package main import ( "context" "crypto/elliptic" "fmt" "io/ioutil" "net/url" "os" "strings" sourcev1 "github.com/fluxcd/source-controller/api/v1alpha1" "github.com/manifoldco/promptui" "github.com/spf13/cobra" corev1 "k8s.io/api/core/v1" "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/types" "k8s.io/apimachinery/pkg/util/wait" "sigs.k8s.io/controller-runtime/pkg/client" "github.com/fluxcd/toolkit/internal/ssh" ) var createSourceGitCmd = &cobra.Command{ Use: "git [name]", Short: "Create or update a git source", Long: ` The create source command generates a GitRepository resource and waits for it to sync. For Git over SSH, host and SSH keys are automatically generated and stored in a Kubernetes secret. For private Git repositories, the basic authentication credentials are stored in a Kubernetes secret.`, Example: ` # Create a source from a public Git repository master branch create source git podinfo \ --url=https://github.com/stefanprodan/podinfo \ --branch=master # Create a source from a Git repository pinned to specific git tag create source git podinfo \ --url=https://github.com/stefanprodan/podinfo \ --tag="3.2.3" # Create a source from a public Git repository tag that matches a semver range create source git podinfo \ --url=https://github.com/stefanprodan/podinfo \ --tag-semver=">=3.2.0 <3.3.0" # Create a source from a Git repository using SSH authentication create source git podinfo \ --url=ssh://git@github.com/stefanprodan/podinfo \ --branch=master # Create a source from a Git repository using basic authentication create source git podinfo \ --url=https://github.com/stefanprodan/podinfo \ --username=username \ --password=password `, RunE: createSourceGitCmdRun, } var ( sourceGitURL string sourceGitBranch string sourceGitTag string sourceGitSemver string sourceGitUsername string sourceGitPassword string sourceGitKeyAlgorithm string sourceGitRSABits int ) func init() { createSourceGitCmd.Flags().StringVar(&sourceGitURL, "url", "", "git address, e.g. ssh://git@host/org/repository") createSourceGitCmd.Flags().StringVar(&sourceGitBranch, "branch", "master", "git branch") createSourceGitCmd.Flags().StringVar(&sourceGitTag, "tag", "", "git tag") createSourceGitCmd.Flags().StringVar(&sourceGitSemver, "tag-semver", "", "git tag semver range") createSourceGitCmd.Flags().StringVarP(&sourceGitUsername, "username", "u", "", "basic authentication username") createSourceGitCmd.Flags().StringVarP(&sourceGitPassword, "password", "p", "", "basic authentication password") createSourceGitCmd.Flags().StringVarP(&sourceGitKeyAlgorithm, "ssh-algorithm", "", "rsa", "SSH public key algorithm") createSourceGitCmd.Flags().IntVarP(&sourceGitRSABits, "ssh-rsa-bits", "", 2048, "SSH RSA public key bit size") createSourceCmd.AddCommand(createSourceGitCmd) } func createSourceGitCmdRun(cmd *cobra.Command, args []string) error { if len(args) < 1 { return fmt.Errorf("source name is required") } name := args[0] if sourceGitURL == "" { return fmt.Errorf("git-url is required") } tmpDir, err := ioutil.TempDir("", name) if err != nil { return err } defer os.RemoveAll(tmpDir) u, err := url.Parse(sourceGitURL) if err != nil { return fmt.Errorf("git URL parse failed: %w", err) } ctx, cancel := context.WithTimeout(context.Background(), timeout) defer cancel() withAuth := false if u.Scheme == "ssh" { var keyGen ssh.KeyPairGenerator switch strings.ToLower(sourceGitKeyAlgorithm) { case "rsa": keyGen = ssh.NewRSAGenerator(sourceGitRSABits) case "ecdsa": // TODO(hidde): make curve configurable by flag keyGen = ssh.NewECDSAGenerator(elliptic.P521()) } host := u.Host if u.Port() == "" { host = host + ":22" } if err := generateSSH(ctx, keyGen, name, host, tmpDir); err != nil { return err } withAuth = true } else if sourceGitUsername != "" && sourceGitPassword != "" { if err := generateBasicAuth(ctx, name); err != nil { return err } withAuth = true } if withAuth { logSuccess("authentication configured") } logGenerate("generating source") gitRepository := sourcev1.GitRepository{ ObjectMeta: metav1.ObjectMeta{ Name: name, Namespace: namespace, }, Spec: sourcev1.GitRepositorySpec{ URL: