{Pd}\x{00A9}-\x{1f9ff}_\.]*\z` +) + var ( glOwner string glRepository string @@ -97,37 +103,51 @@ func bootstrapGitLabCmdRun(cmd *cobra.Command, args []string) error { return fmt.Errorf("%s environment variable not found", git.GitLabTokenName) } + projectNameIsValid, err := regexp.MatchString(gitlabProjectRegex, glRepository) + if err != nil { + return err + } + if !projectNameIsValid { + return fmt.Errorf("%s is an invalid project name for gitlab.\nIt can contain only letters, digits, emojis, '_', '.', dash, space. It must start with letter, digit, emoji or '_'.", glRepository) + } + if err := bootstrapValidate(); err != nil { return err } - repository, err := git.NewRepository(glRepository, glOwner, glHostname, glToken, "flux", glOwner+"@users.noreply.gitlab.com") + ctx, cancel := context.WithTimeout(context.Background(), timeout) + defer cancel() + + kubeClient, err := utils.KubeClient(kubeconfig, kubecontext) if err != nil { return err } - if glSSHHostname != "" { - repository.SSHHost = glSSHHostname - } + usedPath, bootstrapPathDiffers := checkIfBootstrapPathDiffers(ctx, kubeClient, namespace, filepath.ToSlash(glPath.String())) - provider := &git.GitLabProvider{ - IsPrivate: glPrivate, - IsPersonal: glPersonal, + if bootstrapPathDiffers { + return fmt.Errorf("cluster already bootstrapped to %v path", usedPath) } - kubeClient, err := utils.KubeClient(kubeconfig, kubecontext) + repository, err := git.NewRepository(glRepository, glOwner, glHostname, glToken, "flux", glOwner+"@users.noreply.gitlab.com") if err != nil { return err } + if glSSHHostname != "" { + repository.SSHHost = glSSHHostname + } + tmpDir, err := ioutil.TempDir("", namespace) if err != nil { return err } defer os.RemoveAll(tmpDir) - ctx, cancel := context.WithTimeout(context.Background(), timeout) - defer cancel() + provider := &git.GitLabProvider{ + IsPrivate: glPrivate, + IsPersonal: glPersonal, + } // create GitLab project if doesn't exists logger.Actionf("connecting to %s", glHostname) @@ -227,7 +247,7 @@ func bootstrapGitLabCmdRun(cmd *cobra.Command, args []string) error { // configure repo synchronization logger.Actionf("generating sync manifests") - syncManifests, err := generateSyncManifests(repoURL, bootstrapBranch, namespace, namespace, glPath.String(), tmpDir, glInterval) + syncManifests, err := generateSyncManifests(repoURL, bootstrapBranch, namespace, namespace, filepath.ToSlash(glPath.String()), tmpDir, glInterval) if err != nil { return err } diff --git a/cmd/flux/create.go b/cmd/flux/create.go index 10ef64c2..5cdf2f61 100644 --- a/cmd/flux/create.go +++ b/cmd/flux/create.go @@ -76,7 +76,7 @@ func (names apiType) upsert(ctx context.Context, kubeClient client.Client, objec Name: object.GetName(), } - op, err := controllerutil.CreateOrUpdate(ctx, kubeClient, object.asRuntimeObject(), mutate) + op, err := controllerutil.CreateOrUpdate(ctx, kubeClient, object.asClientObject(), mutate) if err != nil { return nsname, err } diff --git a/cmd/flux/create_image_policy.go b/cmd/flux/create_image_policy.go index 1c77113c..287e3dcd 100644 --- a/cmd/flux/create_image_policy.go +++ b/cmd/flux/create_image_policy.go @@ -38,8 +38,9 @@ the status of the object.`, RunE: createImagePolicyRun} type imagePolicyFlags struct { - imageRef string - semver string + imageRef string + semver string + filterRegex string } var imagePolicyArgs = imagePolicyFlags{} @@ -48,6 +49,7 @@ func init() { flags := createImagePolicyCmd.Flags() flags.StringVar(&imagePolicyArgs.imageRef, "image-ref", "", "the name of an image repository object") flags.StringVar(&imagePolicyArgs.semver, "semver", "", "a semver range to apply to tags; e.g., '1.x'") + flags.StringVar(&imagePolicyArgs.filterRegex, "filter-regex", "", " regular expression pattern used to filter the image tags") createImageCmd.AddCommand(createImagePolicyCmd) } @@ -95,6 +97,12 @@ func createImagePolicyRun(cmd *cobra.Command, args []string) error { return fmt.Errorf("a policy must be provided with --semver") } + if imagePolicyArgs.filterRegex != "" { + policy.Spec.FilterTags = &imagev1.TagFilter{ + Pattern: imagePolicyArgs.filterRegex, + } + } + if export { return printExport(exportImagePolicy(&policy)) } diff --git a/cmd/flux/create_image_updateauto.go b/cmd/flux/create_image_updateauto.go index 0f1935f3..4379ed4d 100644 --- a/cmd/flux/create_image_updateauto.go +++ b/cmd/flux/create_image_updateauto.go @@ -50,7 +50,7 @@ var imageUpdateArgs = imageUpdateFlags{} func init() { flags := createImageUpdateCmd.Flags() flags.StringVar(&imageUpdateArgs.gitRepoRef, "git-repo-ref", "", "the name of a GitRepository resource with details of the upstream git repository") - flags.StringVar(&imageUpdateArgs.branch, "branch", "", "the branch to push commits to") + flags.StringVar(&imageUpdateArgs.branch, "branch", "", "the branch to checkout and push commits to") flags.StringVar(&imageUpdateArgs.commitTemplate, "commit-template", "", "a template for commit messages") flags.StringVar(&imageUpdateArgs.authorName, "author-name", "", "the name to use for commit author") flags.StringVar(&imageUpdateArgs.authorEmail, "author-email", "", "the email to use for commit author") @@ -68,6 +68,10 @@ func createImageUpdateRun(cmd *cobra.Command, args []string) error { return fmt.Errorf("a reference to a GitRepository is required (--git-repo-ref)") } + if imageUpdateArgs.branch == "" { + return fmt.Errorf("the Git repoistory branch is required (--branch)") + } + labels, err := parseLabels() if err != nil { return err diff --git a/cmd/flux/create_secret.go b/cmd/flux/create_secret.go index 703c971a..e091652e 100644 --- a/cmd/flux/create_secret.go +++ b/cmd/flux/create_secret.go @@ -17,11 +17,15 @@ limitations under the License. package main import ( + "context" "fmt" "github.com/spf13/cobra" corev1 "k8s.io/api/core/v1" + "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" + "k8s.io/apimachinery/pkg/types" + "sigs.k8s.io/controller-runtime/pkg/client" "sigs.k8s.io/yaml" ) @@ -35,6 +39,32 @@ func init() { createCmd.AddCommand(createSecretCmd) } +func upsertSecret(ctx context.Context, kubeClient client.Client, secret corev1.Secret) error { + namespacedName := types.NamespacedName{ + Namespace: secret.GetNamespace(), + Name: secret.GetName(), + } + + var existing corev1.Secret + err := kubeClient.Get(ctx, namespacedName, &existing) + if err != nil { + if errors.IsNotFound(err) { + if err := kubeClient.Create(ctx, &secret); err != nil { + return err + } else { + return nil + } + } + return err + } + + existing.StringData = secret.StringData + if err := kubeClient.Update(ctx, &existing); err != nil { + return err + } + return nil +} + func exportSecret(secret corev1.Secret) error { secret.TypeMeta = metav1.TypeMeta{ APIVersion: "v1", diff --git a/cmd/flux/create_secret_git.go b/cmd/flux/create_secret_git.go index 31d2a2ef..693008ab 100644 --- a/cmd/flux/create_secret_git.go +++ b/cmd/flux/create_secret_git.go @@ -21,6 +21,7 @@ import ( "crypto/elliptic" "fmt" "net/url" + "time" "github.com/spf13/cobra" corev1 "k8s.io/api/core/v1" @@ -28,6 +29,7 @@ import ( "github.com/fluxcd/flux2/internal/flags" "github.com/fluxcd/flux2/internal/utils" + "github.com/fluxcd/pkg/ssh" ) var createSecretGitCmd = &cobra.Command{ @@ -53,7 +55,7 @@ For Git over HTTP/S, the provided basic authentication credentials are stored in # Create a Git SSH secret on disk and print the deploy key flux create secret git podinfo-auth \ --url=ssh://git@github.com/stefanprodan/podinfo \ - --export > podinfo-auth.yaml + --export > podinfo-auth.yaml yq read podinfo-auth.yaml 'data."identity.pub"' | base64 --decode @@ -61,7 +63,7 @@ For Git over HTTP/S, the provided basic authentication credentials are stored in flux create secret git podinfo-auth \ --namespace=apps \ --url=ssh://git@github.com/stefanprodan/podinfo \ - --export > podinfo-auth.yaml + --export > podinfo-auth.yaml sops --encrypt --encrypted-regex '^(data|stringData)$' \ --in-place podinfo-auth.yaml @@ -82,9 +84,9 @@ func init() { createSecretGitCmd.Flags().StringVar(&secretGitURL, "url", "", "git address, e.g. ssh://git@host/org/repository") createSecretGitCmd.Flags().StringVarP(&secretGitUsername, "username", "u", "", "basic authentication username") createSecretGitCmd.Flags().StringVarP(&secretGitPassword, "password", "p", "", "basic authentication password") - createSecretGitCmd.Flags().Var(&secretGitKeyAlgorithm, "ssh-key-algorithm", sourceGitKeyAlgorithm.Description()) - createSecretGitCmd.Flags().Var(&secretGitRSABits, "ssh-rsa-bits", sourceGitRSABits.Description()) - createSecretGitCmd.Flags().Var(&secretGitECDSACurve, "ssh-ecdsa-curve", sourceGitECDSACurve.Description()) + createSecretGitCmd.Flags().Var(&secretGitKeyAlgorithm, "ssh-key-algorithm", secretGitKeyAlgorithm.Description()) + createSecretGitCmd.Flags().Var(&secretGitRSABits, "ssh-rsa-bits", secretGitRSABits.Description()) + createSecretGitCmd.Flags().Var(&secretGitECDSACurve, "ssh-ecdsa-curve", secretGitECDSACurve.Description()) createSecretCmd.AddCommand(createSecretGitCmd) } @@ -122,7 +124,7 @@ func createSecretGitCmdRun(cmd *cobra.Command, args []string) error { switch u.Scheme { case "ssh": - pair, err := generateKeyPair(ctx) + pair, err := generateKeyPair(ctx, secretGitKeyAlgorithm, secretGitRSABits, secretGitECDSACurve) if err != nil { return err } @@ -171,3 +173,34 @@ func createSecretGitCmdRun(cmd *cobra.Command, args []string) error { return nil } + +func generateKeyPair(ctx context.Context, alg flags.PublicKeyAlgorithm, rsa flags.RSAKeyBits, ecdsa flags.ECDSACurve) (*ssh.KeyPair, error) { + var keyGen ssh.KeyPairGenerator + switch algorithm := alg.String(); algorithm { + case "rsa": + keyGen = ssh.NewRSAGenerator(int(rsa)) + case "ecdsa": + keyGen = ssh.NewECDSAGenerator(ecdsa.Curve) + case "ed25519": + keyGen = ssh.NewEd25519Generator() + default: + return nil, fmt.Errorf("unsupported public key algorithm: %s", algorithm) + } + pair, err := keyGen.Generate() + if err != nil { + return nil, fmt.Errorf("key pair generation failed, error: %w", err) + } + return pair, nil +} + +func scanHostKey(ctx context.Context, url *url.URL) ([]byte, error) { + host := url.Host + if url.Port() == "" { + host = host + ":22" + } + hostKey, err := ssh.ScanHostKey(host, 30*time.Second) + if err != nil { + return nil, fmt.Errorf("SSH key scan for host %s failed, error: %w", host, err) + } + return hostKey, nil +} diff --git a/cmd/flux/create_secret_helm.go b/cmd/flux/create_secret_helm.go new file mode 100644 index 00000000..e0b22ac6 --- /dev/null +++ b/cmd/flux/create_secret_helm.go @@ -0,0 +1,141 @@ +/* +Copyright 2021 The Flux authors + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "context" + "fmt" + "io/ioutil" + + "github.com/spf13/cobra" + corev1 "k8s.io/api/core/v1" + metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" + + "github.com/fluxcd/flux2/internal/utils" +) + +var createSecretHelmCmd = &cobra.Command{ + Use: "helm [name]", + Short: "Create or update a Kubernetes secret for Helm repository authentication", + Long: ` +The create secret helm command generates a Kubernetes secret with basic authentication credentials.`, + Example: ` # Create a Helm authentication secret on disk and encrypt it with Mozilla SOPS + + flux create secret helm repo-auth \ + --namespace=my-namespace \ + --username=my-username \ + --password=my-password \ + --export > repo-auth.yaml + + sops --encrypt --encrypted-regex '^(data|stringData)$' \ + --in-place repo-auth.yaml + + # Create an authentication secret using a custom TLS cert + flux create secret helm repo-auth \ + --username=username \ + --password=password \ + --cert-file=./cert.crt \ + --key-file=./key.crt \ + --ca-file=./ca.crt +`, + RunE: createSecretHelmCmdRun, +} + +var ( + secretHelmUsername string + secretHelmPassword string + secretHelmCertFile string + secretHelmKeyFile string + secretHelmCAFile string +) + +func init() { + createSecretHelmCmd.Flags().StringVarP(&secretHelmUsername, "username", "u", "", "basic authentication username") + createSecretHelmCmd.Flags().StringVarP(&secretHelmPassword, "password", "p", "", "basic authentication password") + createSecretHelmCmd.Flags().StringVar(&secretHelmCertFile, "cert-file", "", "TLS authentication cert file path") + createSecretHelmCmd.Flags().StringVar(&secretHelmKeyFile, "key-file", "", "TLS authentication key file path") + createSecretHelmCmd.Flags().StringVar(&secretHelmCAFile, "ca-file", "", "TLS authentication CA file path") + + createSecretCmd.AddCommand(createSecretHelmCmd) +} + +func createSecretHelmCmdRun(cmd *cobra.Command, args []string) error { + if len(args) < 1 { + return fmt.Errorf("secret name is required") + } + name := args[0] + + secretLabels, err := parseLabels() + if err != nil { + return err + } + + secret := corev1.Secret{ + ObjectMeta: metav1.ObjectMeta{ + Name: name, + Namespace: namespace, + Labels: secretLabels, + }, + StringData: map[string]string{}, + } + + if secretHelmUsername != "" && secretHelmPassword != "" { + secret.StringData["username"] = secretHelmUsername + secret.StringData["password"] = secretHelmPassword + } + + if secretHelmCertFile != "" && secretHelmKeyFile != "" { + cert, err := ioutil.ReadFile(secretHelmCertFile) + if err != nil { + return fmt.Errorf("failed to read repository cert file '%s': %w", secretHelmCertFile, err) + } + secret.StringData["certFile"] = string(cert) + + key, err := ioutil.ReadFile(secretHelmKeyFile) + if err != nil { + return fmt.Errorf("failed to read repository key file '%s': %w", secretHelmKeyFile, err) + } + secret.StringData["keyFile"] = string(key) + } + + if secretHelmCAFile != "" { + ca, err := ioutil.ReadFile(secretHelmCAFile) + if err != nil { + return fmt.Errorf("failed to read repository CA file '%s': %w", secretHelmCAFile, err) + } + secret.StringData["caFile"] = string(ca) + } + + if export { + return exportSecret(secret) + } + + ctx, cancel := context.WithTimeout(context.Background(), timeout) + defer cancel() + + kubeClient, err := utils.KubeClient(kubeconfig, kubecontext) + if err != nil { + return err + } + + if err := upsertSecret(ctx, kubeClient, secret); err != nil { + return err + } + logger.Actionf("secret '%s' created in '%s' namespace", name, namespace) + + return nil +} diff --git a/cmd/flux/create_source_git.go b/cmd/flux/create_source_git.go index dd435a52..8c8c4a8f 100644 --- a/cmd/flux/create_source_git.go +++ b/cmd/flux/create_source_git.go @@ -23,13 +23,7 @@ import ( "io/ioutil" "net/url" "os" - "time" - "github.com/fluxcd/flux2/internal/flags" - "github.com/fluxcd/flux2/internal/utils" - "github.com/fluxcd/pkg/apis/meta" - - sourcev1 "github.com/fluxcd/source-controller/api/v1beta1" "github.com/manifoldco/promptui" "github.com/spf13/cobra" corev1 "k8s.io/api/core/v1" @@ -40,7 +34,10 @@ import ( "k8s.io/apimachinery/pkg/util/wait" "sigs.k8s.io/controller-runtime/pkg/client" - "github.com/fluxcd/pkg/ssh" + "github.com/fluxcd/flux2/internal/flags" + "github.com/fluxcd/flux2/internal/utils" + "github.com/fluxcd/pkg/apis/meta" + sourcev1 "github.com/fluxcd/source-controller/api/v1beta1" ) var createSourceGitCmd = &cobra.Command{ @@ -195,7 +192,7 @@ func createSourceGitCmdRun(cmd *cobra.Command, args []string) error { withAuth = true } else if u.Scheme == "ssh" { logger.Generatef("generating deploy key pair") - pair, err := generateKeyPair(ctx) + pair, err := generateKeyPair(ctx, sourceGitKeyAlgorithm, sourceGitRSABits, sourceGitECDSACurve) if err != nil { return err } @@ -288,63 +285,6 @@ func createSourceGitCmdRun(cmd *cobra.Command, args []string) error { return nil } -func generateKeyPair(ctx context.Context) (*ssh.KeyPair, error) { - var keyGen ssh.KeyPairGenerator - switch algorithm := sourceGitKeyAlgorithm.String(); algorithm { - case "rsa": - keyGen = ssh.NewRSAGenerator(int(sourceGitRSABits)) - case "ecdsa": - keyGen = ssh.NewECDSAGenerator(sourceGitECDSACurve.Curve) - case "ed25519": - keyGen = ssh.NewEd25519Generator() - default: - return nil, fmt.Errorf("unsupported public key algorithm: %s", algorithm) - } - pair, err := keyGen.Generate() - if err != nil { - return nil, fmt.Errorf("key pair generation failed, error: %w", err) - } - return pair, nil -} - -func scanHostKey(ctx context.Context, url *url.URL) ([]byte, error) { - host := url.Host - if url.Port() == "" { - host = host + ":22" - } - hostKey, err := ssh.ScanHostKey(host, 30*time.Second) - if err != nil { - return nil, fmt.Errorf("SSH key scan for host %s failed, error: %w", host, err) - } - return hostKey, nil -} - -func upsertSecret(ctx context.Context, kubeClient client.Client, secret corev1.Secret) error { - namespacedName := types.NamespacedName{ - Namespace: secret.GetNamespace(), - Name: secret.GetName(), - } - - var existing corev1.Secret - err := kubeClient.Get(ctx, namespacedName, &existing) - if err != nil { - if errors.IsNotFound(err) { - if err := kubeClient.Create(ctx, &secret); err != nil { - return err - } else { - return nil - } - } - return err - } - - existing.StringData = secret.StringData - if err := kubeClient.Update(ctx, &existing); err != nil { - return err - } - return nil -} - func upsertGitRepository(ctx context.Context, kubeClient client.Client, gitRepository *sourcev1.GitRepository) (types.NamespacedName, error) { namespacedName := types.NamespacedName{ diff --git a/cmd/flux/delete.go b/cmd/flux/delete.go index ae6e3d31..d03ea43a 100644 --- a/cmd/flux/delete.go +++ b/cmd/flux/delete.go @@ -68,7 +68,7 @@ func (del deleteCommand) run(cmd *cobra.Command, args []string) error { Name: name, } - err = kubeClient.Get(ctx, namespacedName, del.object.asRuntimeObject()) + err = kubeClient.Get(ctx, namespacedName, del.object.asClientObject()) if err != nil { return err } @@ -84,7 +84,7 @@ func (del deleteCommand) run(cmd *cobra.Command, args []string) error { } logger.Actionf("deleting %s %s in %s namespace", del.humanKind, name, namespace) - err = kubeClient.Delete(ctx, del.object.asRuntimeObject()) + err = kubeClient.Delete(ctx, del.object.asClientObject()) if err != nil { return err } diff --git a/cmd/flux/export.go b/cmd/flux/export.go index 4a546369..ec475306 100644 --- a/cmd/flux/export.go +++ b/cmd/flux/export.go @@ -55,8 +55,7 @@ type exportable interface { // exportableList represents a type that has a list of values, each of // which is exportable. type exportableList interface { - adapter - len() int + listAdapter exportItem(i int) interface{} } @@ -79,7 +78,7 @@ func (export exportCommand) run(cmd *cobra.Command, args []string) error { } if exportAll { - err = kubeClient.List(ctx, export.list.asRuntimeObject(), client.InNamespace(namespace)) + err = kubeClient.List(ctx, export.list.asClientList(), client.InNamespace(namespace)) if err != nil { return err } @@ -100,7 +99,7 @@ func (export exportCommand) run(cmd *cobra.Command, args []string) error { Namespace: namespace, Name: name, } - err = kubeClient.Get(ctx, namespacedName, export.object.asRuntimeObject()) + err = kubeClient.Get(ctx, namespacedName, export.object.asClientObject()) if err != nil { return err } diff --git a/cmd/flux/get.go b/cmd/flux/get.go index f989e689..580d807b 100644 --- a/cmd/flux/get.go +++ b/cmd/flux/get.go @@ -45,8 +45,7 @@ func init() { } type summarisable interface { - adapter - len() int + listAdapter summariseItem(i int, includeNamespace bool) []string headers(includeNamespace bool) []string } @@ -87,7 +86,7 @@ func (get getCommand) run(cmd *cobra.Command, args []string) error { if !allNamespaces { listOpts = append(listOpts, client.InNamespace(namespace)) } - err = kubeClient.List(ctx, get.list.asRuntimeObject(), listOpts...) + err = kubeClient.List(ctx, get.list.asClientList(), listOpts...) if err != nil { return err } diff --git a/cmd/flux/image.go b/cmd/flux/image.go index ed307ae2..4bf6e57b 100644 --- a/cmd/flux/image.go +++ b/cmd/flux/image.go @@ -17,7 +17,7 @@ limitations under the License. package main import ( - "k8s.io/apimachinery/pkg/runtime" + "sigs.k8s.io/controller-runtime/pkg/client" autov1 "github.com/fluxcd/image-automation-controller/api/v1alpha1" imagev1 "github.com/fluxcd/image-reflector-controller/api/v1alpha1" @@ -38,7 +38,7 @@ type imageRepositoryAdapter struct { *imagev1.ImageRepository } -func (a imageRepositoryAdapter) asRuntimeObject() runtime.Object { +func (a imageRepositoryAdapter) asClientObject() client.Object { return a.ImageRepository } @@ -48,7 +48,7 @@ type imageRepositoryListAdapter struct { *imagev1.ImageRepositoryList } -func (a imageRepositoryListAdapter) asRuntimeObject() runtime.Object { +func (a imageRepositoryListAdapter) asClientList() client.ObjectList { return a.ImageRepositoryList } @@ -67,7 +67,7 @@ type imagePolicyAdapter struct { *imagev1.ImagePolicy } -func (a imagePolicyAdapter) asRuntimeObject() runtime.Object { +func (a imagePolicyAdapter) asClientObject() client.Object { return a.ImagePolicy } @@ -77,7 +77,7 @@ type imagePolicyListAdapter struct { *imagev1.ImagePolicyList } -func (a imagePolicyListAdapter) asRuntimeObject() runtime.Object { +func (a imagePolicyListAdapter) asClientList() client.ObjectList { return a.ImagePolicyList } @@ -96,7 +96,7 @@ type imageUpdateAutomationAdapter struct { *autov1.ImageUpdateAutomation } -func (a imageUpdateAutomationAdapter) asRuntimeObject() runtime.Object { +func (a imageUpdateAutomationAdapter) asClientObject() client.Object { return a.ImageUpdateAutomation } @@ -106,7 +106,7 @@ type imageUpdateAutomationListAdapter struct { *autov1.ImageUpdateAutomationList } -func (a imageUpdateAutomationListAdapter) asRuntimeObject() runtime.Object { +func (a imageUpdateAutomationListAdapter) asClientList() client.ObjectList { return a.ImageUpdateAutomationList } diff --git a/cmd/flux/install.go b/cmd/flux/install.go index ad96d883..89ec0795 100644 --- a/cmd/flux/install.go +++ b/cmd/flux/install.go @@ -62,7 +62,7 @@ var ( installImagePullSecret string installWatchAllNamespaces bool installNetworkPolicy bool - installArch = flags.Arch(defaults.Arch) + installArch flags.Arch installLogLevel = flags.LogLevel(defaults.LogLevel) installClusterDomain string ) @@ -79,7 +79,6 @@ func init() { installCmd.Flags().StringSliceVar(&installExtraComponents, "components-extra", nil, "list of components in addition to those supplied or defaulted, accepts comma-separated values") installCmd.Flags().StringVar(&installManifestsPath, "manifests", "", "path to the manifest directory") - installCmd.Flags().MarkHidden("manifests") installCmd.Flags().StringVar(&installRegistry, "registry", defaults.Registry, "container registry where the toolkit images are published") installCmd.Flags().StringVar(&installImagePullSecret, "image-pull-secret", "", @@ -91,6 +90,8 @@ func init() { installCmd.Flags().BoolVar(&installNetworkPolicy, "network-policy", defaults.NetworkPolicy, "deny ingress access to the toolkit controllers from other namespaces using network policies") installCmd.Flags().StringVar(&installClusterDomain, "cluster-domain", defaults.ClusterDomain, "internal cluster domain") + installCmd.Flags().MarkHidden("manifests") + installCmd.Flags().MarkDeprecated("arch", "multi-arch container image is now available for AMD64, ARMv7 and ARM64") rootCmd.AddCommand(installCmd) } @@ -110,6 +111,10 @@ func installCmdRun(cmd *cobra.Command, args []string) error { components := append(installDefaultComponents, installExtraComponents...) + if err := utils.ValidateComponents(components); err != nil { + return err + } + opts := install.Options{ BaseURL: installManifestsPath, Version: installVersion, @@ -117,7 +122,6 @@ func installCmdRun(cmd *cobra.Command, args []string) error { Components: components, Registry: installRegistry, ImagePullSecret: installImagePullSecret, - Arch: installArch.String(), WatchAllNamespaces: installWatchAllNamespaces, NetworkPolicy: installNetworkPolicy, LogLevel: installLogLevel.String(), diff --git a/cmd/flux/object.go b/cmd/flux/object.go index 4b884e35..39998167 100644 --- a/cmd/flux/object.go +++ b/cmd/flux/object.go @@ -17,7 +17,7 @@ limitations under the License. package main import ( - "k8s.io/apimachinery/pkg/runtime" + "sigs.k8s.io/controller-runtime/pkg/client" ) // Most commands need one or both of the kind (e.g., @@ -35,16 +35,24 @@ type apiType struct { // use values of the wrapper with `client.Client`, which only deals // with types that have been added to the schema. type adapter interface { - asRuntimeObject() runtime.Object + asClientObject() client.Object } -// universalAdapter is an adapter for any runtime.Object. Use this if +// listAdapater is the analogue to adapter, but for lists; the +// controller runtime distinguishes between methods dealing with +// objects and lists. +type listAdapter interface { + asClientList() client.ObjectList + len() int +} + +// universalAdapter is an adapter for any client.Object. Use this if // there are no other methods needed. type universalAdapter struct { - obj runtime.Object + obj client.Object } -func (c universalAdapter) asRuntimeObject() runtime.Object { +func (c universalAdapter) asClientObject() client.Object { return c.obj } diff --git a/cmd/flux/reconcile.go b/cmd/flux/reconcile.go index 3418e789..25a5e0cf 100644 --- a/cmd/flux/reconcile.go +++ b/cmd/flux/reconcile.go @@ -82,7 +82,7 @@ func (reconcile reconcileCommand) run(cmd *cobra.Command, args []string) error { Name: name, } - err = kubeClient.Get(ctx, namespacedName, reconcile.object.asRuntimeObject()) + err = kubeClient.Get(ctx, namespacedName, reconcile.object.asClientObject()) if err != nil { return err } @@ -115,7 +115,7 @@ func (reconcile reconcileCommand) run(cmd *cobra.Command, args []string) error { func reconciliationHandled(ctx context.Context, kubeClient client.Client, namespacedName types.NamespacedName, obj reconcilable, lastHandledReconcileAt string) wait.ConditionFunc { return func() (bool, error) { - err := kubeClient.Get(ctx, namespacedName, obj.asRuntimeObject()) + err := kubeClient.Get(ctx, namespacedName, obj.asClientObject()) if err != nil { return false, err } @@ -126,17 +126,17 @@ func reconciliationHandled(ctx context.Context, kubeClient client.Client, func requestReconciliation(ctx context.Context, kubeClient client.Client, namespacedName types.NamespacedName, obj reconcilable) error { return retry.RetryOnConflict(retry.DefaultBackoff, func() (err error) { - if err := kubeClient.Get(ctx, namespacedName, obj.asRuntimeObject()); err != nil { + if err := kubeClient.Get(ctx, namespacedName, obj.asClientObject()); err != nil { return err } if ann := obj.GetAnnotations(); ann == nil { obj.SetAnnotations(map[string]string{ - meta.ReconcileAtAnnotation: time.Now().Format(time.RFC3339Nano), + meta.ReconcileRequestAnnotation: time.Now().Format(time.RFC3339Nano), }) } else { - ann[meta.ReconcileAtAnnotation] = time.Now().Format(time.RFC3339Nano) + ann[meta.ReconcileRequestAnnotation] = time.Now().Format(time.RFC3339Nano) obj.SetAnnotations(ann) } - return kubeClient.Update(ctx, obj.asRuntimeObject()) + return kubeClient.Update(ctx, obj.asClientObject()) }) } diff --git a/cmd/flux/reconcile_alert.go b/cmd/flux/reconcile_alert.go index d5acf204..f37ed870 100644 --- a/cmd/flux/reconcile_alert.go +++ b/cmd/flux/reconcile_alert.go @@ -77,10 +77,10 @@ func reconcileAlertCmdRun(cmd *cobra.Command, args []string) error { logger.Actionf("annotating Alert %s in %s namespace", name, namespace) if alert.Annotations == nil { alert.Annotations = map[string]string{ - meta.ReconcileAtAnnotation: time.Now().Format(time.RFC3339Nano), + meta.ReconcileRequestAnnotation: time.Now().Format(time.RFC3339Nano), } } else { - alert.Annotations[meta.ReconcileAtAnnotation] = time.Now().Format(time.RFC3339Nano) + alert.Annotations[meta.ReconcileRequestAnnotation] = time.Now().Format(time.RFC3339Nano) } if err := kubeClient.Update(ctx, &alert); err != nil { diff --git a/cmd/flux/reconcile_alertprovider.go b/cmd/flux/reconcile_alertprovider.go index 3b76bf00..67f12cd0 100644 --- a/cmd/flux/reconcile_alertprovider.go +++ b/cmd/flux/reconcile_alertprovider.go @@ -73,10 +73,10 @@ func reconcileAlertProviderCmdRun(cmd *cobra.Command, args []string) error { if alertProvider.Annotations == nil { alertProvider.Annotations = map[string]string{ - meta.ReconcileAtAnnotation: time.Now().Format(time.RFC3339Nano), + meta.ReconcileRequestAnnotation: time.Now().Format(time.RFC3339Nano), } } else { - alertProvider.Annotations[meta.ReconcileAtAnnotation] = time.Now().Format(time.RFC3339Nano) + alertProvider.Annotations[meta.ReconcileRequestAnnotation] = time.Now().Format(time.RFC3339Nano) } if err := kubeClient.Update(ctx, &alertProvider); err != nil { return err diff --git a/cmd/flux/reconcile_helmrelease.go b/cmd/flux/reconcile_helmrelease.go index 80c8c575..edbb3671 100644 --- a/cmd/flux/reconcile_helmrelease.go +++ b/cmd/flux/reconcile_helmrelease.go @@ -153,10 +153,10 @@ func requestHelmReleaseReconciliation(ctx context.Context, kubeClient client.Cli } if helmRelease.Annotations == nil { helmRelease.Annotations = map[string]string{ - meta.ReconcileAtAnnotation: time.Now().Format(time.RFC3339Nano), + meta.ReconcileRequestAnnotation: time.Now().Format(time.RFC3339Nano), } } else { - helmRelease.Annotations[meta.ReconcileAtAnnotation] = time.Now().Format(time.RFC3339Nano) + helmRelease.Annotations[meta.ReconcileRequestAnnotation] = time.Now().Format(time.RFC3339Nano) } return kubeClient.Update(ctx, helmRelease) }) diff --git a/cmd/flux/reconcile_kustomization.go b/cmd/flux/reconcile_kustomization.go index 109096a3..b543ed4d 100644 --- a/cmd/flux/reconcile_kustomization.go +++ b/cmd/flux/reconcile_kustomization.go @@ -142,10 +142,10 @@ func requestKustomizeReconciliation(ctx context.Context, kubeClient client.Clien } if kustomization.Annotations == nil { kustomization.Annotations = map[string]string{ - meta.ReconcileAtAnnotation: time.Now().Format(time.RFC3339Nano), + meta.ReconcileRequestAnnotation: time.Now().Format(time.RFC3339Nano), } } else { - kustomization.Annotations[meta.ReconcileAtAnnotation] = time.Now().Format(time.RFC3339Nano) + kustomization.Annotations[meta.ReconcileRequestAnnotation] = time.Now().Format(time.RFC3339Nano) } return kubeClient.Update(ctx, kustomization) }) diff --git a/cmd/flux/reconcile_receiver.go b/cmd/flux/reconcile_receiver.go index f89da3dc..b26b55f2 100644 --- a/cmd/flux/reconcile_receiver.go +++ b/cmd/flux/reconcile_receiver.go @@ -77,10 +77,10 @@ func reconcileReceiverCmdRun(cmd *cobra.Command, args []string) error { logger.Actionf("annotating Receiver %s in %s namespace", name, namespace) if receiver.Annotations == nil { receiver.Annotations = map[string]string{ - meta.ReconcileAtAnnotation: time.Now().Format(time.RFC3339Nano), + meta.ReconcileRequestAnnotation: time.Now().Format(time.RFC3339Nano), } } else { - receiver.Annotations[meta.ReconcileAtAnnotation] = time.Now().Format(time.RFC3339Nano) + receiver.Annotations[meta.ReconcileRequestAnnotation] = time.Now().Format(time.RFC3339Nano) } if err := kubeClient.Update(ctx, &receiver); err != nil { return err diff --git a/cmd/flux/reconcile_source_bucket.go b/cmd/flux/reconcile_source_bucket.go index 2c20598e..22928927 100644 --- a/cmd/flux/reconcile_source_bucket.go +++ b/cmd/flux/reconcile_source_bucket.go @@ -145,10 +145,10 @@ func requestBucketReconciliation(ctx context.Context, kubeClient client.Client, } if bucket.Annotations == nil { bucket.Annotations = map[string]string{ - meta.ReconcileAtAnnotation: time.Now().Format(time.RFC3339Nano), + meta.ReconcileRequestAnnotation: time.Now().Format(time.RFC3339Nano), } } else { - bucket.Annotations[meta.ReconcileAtAnnotation] = time.Now().Format(time.RFC3339Nano) + bucket.Annotations[meta.ReconcileRequestAnnotation] = time.Now().Format(time.RFC3339Nano) } return kubeClient.Update(ctx, bucket) }) diff --git a/cmd/flux/reconcile_source_git.go b/cmd/flux/reconcile_source_git.go index d6dfcd8e..b5e54e75 100644 --- a/cmd/flux/reconcile_source_git.go +++ b/cmd/flux/reconcile_source_git.go @@ -116,10 +116,10 @@ func requestGitRepositoryReconciliation(ctx context.Context, kubeClient client.C } if repository.Annotations == nil { repository.Annotations = map[string]string{ - meta.ReconcileAtAnnotation: time.Now().Format(time.RFC3339Nano), + meta.ReconcileRequestAnnotation: time.Now().Format(time.RFC3339Nano), } } else { - repository.Annotations[meta.ReconcileAtAnnotation] = time.Now().Format(time.RFC3339Nano) + repository.Annotations[meta.ReconcileRequestAnnotation] = time.Now().Format(time.RFC3339Nano) } return kubeClient.Update(ctx, repository) }) diff --git a/cmd/flux/reconcile_source_helm.go b/cmd/flux/reconcile_source_helm.go index 782afcba..4e52d172 100644 --- a/cmd/flux/reconcile_source_helm.go +++ b/cmd/flux/reconcile_source_helm.go @@ -117,10 +117,10 @@ func requestHelmRepositoryReconciliation(ctx context.Context, kubeClient client. } if repository.Annotations == nil { repository.Annotations = map[string]string{ - meta.ReconcileAtAnnotation: time.Now().Format(time.RFC3339Nano), + meta.ReconcileRequestAnnotation: time.Now().Format(time.RFC3339Nano), } } else { - repository.Annotations[meta.ReconcileAtAnnotation] = time.Now().Format(time.RFC3339Nano) + repository.Annotations[meta.ReconcileRequestAnnotation] = time.Now().Format(time.RFC3339Nano) } return kubeClient.Update(ctx, repository) }) diff --git a/cmd/flux/resume.go b/cmd/flux/resume.go index f1688a7a..35522456 100644 --- a/cmd/flux/resume.go +++ b/cmd/flux/resume.go @@ -68,14 +68,14 @@ func (resume resumeCommand) run(cmd *cobra.Command, args []string) error { Name: name, } - err = kubeClient.Get(ctx, namespacedName, resume.object.asRuntimeObject()) + err = kubeClient.Get(ctx, namespacedName, resume.object.asClientObject()) if err != nil { return err } logger.Actionf("resuming %s %s in %s namespace", resume.humanKind, name, namespace) resume.object.setUnsuspended() - if err := kubeClient.Update(ctx, resume.object.asRuntimeObject()); err != nil { + if err := kubeClient.Update(ctx, resume.object.asClientObject()); err != nil { return err } logger.Successf("%s resumed", resume.humanKind) diff --git a/cmd/flux/status.go b/cmd/flux/status.go index f9dc7615..1e421e3e 100644 --- a/cmd/flux/status.go +++ b/cmd/flux/status.go @@ -42,7 +42,7 @@ type statusable interface { func isReady(ctx context.Context, kubeClient client.Client, namespacedName types.NamespacedName, object statusable) wait.ConditionFunc { return func() (bool, error) { - err := kubeClient.Get(ctx, namespacedName, object.asRuntimeObject()) + err := kubeClient.Get(ctx, namespacedName, object.asClientObject()) if err != nil { return false, err } diff --git a/cmd/flux/suspend.go b/cmd/flux/suspend.go index 5e6a9f34..89a661bf 100644 --- a/cmd/flux/suspend.go +++ b/cmd/flux/suspend.go @@ -65,14 +65,14 @@ func (suspend suspendCommand) run(cmd *cobra.Command, args []string) error { Namespace: namespace, Name: name, } - err = kubeClient.Get(ctx, namespacedName, suspend.object.asRuntimeObject()) + err = kubeClient.Get(ctx, namespacedName, suspend.object.asClientObject()) if err != nil { return err } logger.Actionf("suspending %s %s in %s namespace", suspend.humanKind, name, namespace) suspend.object.setSuspended() - if err := kubeClient.Update(ctx, suspend.object.asRuntimeObject()); err != nil { + if err := kubeClient.Update(ctx, suspend.object.asClientObject()); err != nil { return err } logger.Successf("%s suspended", suspend.humanKind) diff --git a/docs/_files/commit-status-flow.png b/docs/_files/commit-status-flow.png new file mode 100644 index 00000000..e30fc6fc Binary files /dev/null and b/docs/_files/commit-status-flow.png differ diff --git a/docs/_files/commit-status-github-failure.png b/docs/_files/commit-status-github-failure.png new file mode 100644 index 00000000..09e92464 Binary files /dev/null and b/docs/_files/commit-status-github-failure.png differ diff --git a/docs/_files/commit-status-github-overview.png b/docs/_files/commit-status-github-overview.png new file mode 100644 index 00000000..898d86b5 Binary files /dev/null and b/docs/_files/commit-status-github-overview.png differ diff --git a/docs/_files/commit-status-github-success.png b/docs/_files/commit-status-github-success.png new file mode 100644 index 00000000..17cf5fd1 Binary files /dev/null and b/docs/_files/commit-status-github-success.png differ diff --git a/docs/_files/commit-status-gitlab-failure.png b/docs/_files/commit-status-gitlab-failure.png new file mode 100644 index 00000000..a0ba2f99 Binary files /dev/null and b/docs/_files/commit-status-gitlab-failure.png differ diff --git a/docs/_files/commit-status-gitlab-success.png b/docs/_files/commit-status-gitlab-success.png new file mode 100644 index 00000000..dcbb844a Binary files /dev/null and b/docs/_files/commit-status-gitlab-success.png differ diff --git a/docs/_files/github-commit-status.png b/docs/_files/github-commit-status.png deleted file mode 100644 index 65129f35..00000000 Binary files a/docs/_files/github-commit-status.png and /dev/null differ diff --git a/docs/_files/gitlab-commit-status.png b/docs/_files/gitlab-commit-status.png deleted file mode 100644 index 9319725f..00000000 Binary files a/docs/_files/gitlab-commit-status.png and /dev/null differ diff --git a/docs/cmd/flux_bootstrap.md b/docs/cmd/flux_bootstrap.md index 7d180c5f..465edd96 100644 --- a/docs/cmd/flux_bootstrap.md +++ b/docs/cmd/flux_bootstrap.md @@ -9,7 +9,6 @@ The bootstrap sub-commands bootstrap the toolkit components on the targeted Git ### Options ``` - --arch arch cluster architecture, available options are: (amd64, arm, arm64) (default amd64) --branch string default branch (for GitHub this must match the default branch setting for the organization) (default "main") --cluster-domain string internal cluster domain (default "cluster.local") --components strings list of components, accepts comma-separated values (default [source-controller,kustomize-controller,helm-controller,notification-controller]) diff --git a/docs/cmd/flux_bootstrap_github.md b/docs/cmd/flux_bootstrap_github.md index 2836d346..54c2fa67 100644 --- a/docs/cmd/flux_bootstrap_github.md +++ b/docs/cmd/flux_bootstrap_github.md @@ -30,7 +30,7 @@ flux bootstrap github [flags] flux bootstrap github --owner= --repository= --path=dev-cluster # Run bootstrap for a public repository on a personal account - flux bootstrap github --owner= --repository= --private=false --personal=true + flux bootstrap github --owner= --repository= --private=false --personal=true # Run bootstrap for a private repo hosted on GitHub Enterprise using SSH auth flux bootstrap github --owner= --repository= --hostname= --ssh-hostname= @@ -61,7 +61,6 @@ flux bootstrap github [flags] ### Options inherited from parent commands ``` - --arch arch cluster architecture, available options are: (amd64, arm, arm64) (default amd64) --branch string default branch (for GitHub this must match the default branch setting for the organization) (default "main") --cluster-domain string internal cluster domain (default "cluster.local") --components strings list of components, accepts comma-separated values (default [source-controller,kustomize-controller,helm-controller,notification-controller]) diff --git a/docs/cmd/flux_bootstrap_gitlab.md b/docs/cmd/flux_bootstrap_gitlab.md index 399c8370..a718b648 100644 --- a/docs/cmd/flux_bootstrap_gitlab.md +++ b/docs/cmd/flux_bootstrap_gitlab.md @@ -20,7 +20,7 @@ flux bootstrap gitlab [flags] # Create a GitLab API token and export it as an env var export GITLAB_TOKEN= - # Run bootstrap for a private repo using HTTPS token authentication + # Run bootstrap for a private repo using HTTPS token authentication flux bootstrap gitlab --owner= --repository= --token-auth # Run bootstrap for a private repo using SSH authentication @@ -32,7 +32,7 @@ flux bootstrap gitlab [flags] # Run bootstrap for a public repository on a personal account flux bootstrap gitlab --owner= --repository= --private=false --personal --token-auth - # Run bootstrap for a private repo hosted on a GitLab server + # Run bootstrap for a private repo hosted on a GitLab server flux bootstrap gitlab --owner= --repository= --hostname= --token-auth # Run bootstrap for a an existing repository with a branch named main @@ -57,7 +57,6 @@ flux bootstrap gitlab [flags] ### Options inherited from parent commands ``` - --arch arch cluster architecture, available options are: (amd64, arm, arm64) (default amd64) --branch string default branch (for GitHub this must match the default branch setting for the organization) (default "main") --cluster-domain string internal cluster domain (default "cluster.local") --components strings list of components, accepts comma-separated values (default [source-controller,kustomize-controller,helm-controller,notification-controller]) diff --git a/docs/cmd/flux_create_image_policy.md b/docs/cmd/flux_create_image_policy.md index c311ed16..5a9db5f6 100644 --- a/docs/cmd/flux_create_image_policy.md +++ b/docs/cmd/flux_create_image_policy.md @@ -18,9 +18,10 @@ flux create image policy [flags] ### Options ``` - -h, --help help for policy - --image-ref string the name of an image repository object - --semver string a semver range to apply to tags; e.g., '1.x' + --filter-regex string regular expression pattern used to filter the image tags + -h, --help help for policy + --image-ref string the name of an image repository object + --semver string a semver range to apply to tags; e.g., '1.x' ``` ### Options inherited from parent commands diff --git a/docs/cmd/flux_create_image_update.md b/docs/cmd/flux_create_image_update.md index 7d96fa74..c5ea5140 100644 --- a/docs/cmd/flux_create_image_update.md +++ b/docs/cmd/flux_create_image_update.md @@ -17,7 +17,7 @@ flux create image update [flags] ``` --author-email string the email to use for commit author --author-name string the name to use for commit author - --branch string the branch to push commits to + --branch string the branch to checkout and push commits to --commit-template string a template for commit messages --git-repo-ref string the name of a GitRepository resource with details of the upstream git repository -h, --help help for update diff --git a/docs/cmd/flux_create_secret.md b/docs/cmd/flux_create_secret.md index 44c87f45..791bd8b4 100644 --- a/docs/cmd/flux_create_secret.md +++ b/docs/cmd/flux_create_secret.md @@ -29,4 +29,5 @@ The create source sub-commands generate Kubernetes secrets specific to Flux. * [flux create](flux_create.md) - Create or update sources and resources * [flux create secret git](flux_create_secret_git.md) - Create or update a Kubernetes secret for Git authentication +* [flux create secret helm](flux_create_secret_helm.md) - Create or update a Kubernetes secret for Helm repository authentication diff --git a/docs/cmd/flux_create_secret_git.md b/docs/cmd/flux_create_secret_git.md index f5ef66ea..09eb6fcf 100644 --- a/docs/cmd/flux_create_secret_git.md +++ b/docs/cmd/flux_create_secret_git.md @@ -32,7 +32,7 @@ flux create secret git [name] [flags] # Create a Git SSH secret on disk and print the deploy key flux create secret git podinfo-auth \ --url=ssh://git@github.com/stefanprodan/podinfo \ - --export > podinfo-auth.yaml + --export > podinfo-auth.yaml yq read podinfo-auth.yaml 'data."identity.pub"' | base64 --decode @@ -40,7 +40,7 @@ flux create secret git [name] [flags] flux create secret git podinfo-auth \ --namespace=apps \ --url=ssh://git@github.com/stefanprodan/podinfo \ - --export > podinfo-auth.yaml + --export > podinfo-auth.yaml sops --encrypt --encrypted-regex '^(data|stringData)$' \ --in-place podinfo-auth.yaml diff --git a/docs/cmd/flux_create_secret_helm.md b/docs/cmd/flux_create_secret_helm.md new file mode 100644 index 00000000..e01bad38 --- /dev/null +++ b/docs/cmd/flux_create_secret_helm.md @@ -0,0 +1,65 @@ +## flux create secret helm + +Create or update a Kubernetes secret for Helm repository authentication + +### Synopsis + + +The create secret helm command generates a Kubernetes secret with basic authentication credentials. + +``` +flux create secret helm [name] [flags] +``` + +### Examples + +``` + # Create a Helm authentication secret on disk and encrypt it with Mozilla SOPS + + flux create secret helm repo-auth \ + --namespace=my-namespace \ + --username=my-username \ + --password=my-password \ + --export > repo-auth.yaml + + sops --encrypt --encrypted-regex '^(data|stringData)$' \ + --in-place repo-auth.yaml + + # Create an authentication secret using a custom TLS cert + flux create secret helm repo-auth \ + --username=username \ + --password=password \ + --cert-file=./cert.crt \ + --key-file=./key.crt \ + --ca-file=./ca.crt + +``` + +### Options + +``` + --ca-file string TLS authentication CA file path + --cert-file string TLS authentication cert file path + -h, --help help for helm + --key-file string TLS authentication key file path + -p, --password string basic authentication password + -u, --username string basic authentication username +``` + +### Options inherited from parent commands + +``` + --context string kubernetes context to use + --export export in YAML format to stdout + --interval duration source sync interval (default 1m0s) + --kubeconfig string path to the kubeconfig file (default "~/.kube/config") + --label strings set labels on the resource (can specify multiple labels with commas: label1=value1,label2=value2) + -n, --namespace string the namespace scope for this operation (default "flux-system") + --timeout duration timeout for this operation (default 5m0s) + --verbose print generated objects +``` + +### SEE ALSO + +* [flux create secret](flux_create_secret.md) - Create or update Kubernetes secrets + diff --git a/docs/cmd/flux_install.md b/docs/cmd/flux_install.md index 6604ab9e..4765e8e0 100644 --- a/docs/cmd/flux_install.md +++ b/docs/cmd/flux_install.md @@ -31,7 +31,6 @@ flux install [flags] ### Options ``` - --arch arch cluster architecture, available options are: (amd64, arm, arm64) (default amd64) --cluster-domain string internal cluster domain (default "cluster.local") --components strings list of components, accepts comma-separated values (default [source-controller,kustomize-controller,helm-controller,notification-controller]) --components-extra strings list of components in addition to those supplied or defaulted, accepts comma-separated values diff --git a/docs/core-concepts/index.md b/docs/core-concepts/index.md new file mode 100644 index 00000000..1569924a --- /dev/null +++ b/docs/core-concepts/index.md @@ -0,0 +1,52 @@ +# Core Concepts + +!!! note "Work in progress" + This document is a work in progress. + +These are some core concepts in Flux. + +## GitOps + +GitOps is a way of managing your infrastructure and applications so that whole system is described declaratively and version controlled (most likely in a Git repository), and having an automated process that ensures that the deployed environment matches the state specified in a repository. + +For more information, take a look at ["What is GitOps?"](https://www.gitops.tech/#what-is-gitops). + +## Sources + +A *Source* defines the origin of a source and the requirements to obtain +it (e.g. credentials, version selectors). For example, the latest `1.x` tag +available from a Git repository over SSH. + +Sources produce an artifact that is consumed by other Flux elements to perform +actions, like applying the contents of the artifact on the cluster. A source +may be shared by multiple consumers to deduplicate configuration and/or storage. + +The origin of the source is checked for changes on a defined interval, if +there is a newer version available that matches the criteria, a new artifact +is produced. + +All sources are specified as Custom Resources in a Kubernetes cluster, examples +of sources are `GitRepository`, `HelmRepository` and `Bucket` resources. + +For more information, take a look at [the source controller documentation](../components/source/source.md). + +## Reconciliation + +Reconciliation refers to ensuring that a given state (e.g application running in the cluster, infrastructure) matches a desired state declaratively defined somewhere (e.g a git repository). There are various examples of these in flux e.g: + +- HelmRelease reconciliation: ensures the state of the Helm release matches what is defined in the resource, performs a release if this is not the case (including revision changes of a HelmChart resource). +- Bucket reconciliation: downloads and archives the contents of the declared bucket on a given interval and stores this as an artifact, records the observed revision of the artifact and the artifact itself in the status of resource. +- [Kustomization](#kustomization) reconciliation: ensures the state of the application deployed on a cluster matches resources contained in a git repository. + +## Kustomization + +The kustomization represents a local set of Kubernetes resources that Flux is supposed to reconcile in the cluster. The reconciliation runs every one minute by default but this can be specified in the kustomization. If you make any changes to the cluster using `kubectl edit` or `kubectl patch`, it will be promptly reverted. You either suspend the reconciliation or push your changes to a Git repository. + +For more information, take a look at [this documentation](../components/kustomize/kustomization.md). + +## Bootstrap + +The process of installing the Flux components in a complete GitOps way is called a bootstrap. The manifests are applied to the cluster, a `GitRepository` and `Kustomization` are created for the Flux components, and the manifests are pushed to an existing Git repository (or a new one is created). Flux can manage itself just as it manages other resources. +The bootstrap is done using the `flux` CLI `flux bootstrap`. + +For more information, take a look at [the documentation for the bootstrap command](../cmd/flux_bootstrap.md). diff --git a/docs/dev-guides/source-watcher.md b/docs/dev-guides/source-watcher.md index 00561ff1..46d05061 100644 --- a/docs/dev-guides/source-watcher.md +++ b/docs/dev-guides/source-watcher.md @@ -17,7 +17,7 @@ On your dev machine install the following tools: * kustomize >= 3.5 * docker >= 19.03 -## Install the GitOps Toolkit +## Install Flux Create a cluster for testing: @@ -25,7 +25,7 @@ Create a cluster for testing: kind create cluster --name dev ``` -Install the toolkit CLI: +Install the Flux CLI: ```sh curl -s https://toolkit.fluxcd.io/install.sh | sudo bash @@ -37,7 +37,7 @@ Verify that your dev machine satisfies the prerequisites with: flux check --pre ``` -Install the toolkit controllers on the dev cluster: +Install source-controller on the dev cluster: ```sh flux install @@ -45,13 +45,13 @@ flux install ## Clone the sample controller -You'll be using [stefanprodan/source-watcher](https://github.com/stefanprodan/source-watcher) as +You'll be using [fluxcd/source-watcher](https://github.com/fluxcd/source-watcher) as a template for developing your own controller. The source-watcher was scaffolded with `kubebuilder init`. -Clone the source-watcher repo: +Clone the source-watcher repository: ```sh -git clone https://github.com/stefanprodan/source-watcher +git clone https://github.com/fluxcd/source-watcher cd source-watcher ``` @@ -115,7 +115,7 @@ The source-controller reports the revision under `GitRepository.Status.Artifact. ## How it works -The [GitRepositoryWatcher](https://github.com/stefanprodan/source-watcher/blob/master/controllers/gitrepository_watcher.go) +The [GitRepositoryWatcher](https://github.com/fluxcd/source-watcher/blob/main/controllers/gitrepository_watcher.go) controller does the following: * subscribes to `GitRepository` events @@ -186,8 +186,8 @@ func (r *GitRepositoryWatcher) SetupWithManager(mgr ctrl.Manager) error { To add the watcher to an existing project, copy the controller and the revision change predicate to your `controllers` dir: -* [gitrepository_watcher.go](https://github.com/stefanprodan/source-watcher/blob/master/controllers/gitrepository_watcher.go) -* [gitrepository_predicate.go](https://github.com/stefanprodan/source-watcher/blob/master/controllers/gitrepository_predicate.go) +* [gitrepository_watcher.go](https://github.com/fluxcd/source-watcher/blob/main/controllers/gitrepository_watcher.go) +* [gitrepository_predicate.go](https://github.com/fluxcd/source-watcher/blob/main/controllers/gitrepository_predicate.go) In your `main.go` init function, register the Source API schema: @@ -224,9 +224,9 @@ Your `go.mod` should require controller-runtime v0.6 or newer: ```go require ( - k8s.io/apimachinery v0.18.4 - k8s.io/client-go v0.18.4 - sigs.k8s.io/controller-runtime v0.6.0 + k8s.io/apimachinery v0.19.4 + k8s.io/client-go v0.19.4 + sigs.k8s.io/controller-runtime v0.6.4 ) ``` diff --git a/docs/get-started/index.md b/docs/get-started/index.md index e9fe2598..398a9789 100644 --- a/docs/get-started/index.md +++ b/docs/get-started/index.md @@ -1,14 +1,24 @@ # Get