mirror of https://github.com/fluxcd/flux2.git
				
				
				
			
			You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
	
	
		
			250 lines
		
	
	
		
			7.7 KiB
		
	
	
	
		
			Go
		
	
			
		
		
	
	
			250 lines
		
	
	
		
			7.7 KiB
		
	
	
	
		
			Go
		
	
| /*
 | |
| Copyright 2020 The Flux authors
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package main
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/spf13/cobra"
 | |
| 	corev1 "k8s.io/api/core/v1"
 | |
| 	"k8s.io/apimachinery/pkg/api/errors"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/types"
 | |
| 	"k8s.io/apimachinery/pkg/util/wait"
 | |
| 	"sigs.k8s.io/controller-runtime/pkg/client"
 | |
| 
 | |
| 	"github.com/fluxcd/pkg/apis/meta"
 | |
| 
 | |
| 	sourcev1 "github.com/fluxcd/source-controller/api/v1"
 | |
| 
 | |
| 	"github.com/fluxcd/flux2/v2/internal/flags"
 | |
| 	"github.com/fluxcd/flux2/v2/internal/utils"
 | |
| )
 | |
| 
 | |
| var createSourceBucketCmd = &cobra.Command{
 | |
| 	Use:   "bucket [name]",
 | |
| 	Short: "Create or update a Bucket source",
 | |
| 	Long: `The create source bucket command generates a Bucket resource and waits for it to be downloaded.
 | |
| For Buckets with static authentication, the credentials are stored in a Kubernetes secret.`,
 | |
| 	Example: `  # Create a source for a Bucket using static authentication
 | |
|   flux create source bucket podinfo \
 | |
| 	--bucket-name=podinfo \
 | |
|     --endpoint=minio.minio.svc.cluster.local:9000 \
 | |
| 	--insecure=true \
 | |
| 	--access-key=myaccesskey \
 | |
| 	--secret-key=mysecretkey \
 | |
|     --interval=10m
 | |
| 
 | |
|   # Create a source for an Amazon S3 Bucket using IAM authentication
 | |
|   flux create source bucket podinfo \
 | |
| 	--bucket-name=podinfo \
 | |
| 	--provider=aws \
 | |
|     --endpoint=s3.amazonaws.com \
 | |
| 	--region=us-east-1 \
 | |
|     --interval=10m`,
 | |
| 	RunE: createSourceBucketCmdRun,
 | |
| }
 | |
| 
 | |
| type sourceBucketFlags struct {
 | |
| 	name           string
 | |
| 	provider       flags.SourceBucketProvider
 | |
| 	endpoint       string
 | |
| 	accessKey      string
 | |
| 	secretKey      string
 | |
| 	region         string
 | |
| 	insecure       bool
 | |
| 	secretRef      string
 | |
| 	proxySecretRef string
 | |
| 	ignorePaths    []string
 | |
| }
 | |
| 
 | |
| var sourceBucketArgs = newSourceBucketFlags()
 | |
| 
 | |
| func init() {
 | |
| 	createSourceBucketCmd.Flags().Var(&sourceBucketArgs.provider, "provider", sourceBucketArgs.provider.Description())
 | |
| 	createSourceBucketCmd.Flags().StringVar(&sourceBucketArgs.name, "bucket-name", "", "the bucket name")
 | |
| 	createSourceBucketCmd.Flags().StringVar(&sourceBucketArgs.endpoint, "endpoint", "", "the bucket endpoint address")
 | |
| 	createSourceBucketCmd.Flags().StringVar(&sourceBucketArgs.accessKey, "access-key", "", "the bucket access key")
 | |
| 	createSourceBucketCmd.Flags().StringVar(&sourceBucketArgs.secretKey, "secret-key", "", "the bucket secret key")
 | |
| 	createSourceBucketCmd.Flags().StringVar(&sourceBucketArgs.region, "region", "", "the bucket region")
 | |
| 	createSourceBucketCmd.Flags().BoolVar(&sourceBucketArgs.insecure, "insecure", false, "for when connecting to a non-TLS S3 HTTP endpoint")
 | |
| 	createSourceBucketCmd.Flags().StringVar(&sourceBucketArgs.secretRef, "secret-ref", "", "the name of an existing secret containing credentials")
 | |
| 	createSourceBucketCmd.Flags().StringVar(&sourceBucketArgs.proxySecretRef, "proxy-secret-ref", "", "the name of an existing secret containing the proxy address and credentials")
 | |
| 	createSourceBucketCmd.Flags().StringSliceVar(&sourceBucketArgs.ignorePaths, "ignore-paths", nil, "set paths to ignore in bucket resource (can specify multiple paths with commas: path1,path2)")
 | |
| 
 | |
| 	createSourceCmd.AddCommand(createSourceBucketCmd)
 | |
| }
 | |
| 
 | |
| func newSourceBucketFlags() sourceBucketFlags {
 | |
| 	return sourceBucketFlags{
 | |
| 		provider: flags.SourceBucketProvider(sourcev1.BucketProviderGeneric),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func createSourceBucketCmdRun(cmd *cobra.Command, args []string) error {
 | |
| 	name := args[0]
 | |
| 
 | |
| 	if sourceBucketArgs.name == "" {
 | |
| 		return fmt.Errorf("bucket-name is required")
 | |
| 	}
 | |
| 
 | |
| 	if sourceBucketArgs.endpoint == "" {
 | |
| 		return fmt.Errorf("endpoint is required")
 | |
| 	}
 | |
| 
 | |
| 	sourceLabels, err := parseLabels()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	var ignorePaths *string
 | |
| 	if len(sourceBucketArgs.ignorePaths) > 0 {
 | |