sourceGitURL, Interval: metav1.Duration{ Duration: interval, }, Reference: &sourcev1.GitRepositoryRef{}, }, } if withAuth { gitRepository.Spec.SecretRef = &corev1.LocalObjectReference{ Name: name, } } if sourceGitSemver != "" { gitRepository.Spec.Reference.SemVer = sourceGitSemver } else if sourceGitTag != "" { gitRepository.Spec.Reference.Tag = sourceGitTag } else { gitRepository.Spec.Reference.Branch = sourceGitBranch } kubeClient, err := utils.kubeClient(kubeconfig) if err != nil { return err } logAction("applying source") if err := upsertGitRepository(ctx, kubeClient, gitRepository); err != nil { return err } logWaiting("waiting for git sync") if err := wait.PollImmediate(pollInterval, timeout, isGitRepositoryReady(ctx, kubeClient, name, namespace)); err != nil { return err } logSuccess("git sync completed") namespacedName := types.NamespacedName{ Namespace: namespace, Name: name, } err = kubeClient.Get(ctx, namespacedName, &gitRepository) if err != nil { return fmt.Errorf("git sync failed: %w", err) } if gitRepository.Status.Artifact != nil { logSuccess("fetched revision %s", gitRepository.Status.Artifact.Revision) } else { return fmt.Errorf("git sync failed, artifact not found") } return nil } func generateBasicAuth(ctx context.Context, name string) error { logAction("saving credentials") credentials := fmt.Sprintf("--from-literal=username='%s' --from-literal=password='%s'", sourceGitUsername, sourceGitPassword) secret := fmt.Sprintf("kubectl -n %s create secret generic %s %s --dry-run=client -oyaml | kubectl apply -f-", namespace, name, credentials) if _, err := utils.execCommand(ctx, ModeOS, secret); err != nil { return fmt.Errorf("kubectl create secret failed") } return nil } func generateSSH(ctx context.Context, generator ssh.KeyPairGenerator, name, host, user string) error { logGenerate("generating deploy key") kp, err := generator.Generate() if err != nil { return fmt.Errorf("SSH key pair generation failed: %w", err) } fmt.Printf("%s", kp.PublicKey) prompt := promptui.Prompt{ Label: "Have you added the deploy key to your repository", IsConfirm: true, } if _, err := prompt.Run(); err != nil { return fmt.Errorf("aborting") } logAction("collecting SSH server public key for generated public key algorithm") serverKey, err := ssh.ScanHostKey(host, user, kp) if err != nil { return err } logSuccess("collected public key from SSH server") logAction("saving keys") files := fmt.Sprintf("--from-literal=identity=\"%s\" --from-literal=identity.pub=\"%s\" --from-literal=known_hosts=\"%s\"", kp.PublicKey, kp.PrivateKey, serverKey) secret := fmt.Sprintf("kubectl -n %s create secret generic %s %s --dry-run=client -oyaml | kubectl apply -f-", namespace, name, files) if _, err := utils.execCommand(ctx, ModeOS, secret); err != nil { return fmt.Errorf("create secret failed") } return nil } func upsertGitRepository(ctx context.Context, kubeClient client.Client, gitRepository sourcev1.GitRepository) error { namespacedName := types.NamespacedName{ Namespace: gitRepository.GetNamespace(), Name: gitRepository.GetName(), } var existing sourcev1.GitRepository err := kubeClient.Get(ctx, namespacedName, &existing) if err != nil { if errors.IsNotFound(err) { if err := kubeClient.Create(ctx, &gitRepository); err != nil { return err } else { logSuccess("source created") return nil } } return err } existing.Spec = gitRepository.Spec if err := kubeClient.Update(ctx, &existing); err != nil { return err } logSuccess("source updated") return nil } func isGitRepositoryReady(ctx context.Context, kubeClient client.Client, name, namespace string) wait.ConditionFunc { return func() (bool, error) { var gitRepository sourcev1.GitRepository namespacedName := types.NamespacedName{ Namespace: namespace, Name: name, } err := kubeClient.Get(ctx, namespacedName, &gitRepository) if err != nil { return false, err } for _, condition := range gitRepository.Status.Conditions { if condition.Type == sourcev1.ReadyCondition { if condition.Status == corev1.ConditionTrue { return true, nil } else if condition.Status == corev1.ConditionFalse { return false, fmt.Errorf(condition.Message) } } } return false, nil } }