started with Flux v2 +!!! note "Basic knowledge" + This guide assumes you have some understanding of the core concepts and have read the introduction to Flux. + The core concepts used in this guide are [GitOps](../core-concepts/index.md#gitops), + [Sources](../core-concepts/index.md#sources), [Kustomization](../core-concepts/index.md#kustomization). + +In this tutorial, you will deploy an application to a kubernetes cluster with Flux +and manage the cluster in a complete GitOps manner. +You'll be using a dedicated Git repository e.g. `fleet-infra` to manage your Kubernetes clusters. + ## Prerequisites -You will need two Kubernetes clusters version 1.16 or newer and kubectl version 1.18. +In order to follow the guide, you will need a Kubernetes cluster version 1.16 or newer and kubectl version 1.18. For a quick local test, you can use [Kubernetes kind](https://kind.sigs.k8s.io/docs/user/quick-start/). Any other Kubernetes setup will work as well though. -In order to follow the guide you'll need a GitHub account and a +Flux is installed in a GitOps way and its manifest will be pushed to the repository, +so you will also need a GitHub account and a [personal access token](https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line) -that can create repositories (check all permissions under `repo`). +that can create repositories (check all permissions under `repo`) to enable Flux do this. Export your GitHub personal access token and username: @@ -51,24 +61,13 @@ To configure your shell to load `flux` [bash completions](../cmd/flux_completion [`zsh`](../cmd/flux_completion_zsh.md), [`fish`](../cmd/flux_completion_fish.md), and [`powershell`](../cmd/flux_completion_powershell.md) are also supported with their own sub-commands. -## GitOps workflow - -You'll be using a dedicated Git repository e.g. `fleet-infra` to manage one or more Kubernetes clusters. -This guide assumes that you have two clusters, one for staging and one for production. - -Using the Flux CLI you'll do the following: - -- configure each cluster to synchronise with a directory inside the fleet repository -- register app sources (git repositories) that contain plain Kubernetes manifests or Kustomize overlays -- configure app deployments on both clusters (pre-releases on staging, semver releases on production) +## Install Flux components -## Staging bootstrap - -Create the staging cluster using Kubernetes kind or set the kubectl context to an existing cluster: +Create the cluster using Kubernetes kind or set the kubectl context to an existing cluster: ```sh -kind create cluster --name staging -kubectl cluster-info --context kind-staging +kind create cluster +kubectl cluster-info ``` Verify that your staging cluster satisfies the prerequisites with: @@ -88,17 +87,18 @@ flux bootstrap github \ --owner=$GITHUB_USER \ --repository=fleet-infra \ --branch=main \ - --path=staging-cluster \ + --path=./clusters/my-cluster \ --personal ``` -!!! hint "ARM" - When deploying to a Kubernetes cluster with ARM architecture, - you can use `--arch=arm` for ARMv7 32-bit container images - and `--arch=arm64` for ARMv8 64-bit container images. +!!! hint "Multi-arch images" + The component images are published as [multi-arch container images](https://docs.docker.com/docker-for-mac/multi-arch/) + with support for Linux `amd64`, `arm64` and `armv7` (e.g. 32bit Raspberry Pi) + architectures. -The bootstrap command creates a repository if one doesn't exist, and -commits the manifests for the Flux components to the default branch at the specified path. +The bootstrap command creates a repository if one doesn't exist, +commits the manifests for the Flux components to the default branch at the specified path, +and installs the Flux components. Then it configures the target cluster to synchronize with the specified path inside the repository. If you wish to create the repository under a GitHub organization: @@ -110,13 +110,13 @@ flux bootstrap github \ --branch= \ --team= \ --team= \ - --path=staging-cluster + --path=./clusters/my-cluster ``` Example output: ```console -$ flux bootstrap github --owner=gitopsrun --repository=fleet-infra --path=staging-cluster --team=devs +$ flux bootstrap github --owner=gitopsrun --team=devs --repository=fleet-infra --path=./clusters/my-cluster ► connecting to github.com ✔ repository created ✔ devs team access granted @@ -138,7 +138,8 @@ deployment "notification-controller" successfully rolled out ✔ bootstrap finished ``` -If you prefer GitLab, export `GITLAB_TOKEN` env var and use the command [flux bootstrap gitlab](../cmd/flux_bootstrap_gitlab.md). +If you prefer GitLab, export `GITLAB_TOKEN` env var and +use the command [flux bootstrap gitlab](../guides/installation.md#gitlab-and-gitlab-enterprise). !!! hint "Idempotency" It is safe to run the bootstrap command as many times as you want. @@ -147,225 +148,152 @@ If you prefer GitLab, export `GITLAB_TOKEN` env var and use the command [flux bo You can target a specific Flux [version](https://github.com/fluxcd/flux2/releases) with `flux bootstrap --version=`. -## Staging workflow +## Clone the git repository + +We are going to drive app deployments in a GitOps manner, +using the Git repository as the desired state for our cluster. +Instead of applying the manifests directly to the cluster, +Flux will apply it for us instead. -Clone the repository with: +Therefore, we need to clone the repository to our local machine: ```sh git clone https://github.com/$GITHUB_USER/fleet-infra cd fleet-infra ``` -Create a git source pointing to a public repository master branch: +## Add podinfo repository to Flux + +We will be using a public repository [github.com/stefanprodan/podinfo](https://github.com/stefanprodan/podinfo), +podinfo is a tiny web application made with Go. + +Create a [GitRepository](../components/source/gitrepositories/) +manifest pointing to podinfo repository's master branch: ```sh -flux create source git webapp \ +flux create source git podinfo \ --url=https://github.com/stefanprodan/podinfo \ --branch=master \ --interval=30s \ - --export > ./staging-cluster/webapp-source.yaml + --export > ./clusters/my-cluster/podinfo-source.yaml ``` -Create a kustomization for synchronizing the common manifests on the cluster: - -```sh -flux create kustomization webapp-common \ - --source=webapp \ - --path="./deploy/webapp/common" \ - --prune=true \ - --validation=client \ - --interval=1h \ - --export > ./staging-cluster/webapp-common.yaml +The above command generates the following manifest: + +```yaml +apiVersion: source.toolkit.fluxcd.io/v1beta1 +kind: GitRepository +metadata: + name: podinfo + namespace: flux-system +spec: + interval: 30s + ref: + branch: master + url: https://github.com/stefanprodan/podinfo ``` -Create a kustomization for the backend service that depends on common: +Commit and push it to the `fleet-infra` repository: ```sh -flux create kustomization webapp-backend \ - --depends-on=webapp-common \ - --source=webapp \ - --path="./deploy/webapp/backend" \ - --prune=true \ - --validation=client \ - --interval=10m \ - --health-check="Deployment/backend.webapp" \ - --health-check-timeout=2m \ - --export > ./staging-cluster/webapp-backend.yaml +git add -A && git commit -m "Add podinfo GitRepository" +git push ``` -Create a kustomization for the frontend service that depends on backend: +## Deploy podinfo application + +We will create a Flux [Kustomization](../components/kustomize/kustomization/) manifest for podinfo. +This configures Flux to build and apply the [kustomize](https://github.com/stefanprodan/podinfo/tree/master/kustomize) +directory located in the podinfo repository. ```sh -flux create kustomization webapp-frontend \ - --depends-on=webapp-backend \ - --source=webapp \ - --path="./deploy/webapp/frontend" \ +flux create kustomization podinfo \ + --source=podinfo \ + --path="./kustomize" \ --prune=true \ --validation=client \ - --interval=10m \ - --health-check="Deployment/frontend.webapp" \ - --health-check-timeout=2m \ - --export > ./staging-cluster/webapp-frontend.yaml -``` - -Push changes to origin: - -```sh -git add -A && git commit -m "add staging webapp" && git push + --interval=5m \ + --export > ./clusters/my-cluster/podinfo-kustomization.yaml ``` -In about 30s the synchronization should start: - -```console -$ watch flux get kustomizations -NAME READY MESSAGE -flux-system True Applied revision: main/6eea299fe9997c8561b826b67950afaf9a476cf8 -webapp-backend False dependency 'flux-system/webapp-common' is not ready -webapp-common True Applied revision: master/7411da595c25183daba255068814b83843fe3395 -webapp-frontend False dependency 'flux-system/webapp-backend' is not ready +The above command generates the following manifest: + +```yaml +apiVersion: kustomize.toolkit.fluxcd.io/v1beta1 +kind: Kustomization +metadata: + name: podinfo + namespace: flux-system +spec: + interval: 5m0s + path: ./kustomize + prune: true + sourceRef: + kind: GitRepository + name: podinfo + validation: client ``` -When the synchronization finishes you can check that the webapp services are running: - -```console -$ kubectl -n webapp get deployments,services -NAME READY UP-TO-DATE AVAILABLE AGE -deployment.apps/backend 1/1 1 1 4m1s -deployment.apps/frontend 1/1 1 1 3m31s - -NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE -service/backend ClusterIP 10.52.10.22 9898/TCP,9999/TCP 4m1s -service/frontend ClusterIP 10.52.9.85 80/TCP 3m31s -``` - -!!! tip - From this moment forward, any changes made to the webapp - Kubernetes manifests in the master branch will be synchronised with the staging cluster. - -If a Kubernetes manifest is removed from the webapp repository, the reconciler will remove it from your cluster. -If you delete a kustomization from the `fleet-infra` repo, the reconciler will remove all Kubernetes objects that -were previously applied from that kustomization. - -If you alter the webapp deployment using `kubectl edit`, the changes will be reverted to match -the state described in git. When dealing with an incident, you can pause the reconciliation of a -kustomization with `flux suspend kustomization `. Once the debugging session -is over, you can re-enable the reconciliation with `flux resume kustomization `. - -## Production bootstrap - -On production clusters, you may wish to deploy stable releases of an application. -When creating a git source instead of a branch, you can specify a git tag or a semver expression. - -Create the production cluster using Kubernetes kind or set the kubectl context to an existing cluster: +Commit and push the `Kustomization` manifest to the repository: ```sh -kind create cluster --name production -kubectl cluster-info --context kind-production +git add -A && git commit -m "Add podinfo Kustomization" +git push ``` -Run the bootstrap for the production environment: +The structure of your repository should look like this: -```sh -flux bootstrap github \ - --owner=$GITHUB_USER \ - --repository=fleet-infra \ - --path=prod-cluster \ - --personal -``` -Pull the changes locally: - -```sh -git pull ``` - -## Production workflow - -Create a git source using a semver range to target stable releases: - -```sh -flux create source git webapp \ - --url=https://github.com/stefanprodan/podinfo \ - --tag-semver=">=4.0.0 <4.0.2" \ - --interval=30s \ - --export > ./prod-cluster/webapp-source.yaml +fleet-infra +└── clusters/ + └── my-cluster/ + ├── flux-system/ + │ ├── gotk-components.yaml + │ ├── gotk-sync.yaml + │ └── kustomization.yaml + ├── podinfo-kustomization.yaml + └── podinfo-source.yaml ``` -Create a kustomization for webapp pointing to the production overlay: - -```sh -flux create kustomization webapp \ - --source=webapp \ - --path="./deploy/overlays/production" \ - --prune=true \ - --validation=client \ - --interval=10m \ - --health-check="Deployment/frontend.production" \ - --health-check="Deployment/backend.production" \ - --health-check-timeout=2m \ - --export > ./prod-cluster/webapp-production.yaml -``` - -Push changes to origin: +## Watch Flux sync the application -```sh -git add -A && git commit -m "add prod webapp" && git push -``` - -List git sources: +In about 30s the synchronization should start: ```console -$ flux get sources git -NAME REVISION READY MESSAGE -flux-system main/5ae055e24b2c8a78f981708b61507a97a30bd7a6 True Fetched revision: main/113360052b3153e439a0cf8de76b8e3d2a7bdf27 -webapp 4.0.1/113360052b3153e439a0cf8de76b8e3d2a7bdf27 True Fetched revision: 4.0.1/113360052b3153e439a0cf8de76b8e3d2a7bdf27 +$ watch flux get kustomizations +NAME READY MESSAGE +flux-system True Applied revision: main/fc07af652d3168be329539b30a4c3943a7d12dd8 +podinfo True Applied revision: master/855f7724be13f6146f61a893851522837ad5b634 ``` -The kubectl equivalent is `kubectl -n flux-system get gitrepositories`. - -List kustomization: +When the synchronization finishes you can check that podinfo has been deployed on your cluster: ```console -$ flux get kustomizations -NAME REVISION SUSPENDED READY MESSAGE -flux-system main/5ae055e24b2c8a78f981708b61507a97a30bd7a6 False True Applied revision: main/5ae055e24b2c8a78f981708b61507a97a30bd7a6 -webapp 4.0.1/113360052b3153e439a0cf8de76b8e3d2a7bdf27 False True Applied revision: 4.0.1/113360052b3153e439a0cf8de76b8e3d2a7bdf27 -``` - -The kubectl equivalent is `kubectl -n flux-system get kustomizations`. - -If you want to upgrade to the latest 4.x version, you can change the semver expression to: - -```sh -flux create source git webapp \ - --url=https://github.com/stefanprodan/podinfo \ - --tag-semver=">=4.0.0 <5.0.0" \ - --interval=30s \ - --export > ./prod-cluster/webapp-source.yaml +$ kubectl -n default get deployments,services +NAME READY UP-TO-DATE AVAILABLE AGE +deployment.apps/podinfo 2/2 2 2 108s -git add -A && git commit -m "update prod webapp" && git push +NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE +service/podinfo ClusterIP 10.100.149.126 9898/TCP,9999/TCP 108s ``` -Trigger a git sync: +!!! tip + From this moment forward, any changes made to the podinfo + Kubernetes manifests in the master branch will be synchronised with your cluster. -```console -$ flux reconcile ks flux-system --with-source -► annotating source flux-system -✔ source annotated -◎ waiting for reconcilitation -✔ git reconciliation completed -✔ fetched revision main/d751ea264d48bf0db8b588d1d08184834ac8fec9 -◎ waiting for kustomization reconcilitation -✔ kustomization reconcilitation completed -✔ applied revision main/d751ea264d48bf0db8b588d1d08184834ac8fec9 -``` +If a Kubernetes manifest is removed from the podinfo repository, Flux will remove it from your cluster. +If you delete a `Kustomization` from the fleet-infra repository, Flux will remove all Kubernetes objects that +were previously applied from that `Kustomization`. -The kubectl equivalent is `kubectl -n flux-system annotate gitrepository/flux-system fluxcd.io/reconcileAt="$(date +%s)"`. +If you alter the podinfo deployment using `kubectl edit`, the changes will be reverted to match +the state described in Git. When dealing with an incident, you can pause the reconciliation of a +kustomization with `flux suspend kustomization `. Once the debugging session +is over, you can re-enable the reconciliation with `flux resume kustomization `. -Wait for the webapp to be upgraded: +## Multi-cluster Setup -```console -$ watch flux get kustomizations -NAME REVISION SUSPENDED READY MESSAGE -flux-system main/d751ea264d48bf0db8b588d1d08184834ac8fec9 False True Applied revision: main/d751ea264d48bf0db8b588d1d08184834ac8fec9 -webapp 4.0.6/26a630c0b4b3452833d96c511d93f6f2d2e90a99 False True Applied revision: 4.0.6/26a630c0b4b3452833d96c511d93f6f2d2e90a99 -``` +To use Flux to manage more than one cluster or promote deployments from staging to production, take a look at the +two approaches in the repositories listed below. + +1. [https://github.com/fluxcd/flux2-kustomize-helm-example](https://github.com/fluxcd/flux2-kustomize-helm-example) +2. [https://github.com/fluxcd/flux2-multi-tenancy](https://github.com/fluxcd/flux2-multi-tenancy) \ No newline at end of file diff --git a/docs/guides/helmreleases.md b/docs/guides/helmreleases.md index df00896d..3694e818 100644 --- a/docs/guides/helmreleases.md +++ b/docs/guides/helmreleases.md @@ -21,12 +21,6 @@ To be able to release a Helm chart, the source that contains the chart first to the source-controller, so that the `HelmRelease` can reference to it. -A cluster administrator should register trusted sources by creating -the resources in the `flux-system` namespace. By default, the -source-controller watches for sources only in the `flux-system` -namespace, this way cluster admins can prevent untrusted sources from -being registered by users. - ### Helm repository Helm repositories are the recommended source to retrieve Helm charts @@ -117,52 +111,79 @@ repository and omits all other files. HTTP/S basic and SSH authentication can be configured for private Git repositories. See the [`GitRepository` CRD docs](../components/source/gitrepositories.md) for more details. - -### Bucket -Charts from S3 compatible storage buckets can be released by declaring -a `Bucket`, the source-controller will fetch the contents of the bucket -on an interval and expose it as an artifact. +### Cloud Storage -**There is one caveat you should be aware of:** to make the -source-controller produce a new chart artifact, the `version` in the -`Chart.yaml` of the chart must be bumped. +It is inadvisable while still possible to use a `Bucket` as a source for a `HelmRelease`, +as the whole storage bucket will be downloaded by source controller at each sync. The +bucket can easily become very large if there are frequent releases of multiple charts +that are stored in the same bucket. + +A better option is to use [Chartmuseum](https://github.com/helm/chartmuseum) and run a cluster +local Helm repository that can be used by source controller. Chartmuseum has support +for multiple different cloud storage solutions such as S3, GCS, and Azure Blob Storage, +meaning that you are not limited to only using storage providers that support the S3 protocol. -An example `Bucket`: +You can deploy a Chartmuseum instance with a `HelmRelease` that exposes a Helm repository stored +in a S3 bucket. Please refer to [Chartmuseums how to run documentation](https://chartmuseum.com/docs/#how-to-run) +for details about how to use other storage backends. ```yaml apiVersion: source.toolkit.fluxcd.io/v1beta1 -kind: Bucket +kind: HelmRepository metadata: - name: podinfo - namespace: gotk-system + name: chartmuseum + namespace: flux-system spec: - interval: 1m - provider: generic - bucketName: podinfo - endpoint: minio.minio.svc.cluster.local:9000 - ignore: | - # exclude all - /* - # include charts directory - !