| 		ignorePathsStr := strings.Join(sourceBucketArgs.ignorePaths, "\n")
 | |
| 		ignorePaths = &ignorePathsStr
 | |
| 	}
 | |
| 
 | |
| 	bucket := &sourcev1.Bucket{
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Name:      name,
 | |
| 			Namespace: *kubeconfigArgs.Namespace,
 | |
| 			Labels:    sourceLabels,
 | |
| 		},
 | |
| 		Spec: sourcev1.BucketSpec{
 | |
| 			BucketName: sourceBucketArgs.name,
 | |
| 			Provider:   sourceBucketArgs.provider.String(),
 | |
| 			Insecure:   sourceBucketArgs.insecure,
 | |
| 			Endpoint:   sourceBucketArgs.endpoint,
 | |
| 			Region:     sourceBucketArgs.region,
 | |
| 			Interval: metav1.Duration{
 | |
| 				Duration: createArgs.interval,
 | |
| 			},
 | |
| 			Ignore: ignorePaths,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	if createSourceArgs.fetchTimeout > 0 {
 | |
| 		bucket.Spec.Timeout = &metav1.Duration{Duration: createSourceArgs.fetchTimeout}
 | |
| 	}
 | |
| 
 | |
| 	if sourceBucketArgs.secretRef != "" {
 | |
| 		bucket.Spec.SecretRef = &meta.LocalObjectReference{
 | |
| 			Name: sourceBucketArgs.secretRef,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if sourceBucketArgs.proxySecretRef != "" {
 | |
| 		bucket.Spec.ProxySecretRef = &meta.LocalObjectReference{
 | |
| 			Name: sourceBucketArgs.proxySecretRef,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if createArgs.export {
 | |
| 		return printExport(exportBucket(bucket))
 | |
| 	}
 | |
| 
 | |
| 	ctx, cancel := context.WithTimeout(context.Background(), rootArgs.timeout)
 | |
| 	defer cancel()
 | |
| 
 | |
| 	kubeClient, err := utils.KubeClient(kubeconfigArgs, kubeclientOptions)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	logger.Generatef("generating Bucket source")
 | |
| 
 | |
| 	if sourceBucketArgs.secretRef == "" {
 | |
| 		secretName := fmt.Sprintf("bucket-%s", name)
 | |
| 
 | |
| 		secret := corev1.Secret{
 | |
| 			ObjectMeta: metav1.ObjectMeta{
 | |
| 				Name:      secretName,
 | |
| 				Namespace: *kubeconfigArgs.Namespace,
 | |
| 				Labels:    sourceLabels,
 | |
| 			},
 | |
| 			StringData: map[string]string{},
 | |
| 		}
 | |
| 
 | |
| 		if sourceBucketArgs.accessKey != "" && sourceBucketArgs.secretKey != "" {
 | |
| 			secret.StringData["accesskey"] = sourceBucketArgs.accessKey
 | |
| 			secret.StringData["secretkey"] = sourceBucketArgs.secretKey
 | |
| 		}
 | |
| 
 | |
| 		if len(secret.StringData) > 0 {
 | |
| 			logger.Actionf("applying secret with the bucket credentials")
 | |
| 			if err := upsertSecret(ctx, kubeClient, secret); err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			bucket.Spec.SecretRef = &meta.LocalObjectReference{
 | |
| 				Name: secretName,
 | |
| 			}
 | |
| 			logger.Successf("authentication configured")
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	logger.Actionf("applying Bucket source")
 | |
| 	namespacedName, err := upsertBucket(ctx, kubeClient, bucket)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	logger.Waitingf("waiting for Bucket source reconciliation")
 | |
| 	if err := wait.PollUntilContextTimeout(ctx, rootArgs.pollInterval, rootArgs.timeout, true,
 | |
| 		isObjectReadyConditionFunc(kubeClient, namespacedName, bucket)); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	logger.Successf("Bucket source reconciliation completed")
 | |
| 
 | |
| 	if bucket.Status.Artifact == nil {
 | |
| 		return fmt.Errorf("Bucket source reconciliation but no artifact was found")
 | |
| 	}
 | |
| 	logger.Successf("fetched revision: %s", bucket.Status.Artifact.Revision)
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func upsertBucket(ctx context.Context, kubeClient client.Client,
 | |
| 	bucket *sourcev1.Bucket) (types.NamespacedName, error) {
 | |
| 	namespacedName := types.NamespacedName{
 | |
| 		Namespace: bucket.GetNamespace(),
 | |
| 		Name:      bucket.GetName(),
 | |
| 	}
 | |
| 
 | |
| 	var existing sourcev1.Bucket
 | |
| 	err := kubeClient.Get(ctx, namespacedName, &existing)
 | |
| 	if err != nil {
 | |
| 		if errors.IsNotFound(err) {
 | |
| 			if err := kubeClient.Create(ctx, bucket); err != nil {
 | |
| 				return namespacedName, err
 | |
| 			} else {
 | |
| 				logger.Successf("Bucket source created")
 | |
| 				return namespacedName, nil
 | |
| 			}
 | |
| 		}
 | |
| 		return namespacedName, err
 | |
| 	}
 | |
| 
 | |
| 	existing.Labels = bucket.Labels
 | |
| 	existing.Spec = bucket.Spec
 | |
| 	if err := kubeClient.Update(ctx, &existing); err != nil {
 | |
| 		return namespacedName, err
 | |
| 	}
 | |
| 	bucket = &existing
 | |
| 	logger.Successf("Bucket source updated")
 | |
| 	return namespacedName, nil
 | |
| }
 |