/charts/ + url: https://chartmuseum.github.io/charts + interval: 10m +--- +apiVersion: helm.toolkit.fluxcd.io/v2beta1 +kind: HelmRelease +metadata: + name: chartmuseum + namespace: flux-system +spec: + interval: 5m + chart: + spec: + chart: chartmuseum + version: "2.14.2" + sourceRef: + kind: HelmRepository + name: chartmuseum + namespace: flux-system + interval: 1m + values: + env: + open: + AWS_SDK_LOAD_CONFIG: true + STORAGE: amazon + STORAGE_AMAZON_BUCKET: "bucket-name" + STORAGE_AMAZON_PREFIX: "" + STORAGE_AMAZON_REGION: "region-name" + serviceAccount: + create: true + annotations: + eks.amazonaws.com/role-arn: "role-arn" + securityContext: + enabled: true + fsGroup: 65534 ``` -The `interval` defines at which interval the Git repository contents -are fetched, and should be at least `1m`. Setting this to a higher -value means newer chart versions will be detected at a slower pace, -a push-based fetch can be introduced using [webhook receivers](webhook-receivers.md) - -The `provider`, `bucketName` and `endpoint` together define what -S3 compatible storage should be connected to. For more information, -see the [`Bucket` CRD docs](../components/source/buckets.md). +After Chartmuseum is up and running it should be possible to use the accompanying +service as the url for the `HelmRepository`. - -The `ignore` defines file and folder exclusion for the -artifact produced, and follows the [`.gitignore` pattern -format](https://git-scm.com/docs/gitignore#_pattern_format). -The above example only includes the `charts` directory of the -repository and omits all other files. +```yaml +apiVersion: source.toolkit.fluxcd.io/v1beta1 +kind: HelmRepository +metadata: + name: helm-charts + namespace: flux-system +spec: + interval: 1m + url: http://chartmuseum-chartmuseum:8080 +``` ## Define a Helm release diff --git a/docs/guides/image-update.md b/docs/guides/image-update.md index 128521c8..2be6bae8 100644 --- a/docs/guides/image-update.md +++ b/docs/guides/image-update.md @@ -74,7 +74,7 @@ synchronize with the specified path inside the repository. ## Deploy a demo app -We'll be using a tiny webapp called [podinfo](https://github.com/stefanprodan/podinfo) to +We'll be using a tiny webapp called [podinfo](https://github.com/stefanprodan/podinfo) to showcase the image update feature. Clone your repository with: @@ -183,7 +183,7 @@ spec: A semver range that includes stable releases can be defined with `1.0.x` (patch versions only) or `>=1.0.0 <2.0.0` (minor and patch versions). If you want to include pre-release e.g. `1.0.0-rc.1`, - you can define a range like: `>1.0.0-rc <2.0.0`. + you can define a range like: `^1.x-0` or `>1.0.0-rc <2.0.0-rc`. Commit and push changes to main branch: @@ -217,7 +217,7 @@ podinfo True Latest image tag for 'ghcr.io/stefanprodan/podinfo' resolved to: 5 ## Configure image updates -Edit the `podinfo-deploy.yaml` and add a maker to tell Flux which policy to use when updating the container image: +Edit the `podinfo-deploy.yaml` and add a marker to tell Flux which policy to use when updating the container image: ```yaml spec: @@ -235,7 +235,7 @@ flux create image update flux-system \ --author-name=fluxcdbot \ --author-email=fluxcdbot@users.noreply.github.com \ --commit-template="[ci skip] update image" \ ---export ./clusters/my-cluster/flux-system-automation.yaml +--export > ./clusters/my-cluster/flux-system-automation.yaml ``` The above command generates the following manifest: @@ -358,3 +358,258 @@ images: newName: ghcr.io/stefanprodan/podinfo newTag: 5.0.0 # {"$imagepolicy": "flux-system:podinfo:tag"} ``` + +## ImageRepository cloud providers authentication + +If relying on a cloud provider image repository, you might need to do some extra +work in order to configure the ImageRepository resource credentials. Here are +some common examples for the most popular cloud provider docker registries. + +!!! warning "Workarounds" + The examples below are intended as workaround solutions until native + authentication mechanisms are implemented in Flux itself to support this in + a more straightforward manner. + +### AWS Elastic Container Registry + +The registry authentication credentials for ECR expire every 12 hours. +Considering this limitation, one needs to ensure the credentials are being +refreshed before expiration so that the controller can rely on them for +authentication. + +The solution proposed is to create a cronjob that runs every 6 hours which would +re-create the `docker-registry` secret using a new token. + +Edit and save the following snippet to a file +`./clusters/my-cluster/ecr-sync.yaml`, commit and push it to git. + +```yaml +kind: Role +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: ecr-credentials-sync + namespace: flux-system +rules: +- apiGroups: [""] + resources: + - secrets + verbs: + - delete + - create +--- +kind: RoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: ecr-credentials-sync + namespace: flux-system +subjects: +- kind: ServiceAccount + name: ecr-credentials-sync +roleRef: + kind: Role + name: ecr-credentials-sync + apiGroup: "" +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: ecr-credentials-sync + # Uncomment and edit if using IRSA + # annotations: + # eks.amazonaws.com/role-arn: +--- +apiVersion: batch/v1beta1 +kind: CronJob +metadata: + name: ecr-credentials-sync + namespace: flux-system +spec: + suspend: false + schedule: 0 */6 * * * + failedJobsHistoryLimit: 1 + successfulJobsHistoryLimit: 1 + jobTemplate: + spec: + template: + spec: + serviceAccountName: ecr-credentials-sync + restartPolicy: Never + volumes: + - name: token + emptyDir: + medium: Memory + initContainers: + - image: amazon/aws-cli + name: get-token + imagePullPolicy: IfNotPresent + # You will need to set the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY environment variables if not using + # IRSA. It is recommended to store the values in a Secret and load them in the container using envFrom. + # envFrom: + # - secretRef: + # name: aws-credentials + env: + - name: REGION + value: us-east-1 # change this if ECR repo is in a different region + volumeMounts: + - mountPath: /token + name: token + command: + - /bin/sh + - -ce + - aws ecr get-login-password --region ${REGION} > /token/ecr-token + containers: + - image: bitnami/kubectl + name: create-secret + imagePullPolicy: IfNotPresent + env: + - name: SECRET_NAME + value: # this is the generated Secret name + - name: + value: .dkr.ecr..amazonaws.com # fill in the account id and region + volumeMounts: + - mountPath: /token + name: token + command: + - /bin/bash + - -ce + - |- + kubectl delete secret --ignore-not-found $SECRET_NAME + kubectl create secret docker-registry $SECRET_NAME \ + --docker-server="$ECR_REGISTRY" \ + --docker-username=AWS \ + --docker-password="$(@.iam.gserviceaccount.com + name: gcr-credentials-sync + namespace: flux-system +--- +apiVersion: batch/v1beta1 +kind: CronJob +metadata: + name: gcr-credentials-sync + namespace: flux-system +spec: + suspend: false + schedule: "*/45 * * * *" + failedJobsHistoryLimit: 1 + successfulJobsHistoryLimit: 1 + jobTemplate: + spec: + template: + spec: + serviceAccountName: gcr-credentials-sync + restartPolicy: Never + containers: + - image: google/cloud-sdk + name: create-secret + imagePullPolicy: IfNotPresent + env: + - name: SECRET_NAME + value: # this is the generated Secret name + - name: GCR_REGISTRY + value: # fill in the registry name e.g gcr.io, eu.gcr.io + command: + - /bin/bash + - -ce + - |- + kubectl delete secret --ignore-not-found $SECRET_NAME + kubectl create secret docker-registry $SECRET_NAME \ + --docker-server="$GCR_REGISTRY" \ + --docker-username=oauth2accesstoken \ + --docker-password="$(gcloud auth print-access-token)" +``` + +Since the cronjob will not create a job right away, after applying the manifest, +you can manually create an init job using the following command: + +```console +$ kubectl create job --from=cronjob/gcr-credentials-sync -n flux-system gcr-credentials-sync-init +``` + +#### Using a JSON key [long-lived] + +!!! warning "Less secure option" + From [Google documentation on authenticating container registry](https://cloud.google.com/container-registry/docs/advanced-authentication#json-key) + > A user-managed key-pair that you can use as a credential for a service account. Because the credential is long-lived, it is the least secure option of all the available authentication methods. When possible, use an access token or another available authentication method to reduce the risk of unauthorized access to your artifacts. If you must use a service account key, ensure that you follow best practices for managing credentials. + + +Json keys doesn't expire so we don't need a cronjob, we just need to create the secret and reference it in the ImagePolicy. + +First, create a json key file by following this [documentation](https://cloud.google.com/container-registry/docs/advanced-authentication). Grant the service account the role of `Container Registry Service Agent` so that it can access GCR and download the json file. + +Then create a secret, encrypt it using [Mozilla SOPS](mozilla-sops.md) or [Sealed Secrets](sealed-secrets.md) , commit and push the encypted file to git. +``` + kubectl create secret docker-registry \ + --docker-server= \ # e.g gcr.io + --docker-username=_json_key \ + --docker-password="$(cat )" +``` + +### Azure Container Registry + +TODO \ No newline at end of file diff --git a/docs/guides/installation.md b/docs/guides/installation.md index cc057257..58001f71 100644 --- a/docs/guides/installation.md +++ b/docs/guides/installation.md @@ -62,10 +62,10 @@ flux bootstrap \ --version=latest ``` -!!! hint "ARM" - When deploying to a Kubernetes cluster with ARM architecture, - you can use `--arch=arm` for ARMv7 32-bit container images - and `--arch=arm64` for ARMv8 64-bit container images. +!!! hint "Multi-arch images" + The component images are published as [multi-arch container images](https://docs.docker.com/docker-for-mac/multi-arch/) + with support for Linux `amd64`, `arm64` and `armv7` (e.g. 32bit Raspberry Pi) + architectures. If you wish to install a specific version, use the Flux [release tag](https://github.com/fluxcd/flux2/releases) e.g. `--version=v0.2.0`. @@ -118,11 +118,11 @@ flux bootstrap github \ --personal ``` -!!! hint "Deploy Key" - The bootstrap command creates a ssh key which it stores as a secret in the +!!! hint "Deploy key" + The bootstrap command creates an SSH key which it stores as a secret in the Kubernetes cluster. The key is also used to create a deploy key in the GitHub repository. The new deploy key will be linked to the personal access token used - to authenticate. Removing the personal access token will remove the deploy key. + to authenticate. **Removing the personal access token will also remove the deploy key.** Run the bootstrap for a repository owned by a GitHub organization: @@ -320,7 +320,7 @@ If you don't specify the SSH algorithm, then `flux` will generate an RSA 2048 bi ```sh flux create source git flux-system \ --git-implementation=libgit2 \ - --url=git@ssh.dev.azure.com/v3/org/project/repository \ + --url=ssh://git@ssh.dev.azure.com/v3/org/project/repository \ --branch=master \ --interval=1m ``` diff --git a/docs/guides/mozilla-sops.md b/docs/guides/mozilla-sops.md index ed9f9848..8e85f496 100644 --- a/docs/guides/mozilla-sops.md +++ b/docs/guides/mozilla-sops.md @@ -104,13 +104,15 @@ flux create kustomization my-secrets \ Note that the `sops-gpg` can contain more than one key, sops will try to decrypt the secrets by iterating over all the private keys until it finds one that works. -### AWS/Azure/GCP +### Using various cloud providers When using AWS/GCP KMS, you'll have to bind an IAM Role with access to the KMS keys to the `default` service account of the `flux-system` namespace for kustomize-controller to be able to fetch keys from KMS. -AWS IAM Role example: +#### AWS + +IAM Role example: ```json { @@ -131,10 +133,27 @@ AWS IAM Role example: } ``` +#### Azure + When using Azure Key Vault you need to authenticate the kustomize controller either by passing [Service Principal credentials as environment variables](https://github.com/mozilla/sops#encrypting-using-azure-key-vault) or with [add-pod-identity](https://github.com/Azure/aad-pod-identity). +#### Google Cloud + +Please ensure that the GKE cluster has Workload Identity enabled. + +1. Create a service account with the role `Cloud KMS CryptoKey Encrypter/Decrypter`. +2. Create an IAM policy binding between the GCP service account to the `default` service account of the `flux-system`. +3. Annotate the `default` service account in the `flux-system` with the GCP service account. + +```sh +kubectl annotate serviceaccount \ + --namespace flux-system \ + default \ + iam.gke.io/gcp-service-account=@project-id.iam.gserviceaccount.com +``` + ## GitOps workflow A cluster admin should create the Kubernetes secret with the PGP keys on each cluster and diff --git a/docs/guides/notifications.md b/docs/guides/notifications.md index e7e2090a..98398540 100644 --- a/docs/guides/notifications.md +++ b/docs/guides/notifications.md @@ -105,47 +105,104 @@ When the verbosity is set to `info`, the controller will alert if: ## Git commit status -The `github` and `gitlab` provider are slightly different to the other chat providers. These providers will -link an event back to its source by writing a commit status event to the repository. For more information about how a -commit status works, refer to the [GitHub](https://docs.github.com/en/github/collaborating-with-issues-and-pull-requests/about-status-checks) -or [GitLab](https://docs.gitlab.com/ee/api/commits.html) documentation. - -The first image is an example of how it may look like in GitHub while the one below is an example for GitLab. -![github commit status](../_files/github-commit-status.png) -![gitlab commit status](../_files/gitlab-commit-status.png) - -Currently the provider will only work with Alerts for Kustomization resources as the events have to be linked with a -specific git commit. Any other event that does not contain a commit reference will be ignored by the provider. -Each status will contain some additional information from the event which includes the resource kind, name and reason for the event. -It will be displayed in the format of `{{ .Kind }}/{{ .Name }} - {{ .Reason }}`. - -To get started the git provider require an authentication token to communicate with the API. -Follow the [GitHub](https://docs.github.com/en/github/authenticating-to-github/creating-a-personal-access-token) -or [Gitlab](https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html) for a detailed guide how to create a token. -Store the generated token in a Secret with the following data format. +The GitHub, GitLab, Bitbucket, and Azure DevOps providers are slightly different to the other providers. Instead of +a stateless stream of events, the git notification providers will link the event with accompanying git commit which +triggered the event. The linking is done by updating the commit status of a specific commit. + + - [GitHub](https://docs.github.com/en/github/collaborating-with-issues-and-pull-requests/about-status-checks) + - [GitLab](https://docs.gitlab.com/ee/api/commits.html) + - [Bitbucket](https://developer.atlassian.com/server/bitbucket/how-tos/updating-build-status-for-commits/) + - [Azure DevOps](https://docs.microsoft.com/en-us/rest/api/azure/devops/git/statuses?view=azure-devops-rest-6.0) + +In GitHub the commit status set by notification-controller will result in a green checkmark or red cross next to the commit hash. +Clicking the icon will show more detailed information about the status. +![commit status GitHub overview](../_files/commit-status-github-overview.png) + +Receiving an event in the form of a commit status rather than a message in a chat conversation has the benefit +that it closes the deployment loop giving quick and visible feedback if a commit has reconciled and if it succeeded. +This means that a deployment will work in a similar manner that people are used to with "traditional" push based CD pipelines. +Additionally the status can be fetched from the git providers API for a specific commit. Allowing for custom automation tools +that can automatically promote, commit to a new directory, after receiving a successful commit status. This can all be +done without requiring any access to the Kubernetes cluster. + +As stated before the provider works by referencing the same git repository as the Kustomization controller does. +When a new commit is pushed to the repository, source-controller will sync the commit, triggering the kustomize-controller +to reconcile the new commit. After this is done the kustomize-controller sends an event to the notification-controller +with the result and the commit hash it reconciled. Then notification-controller can update the correct commit and repository +when receiving the event. +![commit status flow](../_files/commit-status-flow.png) + +!!! hint "Limitations" + The git notification providers require that a commit hash present in the meta data + of the event. There for the the providers will only work with `Kustomization` as an + event source, as it is the only resource which includes this data. + +First follow the [get started guide](../../get-started) if you do not have a Kubernetes cluster with Flux installed in it. +You will need a authentication token to communicate with the API. The authentication method depends on +the git provider used, refer to the [Provider CRD](../../components/notification/provider/#git-commit-status) +for details about how to get the correct token. The guide will use GitHub, but the other providers will work in a very similar manner. +The token will need to have write access to the repository it is going to update the commit status in. +Store the generated token in a Secret with the following data format in the cluster. ```yaml apiVersion: v1 kind: Secret metadata: name: github - namespace: gitops-system + namespace: flux-system data: token: ``` +When sending notification events the kustomization-controller will include the commit hash related to the event. +Note that the commit hash in the event does not come from the git repository the `Kustomization` resource +comes from but rather the kustomization source ref. This mean that commit status notifications will not work +if the manifests comes from a repository which the API token is not allowed to write to. + +Copy the manifest content in the "[kustomize](https://github.com/stefanprodan/podinfo/tree/master/kustomize)" directory +into the directory "./clusters/my-cluster/podinfo" in your fleet-infra repository. Make sure that you also add the +namespace podinfo. +```yaml +apiVersion: v1 +kind: Namespace +metadata: + name: podinfo +``` + +Then create a Kustomization to deploy podinfo. +```yaml +apiVersion: kustomize.toolkit.fluxcd.io/v1beta1 +kind: Kustomization +metadata: + name: podinfo + namespace: flux-system +spec: + interval: 5m + targetNamespace: podinfo + path: ./clusters/my-cluster/podinfo + prune: true + sourceRef: + kind: GitRepository + name: flux-system + healthChecks: + - apiVersion: apps/v1 + kind: Deployment + name: podinfo + namespace: podinfo + timeout: 1m +``` + Creating a git provider is very similar to creating other types of providers. The only caveat being that the provider address needs to point to the same -git repository as the Kustomization resource refers to. +git repository as the event source originates from. ```yaml apiVersion: notification.toolkit.fluxcd.io/v1beta1 kind: Provider metadata: - name: podinfo + name: flux-system namespace: flux-system spec: type: github - channel: general - address: https://github.com/stefanprodan/podinfo + address: https://github.com//fleet-infra secretRef: name: github --- @@ -156,7 +213,7 @@ metadata: namespace: flux-system spec: providerRef: - name: podinfo + name: flux-system eventSeverity: info eventSources: - kind: Kustomization @@ -164,14 +221,75 @@ spec: namespace: flux-system ``` -The secret referenced in the provider is expected to contain a [personal access token](https://docs.github.com/en/github/authenticating-to-github/creating-a-personal-access-token) -to authenticate with the GitHub API. +By now the fleet-infra repository should have a similar directory structure. +``` +fleet-infra +└── clusters/ + └── my-cluster/ + ├── flux-system/ + │ ├── gotk-components.yaml + │ ├── gotk-sync.yaml + │ └── kustomization.yaml + ├── podinfo/ + │ ├── namespace.yaml + │ ├── deployment.yaml + │ ├── hpa.yaml + │ ├── service.yaml + │ └── kustomization.yaml + ├── podinfo-kustomization.yaml + └── podinfo-notification.yaml +``` + +If podinfo is deployed and the health checks pass you should get a successful status in +your forked podinfo repository. + +If everything is setup correctly there should now be a green check-mark next to the latest commit. +Clicking the check-mark should show a detailed view. + +| GitHub | GitLab | +| ------------- | ------------- | +| ![commit status GitHub successful](../_files/commit-status-github-success.png) | ![commit status GitLab successful](../_files/commit-status-gitlab-success.png) | + +Generate error + +A deployment failure can be forced by setting an invalid image tag in the podinfo deployment. ```yaml -apiVersion: v1 -kind: Secret -metadata: - name: github - namespace: flux-system -data: - token: +apiVersion: apps/v1 +kind: Deployment +spec: + template: + spec: + containers: + - name: podinfod + image: ghcr.io/stefanprodan/podinfo:fake ``` + +After the commit has been reconciled it should return a failed commit status. +This is where the health check in the Kustomization comes into play together +with the timeout. The health check is used to asses the health of the Kustomization. +A failed commit status will not be sent until the health check timeout. Setting +a lower timeout will give feedback faster, but may sometimes not allow enough time +for a new application to deploy. + +| GitHub | GitLab | +| ------------- | ------------- | +| ![commit status GitHub failure](../_files/commit-status-github-failure.png) | ![commit status GitLab failure](../_files/commit-status-gitlab-failure.png) | + + +### Status changes + +The provider will continuously receive events as they happen, and multiple events may +be received for the same commit hash. The git providers are configured to only update +the status if the status has changed. This is to avoid spamming the commit status +history with the same status over and over again. + +There is an aspect of state fullness that needs to be considered, compared to the other +notification providers, as the events are stored by the git provider. This means that +the status of a commit can change over time. Initially a deployment may be healthy, resulting +in a successful status. Down the line the application, and the health check, may start failing +due to the amount of traffic it receives or external dependencies no longer being available. +The change in the health check would cause the status to go from successful to failed. +It is important to keep this in mind when building any automation tools that deals with the +status, and consider the fact that receiving a successful status once does not mean it will +always be successful. + diff --git a/docs/guides/sealed-secrets.md b/docs/guides/sealed-secrets.md index e6345b32..5bd05c1a 100644 --- a/docs/guides/sealed-secrets.md +++ b/docs/guides/sealed-secrets.md @@ -34,9 +34,9 @@ the sealed-secrets controller from its [Helm chart](https://hub.kubeapps.com/cha First you have to register the Helm repository where the sealed-secrets chart is published: ```sh -flux create source helm stable \ +flux create source helm sealed-secrets \ --interval=1h \ ---url=https://charts.helm.sh/stable +--url=https://bitnami-labs.github.io/sealed-secrets ``` With `interval` we configure [source-controller](../components/source/controller.md) to download @@ -50,7 +50,7 @@ flux create helmrelease sealed-secrets \ --interval=1h \ --release-name=sealed-secrets \ --target-namespace=flux-system \ ---source=HelmRepository/stable \ +--source=HelmRepository/sealed-secrets \ --chart=sealed-secrets \ --chart-version="1.10.x" ``` diff --git a/docs/index.md b/docs/index.md index 88a77319..065ec915 100644 --- a/docs/index.md +++ b/docs/index.md @@ -84,20 +84,20 @@ Depending on what you want to do, some of the following bits might be your first - And if you are completely new to Flux v2 and the GitOps Toolkit, take a look at our [Get Started guide](get-started/index.md) and give us feedback - Check out [how to contribute](contributing/index.md) to the project -### Featured Talks +### Upcoming Events +- 25 Jan 2021 - [GitOps Core Concepts & How to Teach Your Teams with Leigh Capili](https://www.meetup.com/GitOps-Community/events/275625806/) +### Featured Talks +- 11 Jan 2021 - [Helm + GitOps = ⚡️⚡️⚡️ with Scott Rigby](https://youtu.be/YG8jMFrYQvM) +- 14 Dec 2020 - [The Power of GitOps with Flux and Flagger (GitOps Hands-On) with Leigh Capili](https://youtu.be/cB7iXeNLteE) +- 30 Nov 2020 - [The Power of GItOps with Flux 2 - Part 3 with Leigh Capili](https://youtu.be/N_K5g7o9JKg) - 24 Nov 2020 - [Flux CD v2 with GitOps Toolkit - Kubernetes Deployment and Sync Mechanism](https://youtu.be/R6OeIgb7lUI) -- 19 Oct 2020 - [The Power of GitOps with Flux & GitOps Toolkit - Part 2 with Leigh Capili](https://youtu.be/fC2YCxQRUwU) +- 02 Nov 2020 - [The Power of GitOps with Flux & GitOps Toolkit - Part 2 with Leigh Capili](https://youtu.be/fC2YCxQRUwU) - 28 Oct 2020 - [The Kubelist Podcast: Flux with Michael Bridgen](https://www.heavybit.com/library/podcasts/the-kubelist-podcast/ep-5-flux-with-michael-bridgen-of-weaveworks/) - 19 Oct 2020 - [The Power of GitOps with Flux & GitOps Toolkit - Part 1 with Leigh Capili](https://youtu.be/0v5bjysXTL8) - 12 Oct 2020 - [Rawkode Live: Introduction to GitOps Toolkit with Stefan Prodan](https://youtu.be/HqTzuOBP0eY) -- 4 Sep 2020 - [KubeCon Europe: The road to Flux v2 and Progressive Delivery with Stefan Prodan & Hidde Beydals](https://youtu.be/8v94nUkXsxU) +- 04 Sep 2020 - [KubeCon Europe: The road to Flux v2 and Progressive Delivery with Stefan Prodan & Hidde Beydals](https://youtu.be/8v94nUkXsxU) - 25 June 2020 - [Cloud Native Nordics: Introduction to GitOps & GitOps Toolkit with Alexis Richardson & Stefan Prodan](https://youtu.be/qQBtSkgl7tI) -- 7 May 2020 - [GitOps Days - Community Special: GitOps Toolkit Experimentation with Stefan Prodan](https://youtu.be/WHzxunv4DKk?t=6521) - -### Upcoming Events - -- 12-13 Nov 2020 - [GitOps Days EMEA](https://www.gitopsdays.com/) with talks and workshops on migrating to Flux v2 and Helm Controller -- 19 Nov 2020 - [KubeCon NA: Progressive Delivery Techniques with Flagger and Flux v2 with Stefan Prodan](https://kccncna20.sched.com/event/1b04f8408b49976b843a5d0019cb8112) +- 07 May 2020 - [GitOps Days - Community Special: GitOps Toolkit Experimentation with Stefan Prodan](https://youtu.be/WHzxunv4DKk?t=6521) -We are looking forward to seeing you with us! +We look forward to seeing you with us! diff --git a/docs/roadmap/index.md b/docs/roadmap/index.md index fd1408fd..24aff177 100644 --- a/docs/roadmap/index.md +++ b/docs/roadmap/index.md @@ -48,11 +48,11 @@ Tasks ### Flux image update feature parity -[= 70% "70%"] +[= 80% "80%"] -Image automation is available as a prerelease. See [the -README](https://github.com/fluxcd/image-automation-controller#readme) -for instructions on installing it. +Image automation is available as a prerelease. See [this +guide](https://toolkit.fluxcd.io/guides/image-update/) for how to +install and use it. Goals @@ -73,7 +73,8 @@ Tasks - [ ] Azure-specific support [fluxcd/image-reflector-controller#11](https://github.com/fluxcd/image-reflector-controller/issues/11) - [x] Design the automation component - [x] Implement the image scan/patch/push workflow -- [ ] Integrate the new components in the Flux CLI [fluxcd/flux2#538](https://github.com/fluxcd/flux2/pull/538) +- [x] Integrate the new components in the Flux CLI [fluxcd/flux2#538](https://github.com/fluxcd/flux2/pull/538) +- [x] Write a guide for how to use image automation ([guide here](https://toolkit.fluxcd.io/guides/image-update/)) - [ ] Write a migration guide from Flux annotations ## The road to Helm Operator v2 diff --git a/go.mod b/go.mod index 95c9193b..47aa4cdb 100644 --- a/go.mod +++ b/go.mod @@ -5,17 +5,17 @@ go 1.15 require ( github.com/blang/semver/v4 v4.0.0 github.com/cyphar/filepath-securejoin v0.2.2 - github.com/fluxcd/helm-controller/api v0.4.4 - github.com/fluxcd/image-automation-controller/api v0.1.0 - github.com/fluxcd/image-reflector-controller/api v0.1.0 - github.com/fluxcd/kustomize-controller/api v0.5.3 - github.com/fluxcd/notification-controller/api v0.5.0 + github.com/fluxcd/helm-controller/api v0.5.1 + github.com/fluxcd/image-automation-controller/api v0.3.0 + github.com/fluxcd/image-reflector-controller/api v0.2.0 + github.com/fluxcd/kustomize-controller/api v0.6.1 + github.com/fluxcd/notification-controller/api v0.6.1 github.com/fluxcd/pkg/apis/meta v0.5.0 - github.com/fluxcd/pkg/git v0.1.0 - github.com/fluxcd/pkg/runtime v0.4.0 + github.com/fluxcd/pkg/git v0.2.1 + github.com/fluxcd/pkg/runtime v0.6.2 github.com/fluxcd/pkg/ssh v0.0.5 github.com/fluxcd/pkg/untar v0.0.5 - github.com/fluxcd/source-controller/api v0.5.6 + github.com/fluxcd/source-controller/api v0.6.1 github.com/google/go-containerregistry v0.2.0 github.com/manifoldco/promptui v0.7.0 github.com/olekukonko/tablewriter v0.0.4 @@ -24,7 +24,7 @@ require ( k8s.io/apiextensions-apiserver v0.19.4 k8s.io/apimachinery v0.19.4 k8s.io/client-go v0.19.4 - sigs.k8s.io/controller-runtime v0.6.4 + sigs.k8s.io/controller-runtime v0.7.0 sigs.k8s.io/kustomize/api v0.7.0 sigs.k8s.io/yaml v1.2.0 ) diff --git a/go.sum b/go.sum index 5d698e40..ea01f171 100644 --- a/go.sum +++ b/go.sum @@ -58,6 +58,7 @@ github.com/Azure/go-autorest/logger v0.1.0/go.mod h1:oExouG+K6PryycPJfVSxi/koC6L github.com/Azure/go-autorest/tracing v0.5.0/go.mod h1:r/s2XiOKccPW3HrqB+W0TQzfbtp2fGCgRFtBroKn4Dk= github.com/Azure/go-autorest/tracing v0.6.0 h1:TYi4+3m5t6K48TGI9AUdb+IzbnSxvnvUMfuitfgcfuo= github.com/Azure/go-autorest/tracing v0.6.0/go.mod h1:+vhtPC754Xsa23ID7GlGsrdKBpUA79WCAKPPZVC2DeU= +github.com/BurntSushi/toml v0.3.1 h1:WXkYYl6Yr3qBf1K79EBnL4mak0OimBfB0XUf9Vl28OQ= github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU= github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo= github.com/GoogleCloudPlatform/k8s-cloud-provider v0.0.0-20190822182118-27a4ced34534/go.mod h1:iroGtC8B3tQiqtds1l+mgk/BBOrxbqjH+eUfFQYRc14= @@ -175,28 +176,28 @@ github.com/evanphx/json-patch v4.5.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLi github.com/evanphx/json-patch v4.9.0+incompatible h1:kLcOMZeuLAJvL2BPWLMIj5oaZQobrkAqrL+WFZwQses= github.com/evanphx/json-patch v4.9.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk= github.com/fatih/color v1.7.0/go.mod h1:Zm6kSWBoL9eyXnKyktHP6abPY2pDugNf5KwzbycvMj4= -github.com/fluxcd/helm-controller/api v0.4.4 h1:WYf7KokS3ALeE1F2SrviMHtEBGfznP7DkxXwo5pP7f8= -github.com/fluxcd/helm-controller/api v0.4.4/go.mod h1:H3fHkKJWcxPz38L1kxBX/MGm5v9XKzeoKZWNM7+dW2o= -github.com/fluxcd/image-automation-controller/api v0.1.0 h1:XN/BbhCRoISEb828rfMt2fNe+3s4Zwc+BwhRi3K1SHA= -github.com/fluxcd/image-automation-controller/api v0.1.0/go.mod h1:DHjFNvA+kJlSm7cbTaG+Z5smVjMjLw7xzlJc9brP0zY= -github.com/fluxcd/image-reflector-controller/api v0.1.0 h1:wlqwCy4sZMbbdrgSY9Fd0mfy55kk7dS4Z+icrDlkmmg= -github.com/fluxcd/image-reflector-controller/api v0.1.0/go.mod h1:u7vnULekPHXAZgJ35lqCjV2MaJVN0xbD+qt9X9TVCMs= -github.com/fluxcd/kustomize-controller/api v0.5.3 h1:zZiWFBQkNytLffOOJJttGFQk7BIUHpT2yoOCG4nyqII= -github.com/fluxcd/kustomize-controller/api v0.5.3/go.mod h1:8Z52j63kRf+NjtVmiJFvI8xLje3ncFTs/uMxcrEJPIA= -github.com/fluxcd/notification-controller/api v0.5.0 h1:xKKFnPVsYl2+GEjgKz5a5Mq6vmy+H2q9d2lJ2jmWJZs= -github.com/fluxcd/notification-controller/api v0.5.0/go.mod h1:yLd+nrCJUThSkt4U+LLv8TRxqZdR11+gE1S2/bhgqmE= +github.com/fluxcd/helm-controller/api v0.5.1 h1:GpDZSBClBwUivDjQDIsYGALwiBUcTe5IU7HRrbBfzR0= +github.com/fluxcd/helm-controller/api v0.5.1/go.mod h1:NGTkoX7WmNzesSZImqlO7DMEJF3s7ZxIyRylFrMmWLE= +github.com/fluxcd/image-automation-controller/api v0.3.0 h1:1cwNjY4t7gy3k+dYf47xokePx7Q5L5Jt05EL/G6Btbo= +github.com/fluxcd/image-automation-controller/api v0.3.0/go.mod h1:dn/HSWvYMEMv1ILOasXtbM2Y1vTgrv2Edcw69rL7QpQ= +github.com/fluxcd/image-reflector-controller/api v0.2.0 h1:/qAamO2y1Bq4rn/JedB33V9kOkSeXIYxwpnEHBz0HeE= +github.com/fluxcd/image-reflector-controller/api v0.2.0/go.mod h1:2KC4Zijp+iIbkID/KT+hhH4iSSQP3Hrzh0t971tjWjk= +github.com/fluxcd/kustomize-controller/api v0.6.1 h1:NUe+Aa3w6z8PR5zyyOSjAN3RTGNLwb5jGAm+u6aJuWk= +github.com/fluxcd/kustomize-controller/api v0.6.1/go.mod h1:g9cE+lrH5xluslMvx9LqxY/rYg7c2XN/lOlsxDBnNdM= +github.com/fluxcd/notification-controller/api v0.6.1 h1:l5mManb+Y8aT9uO9Y17Ifoo455zLyAbeZz4ltRUKK78= +github.com/fluxcd/notification-controller/api v0.6.1/go.mod h1:9BiC68i6eeQTERhrMo0dni51uKSlt/eMiRcMArcZ++Y= github.com/fluxcd/pkg/apis/meta v0.5.0 h1:FaU++mQY0g4sVVl+hG+vk0CXBLbb4EVfRuzs3IjLXvo= github.com/fluxcd/pkg/apis/meta v0.5.0/go.mod h1:aEUuZIawboAAFLlYz/juVJ7KNmlWbBtJFYkOWWmGUR4= -github.com/fluxcd/pkg/git v0.1.0 h1:WtQSoR1SlsI8IsiJGiFzbH9IyxFZPsTtxraAp68/H+U= -github.com/fluxcd/pkg/git v0.1.0/go.mod h1:AO+smmdF7X+ciTypdoMOTbAHeiYCCSaa56OfW0Xo064= -github.com/fluxcd/pkg/runtime v0.4.0 h1:d/1okReK7ZyrQ2k/GKY1BEiMZNHu1rWKUxlHx2O45EY= -github.com/fluxcd/pkg/runtime v0.4.0/go.mod h1:0Rbkgh3qj8Dl4uitccLc13hZyet1vvNJCAFAVUwNZDM= +github.com/fluxcd/pkg/git v0.2.1 h1:7as7kMjxTFpM4dpSmwQqM/fYXDlQhZdbNnuytI6O57k= +github.com/fluxcd/pkg/git v0.2.1/go.mod h1:8v0QVumu1ugMG3nJL0KMYPZgmLjzesJHA2sOtXAHLPA= +github.com/fluxcd/pkg/runtime v0.6.2 h1:sWnSv6AhMY30fexRQ37lv2Q9Rvdu05zbiqMSldw+MjQ= +github.com/fluxcd/pkg/runtime v0.6.2/go.mod h1:RuqYOYCvBJwo4rg83d28WOt2vfSaemuZCVpUagAjWQc= github.com/fluxcd/pkg/ssh v0.0.5 h1:rnbFZ7voy2JBlUfMbfyqArX2FYaLNpDhccGFC3qW83A= github.com/fluxcd/pkg/ssh v0.0.5/go.mod h1:7jXPdXZpc0ttMNz2kD9QuMi3RNn/e0DOFbj0Tij/+Hs= github.com/fluxcd/pkg/untar v0.0.5 h1:UGI3Ch1UIEIaqQvMicmImL1s9npQa64DJ/ozqHKB7gk= github.com/fluxcd/pkg/untar v0.0.5/go.mod h1:O6V9+rtl8c1mHBafgqFlJN6zkF1HS5SSYn7RpQJ/nfw= -github.com/fluxcd/source-controller/api v0.5.6 h1:Nj7WebOP8nTTA/yDPwszyjzW5oYI5tVhS/8XWOT+2wk= -github.com/fluxcd/source-controller/api v0.5.6/go.mod h1:/mpW0EM2dUnRey6rffqsSmgNkSAYm+zq9i0GfmTO7I0= +github.com/fluxcd/source-controller/api v0.6.1 h1:sKrq2bS6rANk2BgMNOmS+shBNkzbtIl1/v3BXkVVWag= +github.com/fluxcd/source-controller/api v0.6.1/go.mod h1:5eEXvQGVAuxJmCm/ooewsNTQR7Y9L75/cRP1WF74j5s= github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568 h1:BHsljHzVlRcyQhjrss6TZTdY2VfCqZPbv5k3iBFa2ZQ= github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568/go.mod h1:xEzjJPgXI435gkrCt3MPfRiAkVrwSbHsst4LCFVfpJc= github.com/form3tech-oss/jwt-go v3.2.2+incompatible h1:TcekIExNqud5crz4xD2pavyTgWiPvpYe4Xau31I0PRk= @@ -231,9 +232,8 @@ github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9 github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk= github.com/go-logr/logr v0.1.0/go.mod h1:ixOQHD9gLJUVQQ2ZOR7zLEifBX6tGkNJF4QyIY7sIas= github.com/go-logr/logr v0.2.0/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU= -github.com/go-logr/logr v0.2.1 h1:fV3MLmabKIZ383XifUjFSwcoGee0v9qgPp8wy5svibE= -github.com/go-logr/logr v0.2.1/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU= -github.com/go-logr/zapr v0.1.0/go.mod h1:tabnROwaDl0UNxkVeFRbY8bwB37GwRv0P8lg6aAiEnk= +github.com/go-logr/logr v0.3.0 h1:q4c+kbcR0d5rSurhBR8dIgieOaYpXtsdTYfx22Cu6rs= +github.com/go-logr/logr v0.3.0/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU= github.com/go-logr/zapr v0.2.0 h1:v6Ji8yBW77pva6NkJKQdHLAJKrIJKRHz0RXwPqCHSR4= github.com/go-logr/zapr v0.2.0/go.mod h1:qhKdvif7YF5GI9NWEpyxTSSBdGmzkNguibrdCNVPunU= github.com/go-ole/go-ole v1.2.1/go.mod h1:7FAglXiTm7HKlQRDeOQ6ZNUHidzCWXuZWq/1dTyBNF8= @@ -358,6 +358,8 @@ github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMyw github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= github.com/google/go-cmp v0.4.1 h1:/exdXoGamhu5ONeUJH0deniYLWYvQwW66yvlfiiKTu0= github.com/google/go-cmp v0.4.1/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= +github.com/google/go-cmp v0.5.2 h1:X2ev0eStA3AbceY54o37/0PQ/UWqKEiiO2dKL5OPaFM= +github.com/google/go-cmp v0.5.2/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= github.com/google/go-containerregistry v0.2.0 h1:cWFYx+kOkKdyOET0pcp7GMCmxj7da40StvluSuSXWCg= github.com/google/go-containerregistry v0.2.0/go.mod h1:Ts3Wioz1r5ayWx8sS6vLcWltWcM1aqFjd/eVrkFhrWM= github.com/google/go-github/v32 v32.1.0 h1:GWkQOdXqviCPx7Q7Fj+KyPoGm4SwHRh8rheoPhd27II= @@ -385,9 +387,10 @@ github.com/googleapis/gax-go/v2 v2.0.5/go.mod h1:DWXyrwAJ9X0FpwwEdw+IPEYBICEFu5m github.com/googleapis/gnostic v0.0.0-20170729233727-0c5108395e2d/go.mod h1:sJBsCZ4ayReDTBIg8b9dl28c5xFWyhBTVRp3pOg5EKY= github.com/googleapis/gnostic v0.1.0/go.mod h1:sJBsCZ4ayReDTBIg8b9dl28c5xFWyhBTVRp3pOg5EKY= github.com/googleapis/gnostic v0.2.2/go.mod h1:sJBsCZ4ayReDTBIg8b9dl28c5xFWyhBTVRp3pOg5EKY= -github.com/googleapis/gnostic v0.3.1/go.mod h1:on+2t9HRStVgn95RSsFWFz+6Q0Snyqv1awfrALZdbtU= github.com/googleapis/gnostic v0.4.1 h1:DLJCy1n/vrD4HPjOvYcT8aYQXpPIzoRZONaYwyycI+I= github.com/googleapis/gnostic v0.4.1/go.mod h1:LRhVm6pbyptWbWbuZ38d1eyptfvIytN3ir6b65WBswg= +github.com/googleapis/gnostic v0.5.1 h1:A8Yhf6EtqTv9RMsU6MQTyrtV1TjWlR6xU9BsZIwuTCM= +github.com/googleapis/gnostic v0.5.1/go.mod h1:6U4PtQXGIEt/Z3h5MAT7FNofLnw9vXk2cUuW7uA/OeU= github.com/gophercloud/gophercloud v0.1.0/go.mod h1:vxM41WHh5uqHVBMZHzuwNOHh8XEoIEcSTewFxm1c5g8= github.com/gorilla/mux v1.7.3/go.mod h1:1lud6UwP+6orDFRuTfBEV8e9/aOM/c4fVVCaMa2zaAs= github.com/gorilla/websocket v0.0.0-20170926233335-4201258b820c/go.mod h1:E7qHFY5m1UJ88s3WnNqhKjPHQ0heANvMoAMk2YaljkQ= @@ -426,6 +429,8 @@ github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1: github.com/imdario/mergo v0.3.5/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA= github.com/imdario/mergo v0.3.9 h1:UauaLniWCFHWd+Jp9oCEkTBj8VO/9DKg3PV3VCNMDIg= github.com/imdario/mergo v0.3.9/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA= +github.com/imdario/mergo v0.3.10 h1:6q5mVkdH/vYmqngx7kZQTjJ5HRsx+ImorDIEQ+beJgc= +github.com/imdario/mergo v0.3.10/go.mod h1:jmQim1M+e3UYxmgPu/WyfjB3N3VflVyUjjjwH0dnCYA= github.com/inconshreveable/mousetrap v1.0.0 h1:Z8tu5sraLXCXIcARxBp/8cbvlwVa7Z1NHg9XEKhtSvM= github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8= github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 h1:BQSFePA1RWJOlocH6Fxy8MmwDt+yVQYULKfN0RoTN8A= @@ -537,6 +542,8 @@ github.com/onsi/ginkgo v1.11.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+ github.com/onsi/ginkgo v1.12.0/go.mod h1:oUhWkIvk5aDxtKvDDuw8gItl8pKl42LzjC9KZE0HfGg= github.com/onsi/ginkgo v1.12.1 h1:mFwc4LvZ0xpSvDZ3E+k8Yte0hLOMxXUlP+yXtJqkYfQ= github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk= +github.com/onsi/ginkgo v1.14.1 h1:jMU0WaQrP0a/YAEq8eJmJKjBoMs+pClEr1vDMlM/Do4= +github.com/onsi/ginkgo v1.14.1/go.mod h1:iSB4RoI2tjJc9BBv4NKIKWKya62Rps+oPG/Lv9klQyY= github.com/onsi/gomega v0.0.0-20170829124025-dcabb60a477c/go.mod h1:C1qb7wdrVGGVU+Z6iS04AVkA3Q65CEZX59MT0QO5uiA= github.com/onsi/gomega v1.5.0/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY= github.com/onsi/gomega v1.7.0/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY= @@ -544,6 +551,8 @@ github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7J github.com/onsi/gomega v1.9.0/go.mod h1:Ho0h+IUsWyvy1OpqCwxlQ/21gkhVunqlU8fDGcoTdcA= github.com/onsi/gomega v1.10.1 h1:o0+MgICZLuZ7xjH7Vx6zS/zcu93/BEp1VwkIW1mEXCE= github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo= +github.com/onsi/gomega v1.10.2 h1:aY/nuoWlKJud2J6U0E3NWsjlg+0GtwXxgEqthRdzlcs= +github.com/onsi/gomega v1.10.2/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo= github.com/opencontainers/go-digest v1.0.0-rc1/go.mod h1:cMLVZDEM3+U2I4VmLI6N8jQYUd2OVphdqWwCJHrFt2s= github.com/opencontainers/image-spec v1.0.1/go.mod h1:BtxoFyWECRxE4U/7sNtV5W15zMzWCbyJoFRP3s7yZA0= github.com/paulmach/orb v0.1.3/go.mod h1:VFlX/8C+IQ1p6FTRRKzKoOPJnvEtA5G0Veuqwbu//Vk= @@ -576,7 +585,6 @@ github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB8 github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk= github.com/prometheus/procfs v0.0.0-20190507164030-5867b95ac084/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA= github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA= -github.com/prometheus/procfs v0.0.11/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU= github.com/prometheus/procfs v0.1.3 h1:F0+tqvhOksq22sc6iCHF5WGlWjdwj92p0udFh1VFBS8= github.com/prometheus/procfs v0.1.3/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU= github.com/prometheus/tsdb v0.7.1/go.mod h1:qhTCs0VvXwvX/y3TZrWD7rabWM+ijKTux40TwIPHuXU= @@ -625,6 +633,7 @@ github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA= github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg= github.com/spf13/viper v1.3.2/go.mod h1:ZiWeW+zYFKm7srdB9IoDzzZXaJaI5eL9QjNiN/DMA2s= github.com/spf13/viper v1.4.0/go.mod h1:PTJ7Z/lr49W6bUbkmS1V3by4uWynFiR9p7+dSq/yZzE= +github.com/stoewer/go-strcase v1.2.0/go.mod h1:IBiWB2sKIp3wVVQ3Y035++gc+knqhUQag1KpM8ahLw8= github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/objx v0.2.0 h1:Hbg2NidpLE8veEBkEZTL3CvlkUIVzuU9jDplZO54c48= @@ -655,8 +664,8 @@ github.com/valyala/tcplisten v0.0.0-20161114210144-ceec8f93295a/go.mod h1:v3UYOV github.com/vdemeester/k8s-pkg-credentialprovider v1.18.1-0.20201019120933-f1d16962a4db/go.mod h1:grWy0bkr1XO6hqbaaCKaPXqkBVlMGHYG6PGykktwbJc= github.com/vektah/gqlparser v1.1.2/go.mod h1:1ycwN7Ij5njmMkPPAOaRFY4rET2Enx7IkVv3vaXspKw= github.com/vmware/govmomi v0.20.3/go.mod h1:URlwyTFZX72RmxtxuaFL2Uj3fD1JTvZdx59bHWk6aFU= -github.com/xanzy/go-gitlab v0.32.1 h1:eKGfAP2FWbqStD7DtGoRBb18IYwjuCxdtEVea2rNge4= -github.com/xanzy/go-gitlab v0.32.1/go.mod h1:sPLojNBn68fMUWSxIJtdVVIP8uSBYqesTfDUseX11Ug= +github.com/xanzy/go-gitlab v0.38.2 h1:FF4WgwFsLfOC4Wl67c9UDIC73C+UaYJ0pkZ2irbSu4M= +github.com/xanzy/go-gitlab v0.38.2/go.mod h1:sPLojNBn68fMUWSxIJtdVVIP8uSBYqesTfDUseX11Ug= github.com/xanzy/ssh-agent v0.2.1 h1:TCbipTQL2JiiCprBWx9frJ2eJlCYT00NmctrHxVAr70= github.com/xanzy/ssh-agent v0.2.1/go.mod h1:mLlQY/MoOhWBj+gOGMQkOeiEvkx+8pJSI+0Bx9h2kr4= github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2/go.mod h1:UETIi67q53MR2AWcXfiuqkDkRtnGDLqkBTpCHuJHxtU= @@ -685,11 +694,21 @@ go.starlark.net v0.0.0-20200306205701-8dd3e2ee1dd5/go.mod h1:nmDLcffg48OtT/PSW0H go.uber.org/atomic v1.3.2/go.mod h1:gD2HeocX3+yG+ygLZcrzQJaqmWj9AIm7n08wl/qW/PE= go.uber.org/atomic v1.4.0 h1:cxzIVoETapQEqDhQu3QfnvXAV4AlzcvUCxkVUFw3+EU= go.uber.org/atomic v1.4.0/go.mod h1:gD2HeocX3+yG+ygLZcrzQJaqmWj9AIm7n08wl/qW/PE= +go.uber.org/atomic v1.6.0 h1:Ezj3JGmsOnG1MoRWQkPBsKLe9DwWD9QeXzTRzzldNVk= +go.uber.org/atomic v1.6.0/go.mod h1:sABNBOSYdrvTF6hTgEIbc7YasKWGhgEQZyfxyTvoXHQ= +go.uber.org/goleak v1.1.10 h1:z+mqJhf6ss6BSfSM671tgKyZBFPTTJM+HLxnhPC3wu0= +go.uber.org/goleak v1.1.10/go.mod h1:8a7PlsEVH3e/a/GLqe5IIrQx6GzcnRmZEufDUTk4A7A= go.uber.org/multierr v1.1.0 h1:HoEmRHQPVSqub6w2z2d2EOVs2fjyFRGyofhKuyDq0QI= go.uber.org/multierr v1.1.0/go.mod h1:wR5kodmAFQ0UK8QlbwjlSNy0Z68gJhDJUG5sjR94q/0= +go.uber.org/multierr v1.5.0 h1:KCa4XfM8CWFCpxXRGok+Q0SS/0XBhMDbHHGABQLvD2A= +go.uber.org/multierr v1.5.0/go.mod h1:FeouvMocqHpRaaGuG9EjoKcStLC43Zu/fmqdUMPcKYU= +go.uber.org/tools v0.0.0-20190618225709-2cfd321de3ee h1:0mgffUl7nfd+FpvXMVz4IDEaUSmT1ysygQC7qYo7sG4= +go.uber.org/tools v0.0.0-20190618225709-2cfd321de3ee/go.mod h1:vJERXedbb3MVM5f9Ejo0C68/HhF8uaILCdgjnY+goOA= go.uber.org/zap v1.8.0/go.mod h1:vwi/ZaCAaUcBkycHslxD9B2zi4UTXhF60s6SWpuDF0Q= go.uber.org/zap v1.10.0 h1:ORx85nbTijNz8ljznvCMR1ZBIPKFn3jQrag10X2AsuM= go.uber.org/zap v1.10.0/go.mod h1:vwi/ZaCAaUcBkycHslxD9B2zi4UTXhF60s6SWpuDF0Q= +go.uber.org/zap v1.15.0 h1:ZZCA22JRF2gQE5FoNmhmrf7jeJJ2uhqDUNRYKm8dvmM= +go.uber.org/zap v1.15.0/go.mod h1:Mb2vm2krFEG5DV0W9qcHBYFtp/Wku1cvYaqPsS/WYfc= golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= golang.org/x/crypto v0.0.0-20190211182817-74369b46fc67/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= @@ -732,6 +751,7 @@ golang.org/x/lint v0.0.0-20190909230951-414d861bb4ac/go.mod h1:6SW0HCj/g11FgYtHl golang.org/x/lint v0.0.0-20190930215403-16217165b5de/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= golang.org/x/lint v0.0.0-20191125180803-fdd1cda4f05f/go.mod h1:5qLYkcX4OjUUV8bRuDixDT3tpyyb+LUpUlRWLxfhWrs= golang.org/x/lint v0.0.0-20200130185559-910be7a94367/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY= +golang.org/x/lint v0.0.0-20200302205851-738671d3881b h1:Wh+f8QHJXR411sJR8/vRBTZ7YapZaRvUcLFFJhusH0k= golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY= golang.org/x/mobile v0.0.0-20190312151609-d3739f865fa6/go.mod h1:z+o9i4GpDbdi3rU15maQ/Ox0txvL9dWGYEHz965HBQE= golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028/go.mod h1:E/iHnbuqvinMTCcRqshq8CkpyQDoeVncDDYHnLhea+o= @@ -740,6 +760,7 @@ golang.org/x/mod v0.1.0/go.mod h1:0QHyrYULN0/3qlju5TqG8bIK38QM8yzMo5ekMj3DlcY= golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg= golang.org/x/mod v0.1.1-0.20191107180719-034126e5016b/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg= golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= +golang.org/x/mod v0.3.0 h1:RM4zey1++hCTbCVQfnWeKs9/IEsaBLA8vTkd0WVtmH4= golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/net v0.0.0-20170114055629-f2499483f923/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180218175443-cbe0f9307d01/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= @@ -837,6 +858,7 @@ golang.org/x/sys v0.0.0-20200223170610-d5e6a3e2c0ae/go.mod h1:h1NjWce9XRLGQEsW7w golang.org/x/sys v0.0.0-20200302150141-5c8b2ff67527/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200501052902-10377860bb8e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20200519105757-fe76b779f299/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200523222454-059865788121/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200615200032-f1bc736245b1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200622214017-ed371f2e16b4 h1:5/PjkGUjvEU5Gl6BxmvKRPpqo2uNMv4rcHBMwzk/st8= @@ -854,6 +876,8 @@ golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxb golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20200416051211-89c76fbcd5d1 h1:NusfzzA6yGQ+ua51ck7E3omNUX/JuqbFSaRGqU8CcLI= golang.org/x/time v0.0.0-20200416051211-89c76fbcd5d1/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= +golang.org/x/time v0.0.0-20200630173020-3af7569d3a1e h1:EHBhcS0mlXEAVwNyO2dLfjToGsyY4j24pTs2ScHnX7s= +golang.org/x/time v0.0.0-20200630173020-3af7569d3a1e/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/tools v0.0.0-20180221164845-07fd8470d635/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20180525024113-a5b4c53f6e8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= @@ -889,6 +913,9 @@ golang.org/x/tools v0.0.0-20190920225731-5eefd052ad72/go.mod h1:b+2E5dAYhXwXZwtn golang.org/x/tools v0.0.0-20190930201159-7c411dea38b0/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20191010075000-0337d82405ff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20191012152004-8de300cfc20a/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191029041327-9cc4af7d6b2c/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191029190741-b9c20aec41a5/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= +golang.org/x/tools v0.0.0-20191108193012-7d206e10da11/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20191113191852-77e3bb0ad9e7/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20191115202509-3a792d9c32b2/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= @@ -905,14 +932,15 @@ golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56/go.mod h1:TB2adYChydJhpapK golang.org/x/tools v0.0.0-20200224181240-023911ca70b2/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28= golang.org/x/tools v0.0.0-20200501065659-ab2804fb9c9d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE= golang.org/x/tools v0.0.0-20200616133436-c1934b75d054/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE= +golang.org/x/tools v0.0.0-20200916195026-c9a70fc28ce3 h1:DywqrEscRX7O2phNjkT0L6lhHKGBoMLCNX+XcAe7t6s= golang.org/x/tools v0.0.0-20200916195026-c9a70fc28ce3/go.mod h1:z6u4i615ZeAfBE4XtMziQW1fSVJXACjjbWkB/mvPzlU= golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1 h1:go1bK/D/BFZV2I8cIQd1NKEZ+0owSTG1fDTci4IqFcE= golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= -gomodules.xyz/jsonpatch/v2 v2.0.1 h1:xyiBuvkD2g5n7cYzx6u2sxQvsAy4QJsZFCzGVdzOXZ0= -gomodules.xyz/jsonpatch/v2 v2.0.1/go.mod h1:IhYNNY4jnS53ZnfE4PAmpKtDpTCj1JFXc+3mwe7XcUU= +gomodules.xyz/jsonpatch/v2 v2.1.0 h1:Phva6wqu+xR//Njw6iorylFFgn/z547tw5Ne3HZPQ+k= +gomodules.xyz/jsonpatch/v2 v2.1.0/go.mod h1:IhYNNY4jnS53ZnfE4PAmpKtDpTCj1JFXc+3mwe7XcUU= gonum.org/v1/gonum v0.0.0-20190331200053-3d26580ed485/go.mod h1:2ltnJ7xHfj0zHS40VVPYEAAMTa3ZGguvHGBSJeRWqE0= gonum.org/v1/netlib v0.0.0-20190313105609-8cb42192e0e0/go.mod h1:wa6Ws7BG/ESfp6dHfk7C6KdzKA7wR7u/rKwOGE66zvw= gonum.org/v1/netlib v0.0.0-20190331212654-76723241ea4e/go.mod h1:kS+toOQn6AQKjmKJ7gzohV1XkqsFehRA2FbsbkopSuQ= @@ -1007,6 +1035,8 @@ gopkg.in/yaml.v2 v2.3.0 h1:clyUAQHOM3G0M3f5vQj7LuJrETvjVot3Z5el9nffUtU= gopkg.in/yaml.v2 v2.3.0/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= gopkg.in/yaml.v3 v3.0.0-20200121175148-a6ecf24a6d71 h1:Xe2gvTZUJpsvOWUnvmL/tmhVBZUmHSvLbMjRj6NUUKo= gopkg.in/yaml.v3 v3.0.0-20200121175148-a6ecf24a6d71/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= +gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776 h1:tQIYjPdBoyREyB9XMu+nnTclpTYkz2zFM+lzLJFO4gQ= +gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= gotest.tools v2.2.0+incompatible/go.mod h1:DsYFclhRJ6vuDpmuTbkuFWG+y2sxOXAzmJt81HFBacw= gotest.tools/v3 v3.0.2/go.mod h1:3SzNCllyD9/Y+b5r9JIKQ474KzkZyqLqEfYqMsX94Bk= honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= @@ -1014,41 +1044,40 @@ honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod h1:rf3lG4BRIbNafJWh honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg= +honnef.co/go/tools v0.0.1-2020.1.3 h1:sXmLre5bzIR6ypkjXCDI3jHPssRhc8KD/Ome589sc3U= honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= k8s.io/api v0.17.0/go.mod h1:npsyOePkeP0CPwyGfXDHxvypiYMJxBWAMpQxCaJ4ZxI= -k8s.io/api v0.18.6/go.mod h1:eeyxr+cwCjMdLAmr2W3RyDI0VvTawSg/3RFFBEnmZGI= k8s.io/api v0.18.8/go.mod h1:d/CXqwWv+Z2XEG1LgceeDmHQwpUJhROPx16SlxJgERY= -k8s.io/api v0.19.3/go.mod h1:VF+5FT1B74Pw3KxMdKyinLo+zynBaMBiAfGMuldcNDs= +k8s.io/api v0.19.2/go.mod h1:IQpK0zFQ1xc5iNIQPqzgoOwuFugaYHK4iCknlAQP9nI= k8s.io/api v0.19.4 h1:I+1I4cgJYuCDgiLNjKx7SLmIbwgj9w7N7Zr5vSIdwpo= k8s.io/api v0.19.4/go.mod h1:SbtJ2aHCItirzdJ36YslycFNzWADYH3tgOhvBEFtZAk= -k8s.io/apiextensions-apiserver v0.18.6/go.mod h1:lv89S7fUysXjLZO7ke783xOwVTm6lKizADfvUM/SS/M= +k8s.io/apiextensions-apiserver v0.19.2/go.mod h1:EYNjpqIAvNZe+svXVx9j4uBaVhTB4C94HkY3w058qcg= k8s.io/apiextensions-apiserver v0.19.4 h1:D9ak9T012tb3vcGFWYmbQuj9SCC8YM4zhA4XZqsAQC4= k8s.io/apiextensions-apiserver v0.19.4/go.mod h1:B9rpH/nu4JBCtuUp3zTTk8DEjZUupZTBEec7/2zNRYw= k8s.io/apimachinery v0.17.0/go.mod h1:b9qmWdKlLuU9EBh+06BtLcSf/Mu89rWL33naRxs1uZg= -k8s.io/apimachinery v0.18.6/go.mod h1:OaXp26zu/5J7p0f92ASynJa1pZo06YlV9fG7BoWbCko= k8s.io/apimachinery v0.18.8/go.mod h1:6sQd+iHEqmOtALqOFjSWp2KZ9F0wlU/nWm0ZgsYWMig= -k8s.io/apimachinery v0.19.3/go.mod h1:DnPGDnARWFvYa3pMHgSxtbZb7gpzzAZ1pTfaUNDVlmA= +k8s.io/apimachinery v0.19.2/go.mod h1:DnPGDnARWFvYa3pMHgSxtbZb7gpzzAZ1pTfaUNDVlmA= k8s.io/apimachinery v0.19.4 h1:+ZoddM7nbzrDCp0T3SWnyxqf8cbWPT2fkZImoyvHUG0= k8s.io/apimachinery v0.19.4/go.mod h1:DnPGDnARWFvYa3pMHgSxtbZb7gpzzAZ1pTfaUNDVlmA= -k8s.io/apiserver v0.18.6/go.mod h1:Zt2XvTHuaZjBz6EFYzpp+X4hTmgWGy8AthNVnTdm3Wg= k8s.io/apiserver v0.18.8/go.mod h1:12u5FuGql8Cc497ORNj79rhPdiXQC4bf53X/skR/1YM= +k8s.io/apiserver v0.19.2/go.mod h1:FreAq0bJ2vtZFj9Ago/X0oNGC51GfubKK/ViOKfVAOA= k8s.io/apiserver v0.19.4/go.mod h1:X8WRHCR1UGZDd7HpV0QDc1h/6VbbpAeAGyxSh8yzZXw= k8s.io/client-go v0.17.0/go.mod h1:TYgR6EUHs6k45hb6KWjVD6jFZvJV4gHDikv/It0xz+k= -k8s.io/client-go v0.18.6/go.mod h1:/fwtGLjYMS1MaM5oi+eXhKwG+1UHidUEXRh6cNsdO0Q= k8s.io/client-go v0.18.8/go.mod h1:HqFqMllQ5NnQJNwjro9k5zMyfhZlOwpuTLVrxjkYSxU= +k8s.io/client-go v0.19.2/go.mod h1:S5wPhCqyDNAlzM9CnEdgTGV4OqhsW3jGO1UM1epwfJA= k8s.io/client-go v0.19.4 h1:85D3mDNoLF+xqpyE9Dh/OtrJDyJrSRKkHmDXIbEzer8= k8s.io/client-go v0.19.4/go.mod h1:ZrEy7+wj9PjH5VMBCuu/BDlvtUAku0oVFk4MmnW9mWA= k8s.io/cloud-provider v0.18.8/go.mod h1:cn9AlzMPVIXA4HHLVbgGUigaQlZyHSZ7WAwDEFNrQSs= k8s.io/code-generator v0.17.2/go.mod h1:DVmfPQgxQENqDIzVR2ddLXMH34qeszkKSdH/N+s+38s= -k8s.io/code-generator v0.18.6/go.mod h1:TgNEVx9hCyPGpdtCWA34olQYLkh3ok9ar7XfSsr8b6c= +k8s.io/code-generator v0.19.2/go.mod h1:moqLn7w0t9cMs4+5CQyxnfA/HV8MF6aAVENF+WZZhgk= k8s.io/code-generator v0.19.4/go.mod h1:moqLn7w0t9cMs4+5CQyxnfA/HV8MF6aAVENF+WZZhgk= -k8s.io/component-base v0.18.6/go.mod h1:knSVsibPR5K6EW2XOjEHik6sdU5nCvKMrzMt2D4In14= k8s.io/component-base v0.18.8/go.mod h1:00frPRDas29rx58pPCxNkhUfPbwajlyyvu8ruNgSErU= +k8s.io/component-base v0.19.2/go.mod h1:g5LrsiTiabMLZ40AR6Hl45f088DevyGY+cCE2agEIVo= +k8s.io/component-base v0.19.4 h1:HobPRToQ8KJ9ubRju6PUAk9I5V1GNMJZ4PyWbiWA0uI= k8s.io/component-base v0.19.4/go.mod h1:ZzuSLlsWhajIDEkKF73j64Gz/5o0AgON08FgRbEPI70= k8s.io/csi-translation-lib v0.18.8/go.mod h1:6cA6Btlzxy9s3QrS4BCZzQqclIWnTLr6Jx3H2ctAzY4= k8s.io/gengo v0.0.0-20190128074634-0689ccc1d7d6/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0= k8s.io/gengo v0.0.0-20190822140433-26a664648505/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0= -k8s.io/gengo v0.0.0-20200114144118-36b2048a9120/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0= k8s.io/gengo v0.0.0-20200413195148-3a45101e95ac/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0= k8s.io/gengo v0.0.0-20200428234225-8167cfdcfc14/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0= k8s.io/klog v0.0.0-20181102134211-b9b56d5dfc92/go.mod h1:Gq+BEi5rUBO/HRz0bTSXDUcqjScdoY3a9IHpCEIOOfk= @@ -1065,9 +1094,10 @@ k8s.io/kube-openapi v0.0.0-20200805222855-6aeccd4b50c6/go.mod h1:UuqjUnNftUyPE5H k8s.io/legacy-cloud-providers v0.18.8/go.mod h1:tgp4xYf6lvjrWnjQwTOPvWQE9IVqSBGPF4on0IyICQE= k8s.io/utils v0.0.0-20191114184206-e782cd3c129f/go.mod h1:sZAwmy6armz5eXlNoLmJcl4F1QuKu7sr+mFQ0byX7Ew= k8s.io/utils v0.0.0-20200324210504-a9aa75ae1b89/go.mod h1:sZAwmy6armz5eXlNoLmJcl4F1QuKu7sr+mFQ0byX7Ew= -k8s.io/utils v0.0.0-20200603063816-c1c6865ac451/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA= k8s.io/utils v0.0.0-20200729134348-d5654de09c73 h1:uJmqzgNWG7XyClnU/mLPBWwfKKF1K8Hf8whTseBgJcg= k8s.io/utils v0.0.0-20200729134348-d5654de09c73/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA= +k8s.io/utils v0.0.0-20200912215256-4140de9c8800 h1:9ZNvfPvVIEsp/T1ez4GQuzCcCTEQWhovSofhqR73A6g= +k8s.io/utils v0.0.0-20200912215256-4140de9c8800/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA= modernc.org/cc v1.0.0/go.mod h1:1Sk4//wdnYJiUIxnW8ddKpaOJCF37yAdqYnkxUpaYxw= modernc.org/golex v1.0.0/go.mod h1:b/QX9oBD/LhixY6NDh+IdGv17hgB+51fET1i2kPSmvk= modernc.org/mathutil v1.0.0/go.mod h1:wU0vUrJsVWBZ4P6e7xtFJEhFSNsfRLJ8H458uRjg03k= @@ -1081,9 +1111,8 @@ rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0= rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA= sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.0.7/go.mod h1:PHgbrJT7lCHcxMU+mDHEm+nx46H4zuuHZkDP6icnhu0= sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.0.9/go.mod h1:dzAXnQbTRyDlZPJX2SUPEqvnB+j7AJjtlox7PEwigU0= -sigs.k8s.io/controller-runtime v0.6.3/go.mod h1:WlZNXcM0++oyaQt4B7C2lEE5JYRs8vJUzRP4N4JpdAY= -sigs.k8s.io/controller-runtime v0.6.4 h1:4013CKsBs5bEqo+LevzDett+LLxag/FjQWG94nVZ/9g= -sigs.k8s.io/controller-runtime v0.6.4/go.mod h1:WlZNXcM0++oyaQt4B7C2lEE5JYRs8vJUzRP4N4JpdAY= +sigs.k8s.io/controller-runtime v0.7.0 h1:bU20IBBEPccWz5+zXpLnpVsgBYxqclaHu1pVDl/gEt8= +sigs.k8s.io/controller-runtime v0.7.0/go.mod h1:pJ3YBrJiAqMAZKi6UVGuE98ZrroV1p+pIhoHsMm9wdU= sigs.k8s.io/kustomize/api v0.7.0 h1:djxH9k1izeU1BvdP1i23qqKwhmWu2BuKNEKr/Da7Dpw= sigs.k8s.io/kustomize/api v0.7.0/go.mod h1:3TxKEyaxwOIfHmRbQF14hDUSRmVQI0iSn8qDA5zaO/0= sigs.k8s.io/kustomize/kyaml v0.10.3 h1:ARSJUMN/c3k31DYxRfZ+vp/UepUQjg9zCwny7Oj908I= diff --git a/install/flux.sh b/install/flux.sh index 83c727cb..1394b97c 100755 --- a/install/flux.sh +++ b/install/flux.sh @@ -76,7 +76,7 @@ setup_tmp() { TMP_HASH="${TMP_DIR}/flux.hash" TMP_BIN="${TMP_DIR}/flux.tar.gz" cleanup() { - code=$? + local code=$? set +e trap - EXIT rm -rf "${TMP_DIR}" @@ -120,9 +120,51 @@ download() { [[ $? -eq 0 ]] || fatal 'Download failed' } +# Version comparison +# Returns 0 on '=', 1 on '>', and 2 on '<'. +# Ref: https://stackoverflow.com/a/4025065 +vercomp () { + if [[ $1 == $2 ]] + then + return 0 + fi + local IFS=. + local i ver1=($1) ver2=($2) + # fill empty fields in ver1 with zeros + for ((i=${#ver1[@]}; i<${#ver2[@]}; i++)) + do + ver1[i]=0 + done + for ((i=0; i<${#ver1[@]}; i++)) + do + if [[ -z ${ver2[i]} ]] + then + # fill empty fields in ver2 with zeros + ver2[i]=0 + fi + if ((10#${ver1[i]} > 10#${ver2[i]})) + then + return 1 + fi + if ((10#${ver1[i]} < 10#${ver2[i]})) + then + return 2 + fi + done + return 0 +} + # Download hash from Github URL download_hash() { - HASH_URL="https://github.com/${GITHUB_REPO}/releases/download/v${VERSION_FLUX}/flux2_${VERSION_FLUX}_checksums.txt" + HASH_URL="https://github.com/${GITHUB_REPO}/releases/download/v${VERSION_FLUX}/flux_${VERSION_FLUX}_checksums.txt" + # NB: support the checksum filename format prior to v0.6.0 + set +e + vercomp ${VERSION_FLUX} 0.6.0 + if [[ $? -eq 2 ]]; then + HASH_URL="https://github.com/${GITHUB_REPO}/releases/download/v${VERSION_FLUX}/flux2_${VERSION_FLUX}_checksums.txt" + fi + set -e + info "Downloading hash ${HASH_URL}" download "${TMP_HASH}" "${HASH_URL}" HASH_EXPECTED=$(grep " flux_${VERSION_FLUX}_${OS}_${ARCH}.tar.gz$" "${TMP_HASH}") diff --git a/internal/utils/utils.go b/internal/utils/utils.go index fd38a9d9..08b81451 100644 --- a/internal/utils/utils.go +++ b/internal/utils/utils.go @@ -21,6 +21,7 @@ import ( "bytes" "context" "fmt" + "github.com/fluxcd/flux2/pkg/manifestgen/install" "io" "io/ioutil" "os" @@ -66,7 +67,7 @@ const ( func ExecKubectlCommand(ctx context.Context, mode ExecMode, kubeConfigPath string, kubeContext string, args ...string) (string, error) { var stdoutBuf, stderrBuf bytes.Buffer - if kubeConfigPath != "" { + if kubeConfigPath != "" && len(filepath.SplitList(kubeConfigPath)) == 1 { args = append(args, "--kubeconfig="+kubeConfigPath) } @@ -380,3 +381,15 @@ func PrintTable(writer io.Writer, header []string, rows [][]string) { table.AppendBulk(rows) table.Render() } + +func ValidateComponents(components []string) error { + defaults := install.MakeDefaultOptions() + bootstrapAllComponents := append(defaults.Components, defaults.ComponentsExtra...) + for _, component := range components { + if !ContainsItemString(bootstrapAllComponents, component) { + return fmt.Errorf("component %s is not available", component) + } + } + + return nil +} diff --git a/manifests/bases/helm-controller/kustomization.yaml b/manifests/bases/helm-controller/kustomization.yaml index 7ba5d108..385aa05c 100644 --- a/manifests/bases/helm-controller/kustomization.yaml +++ b/manifests/bases/helm-controller/kustomization.yaml @@ -1,8 +1,8 @@ apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: -- https://github.com/fluxcd/helm-controller/archive/v0.4.4.zip//helm-controller-0.4.4/config/crd -- https://github.com/fluxcd/helm-controller/archive/v0.4.4.zip//helm-controller-0.4.4/config/manager +- https://github.com/fluxcd/helm-controller/archive/v0.5.1.zip//helm-controller-0.5.1/config/crd +- https://github.com/fluxcd/helm-controller/archive/v0.5.1.zip//helm-controller-0.5.1/config/manager patchesJson6902: - target: group: apps diff --git a/manifests/bases/image-automation-controller/kustomization.yaml b/manifests/bases/image-automation-controller/kustomization.yaml index 2edf16cb..33589536 100644 --- a/manifests/bases/image-automation-controller/kustomization.yaml +++ b/manifests/bases/image-automation-controller/kustomization.yaml @@ -1,8 +1,8 @@ apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: -- https://github.com/fluxcd/image-automation-controller/archive/v0.1.0.zip//image-automation-controller-0.1.0/config/crd -- https://github.com/fluxcd/image-automation-controller/archive/v0.1.0.zip//image-automation-controller-0.1.0/config/manager +- https://github.com/fluxcd/image-automation-controller/archive/v0.3.0.zip//image-automation-controller-0.3.0/config/crd +- https://github.com/fluxcd/image-automation-controller/archive/v0.3.0.zip//image-automation-controller-0.3.0/config/manager patchesJson6902: - target: group: apps diff --git a/manifests/bases/image-reflector-controller/kustomization.yaml b/manifests/bases/image-reflector-controller/kustomization.yaml index 79486db4..9412a090 100644 --- a/manifests/bases/image-reflector-controller/kustomization.yaml +++ b/manifests/bases/image-reflector-controller/kustomization.yaml @@ -1,8 +1,8 @@ apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: -- https://github.com/fluxcd/image-reflector-controller/archive/v0.1.0.zip//image-reflector-controller-0.1.0/config/crd -- https://github.com/fluxcd/image-reflector-controller/archive/v0.1.0.zip//image-reflector-controller-0.1.0/config/manager +- https://github.com/fluxcd/image-reflector-controller/archive/v0.2.0.zip//image-reflector-controller-0.2.0/config/crd +- https://github.com/fluxcd/image-reflector-controller/archive/v0.2.0.zip//image-reflector-controller-0.2.0/config/manager patchesJson6902: - target: group: apps diff --git a/manifests/bases/kustomize-controller/kustomization.yaml b/manifests/bases/kustomize-controller/kustomization.yaml index 0342c74b..66e103bc 100644 --- a/manifests/bases/kustomize-controller/kustomization.yaml +++ b/manifests/bases/kustomize-controller/kustomization.yaml @@ -1,8 +1,8 @@ apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: -- https://github.com/fluxcd/kustomize-controller/archive/v0.5.3.zip//kustomize-controller-0.5.3/config/crd -- https://github.com/fluxcd/kustomize-controller/archive/v0.5.3.zip//kustomize-controller-0.5.3/config/manager +- https://github.com/fluxcd/kustomize-controller/archive/v0.6.1.zip//kustomize-controller-0.6.1/config/crd +- https://github.com/fluxcd/kustomize-controller/archive/v0.6.1.zip//kustomize-controller-0.6.1/config/manager patchesJson6902: - target: group: apps diff --git a/manifests/bases/notification-controller/kustomization.yaml b/manifests/bases/notification-controller/kustomization.yaml index a39280fb..2a7af04d 100644 --- a/manifests/bases/notification-controller/kustomization.yaml +++ b/manifests/bases/notification-controller/kustomization.yaml @@ -1,5 +1,5 @@ apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: -- https://github.com/fluxcd/notification-controller/archive/v0.5.0.zip//notification-controller-0.5.0/config/crd -- https://github.com/fluxcd/notification-controller/archive/v0.5.0.zip//notification-controller-0.5.0/config/manager +- https://github.com/fluxcd/notification-controller/archive/v0.6.1.zip//notification-controller-0.6.1/config/crd +- https://github.com/fluxcd/notification-controller/archive/v0.6.1.zip//notification-controller-0.6.1/config/manager diff --git a/manifests/bases/source-controller/kustomization.yaml b/manifests/bases/source-controller/kustomization.yaml index 30a1a780..ae52f8fd 100644 --- a/manifests/bases/source-controller/kustomization.yaml +++ b/manifests/bases/source-controller/kustomization.yaml @@ -1,8 +1,8 @@ apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: -- https://github.com/fluxcd/source-controller/archive/v0.5.6.zip//source-controller-0.5.6/config/crd -- https://github.com/fluxcd/source-controller/archive/v0.5.6.zip//source-controller-0.5.6/config/manager +- https://github.com/fluxcd/source-controller/archive/v0.6.1.zip//source-controller-0.6.1/config/crd +- https://github.com/fluxcd/source-controller/archive/v0.6.1.zip//source-controller-0.6.1/config/manager patchesJson6902: - target: group: apps diff --git a/manifests/policies/deny-ingress.yaml b/manifests/policies/deny-ingress.yaml index 5577032b..a7813719 100644 --- a/manifests/policies/deny-ingress.yaml +++ b/manifests/policies/deny-ingress.yaml @@ -5,7 +5,10 @@ metadata: spec: policyTypes: - Ingress + - Egress ingress: - from: - podSelector: {} + egress: + - {} podSelector: {} diff --git a/mkdocs.yml b/mkdocs.yml index 8fc0566d..f5d3cf9c 100644 --- a/mkdocs.yml +++ b/mkdocs.yml @@ -44,6 +44,7 @@ markdown_extensions: nav: - Introduction: index.md + - Core Concepts: core-concepts/index.md - Get Started: get-started/index.md - Guides: - Installation: guides/installation.md @@ -100,6 +101,7 @@ nav: - Create tenant: cmd/flux_create_tenant.md - Create secret: cmd/flux_create_secret.md - Create secret git: cmd/flux_create_secret_git.md + - Create secret helm: cmd/flux_create_secret_helm.md - Delete: cmd/flux_delete.md - Delete kustomization: cmd/flux_delete_kustomization.md - Delete helmrelease: cmd/flux_delete_helmrelease.md diff --git a/pkg/manifestgen/install/options.go b/pkg/manifestgen/install/options.go index 1197b59b..0a15f821 100644 --- a/pkg/manifestgen/install/options.go +++ b/pkg/manifestgen/install/options.go @@ -23,10 +23,10 @@ type Options struct { Version string Namespace string Components []string + ComponentsExtra []string EventsAddr string Registry string ImagePullSecret string - Arch string WatchAllNamespaces bool NetworkPolicy bool LogLevel string @@ -42,10 +42,10 @@ func MakeDefaultOptions() Options { Version: "latest", Namespace: "flux-system", Components: []string{"source-controller", "kustomize-controller", "helm-controller", "notification-controller"}, + ComponentsExtra: []string{"image-reflector-controller", "image-automation-controller"}, EventsAddr: "", Registry: "ghcr.io/fluxcd", ImagePullSecret: "", - Arch: "amd64", WatchAllNamespaces: true, NetworkPolicy: true, LogLevel: "info", diff --git a/pkg/manifestgen/install/templates.go b/pkg/manifestgen/install/templates.go index 543b2b33..e870f4f6 100644 --- a/pkg/manifestgen/install/templates.go +++ b/pkg/manifestgen/install/templates.go @@ -28,7 +28,6 @@ var kustomizationTmpl = `--- {{- $eventsAddr := .EventsAddr }} {{- $watchAllNamespaces := .WatchAllNamespaces }} {{- $registry := .Registry }} -{{- $arch := .Arch }} {{- $logLevel := .LogLevel }} {{- $clusterDomain := .ClusterDomain }} apiVersion: kustomize.config.k8s.io/v1beta1 @@ -110,11 +109,7 @@ patchesJson6902: images: {{- range $i, $component := .Components }} - name: fluxcd/{{$component}} -{{- if eq $arch "amd64" }} newName: {{$registry}}/{{$component}} -{{- else }} - newName: {{$registry}}/{{$component}}-arm64 -{{- end }} {{- end }} {{- end }} ` @@ -136,7 +131,6 @@ spec: template: spec: nodeSelector: - kubernetes.io/arch: {{.Arch}} kubernetes.io/os: linux {{- if .ImagePullSecret }} imagePullSecrets: diff --git a/pkg/manifestgen/sync/options.go b/pkg/manifestgen/sync/options.go index 411612af..4fb5955a 100644 --- a/pkg/manifestgen/sync/options.go +++ b/pkg/manifestgen/sync/options.go @@ -16,26 +16,32 @@ limitations under the License. package sync -import "time" +import ( + "time" + + sourcev1 "github.com/fluxcd/source-controller/api/v1beta1" +) type Options struct { - Interval time.Duration - URL string - Name string - Namespace string - Branch string - TargetPath string - ManifestFile string + Interval time.Duration + URL string + Name string + Namespace string + Branch string + TargetPath string + ManifestFile string + GitImplementation string } func MakeDefaultOptions() Options { return Options{ - Interval: 1 * time.Minute, - URL: "", - Name: "flux-system", - Namespace: "flux-system", - Branch: "main", - ManifestFile: "gotk-sync.yaml", - TargetPath: "", + Interval: 1 * time.Minute, + URL: "", + Name: "flux-system", + Namespace: "flux-system", + Branch: "main", + ManifestFile: "gotk-sync.yaml", + TargetPath: "", + GitImplementation: sourcev1.GoGitImplementation, } } diff --git a/pkg/manifestgen/sync/sync.go b/pkg/manifestgen/sync/sync.go index e2d3c116..d112f6dd 100644 --- a/pkg/manifestgen/sync/sync.go +++ b/pkg/manifestgen/sync/sync.go @@ -19,7 +19,7 @@ package sync import ( "bytes" "fmt" - "path/filepath" + "path" "strings" "time" @@ -55,6 +55,7 @@ func Generate(options Options) (*manifestgen.Manifest, error) { SecretRef: &corev1.LocalObjectReference{ Name: options.Name, }, + GitImplementation: options.GitImplementation, }, } @@ -93,7 +94,7 @@ func Generate(options Options) (*manifestgen.Manifest, error) { } return &manifestgen.Manifest{ - Path: filepath.Join(options.TargetPath, options.Namespace, options.ManifestFile), + Path: path.Join(options.TargetPath, options.Namespace, options.ManifestFile), Content: fmt.Sprintf("---\n%s---\n%s", resourceToString(gitData), resourceToString(ksData)), }, nil }