mirror of
				https://github.com/fluxcd/flux2.git
				synced 2025-10-31 08:17:19 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			375 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			375 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2020 The Flux CD contributors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package main
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"crypto/elliptic"
 | |
| 	"fmt"
 | |
| 	"io/ioutil"
 | |
| 	"net/url"
 | |
| 	"os"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/fluxcd/pkg/apis/meta"
 | |
| 	"github.com/fluxcd/toolkit/internal/flags"
 | |
| 	"github.com/fluxcd/toolkit/internal/utils"
 | |
| 
 | |
| 	sourcev1 "github.com/fluxcd/source-controller/api/v1beta1"
 | |
| 	"github.com/manifoldco/promptui"
 | |
| 	"github.com/spf13/cobra"
 | |
| 	corev1 "k8s.io/api/core/v1"
 | |
| 	"k8s.io/apimachinery/pkg/api/errors"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/types"
 | |
| 	"k8s.io/apimachinery/pkg/util/wait"
 | |
| 	"sigs.k8s.io/controller-runtime/pkg/client"
 | |
| 
 | |
| 	"github.com/fluxcd/pkg/ssh"
 | |
| )
 | |
| 
 | |
| var createSourceGitCmd = &cobra.Command{
 | |
| 	Use:   "git [name]",
 | |
| 	Short: "Create or update a GitRepository source",
 | |
| 	Long: `
 | |
| The create source git command generates a GitRepository resource and waits for it to sync.
 | |
| For Git over SSH, host and SSH keys are automatically generated and stored in a Kubernetes secret.
 | |
| For private Git repositories, the basic authentication credentials are stored in a Kubernetes secret.`,
 | |
| 	Example: `  # Create a source from a public Git repository master branch
 | |
|   gotk create source git podinfo \
 | |
|     --url=https://github.com/stefanprodan/podinfo \
 | |
|     --branch=master
 | |
| 
 | |
|   # Create a source from a Git repository pinned to specific git tag
 | |
|   gotk create source git podinfo \
 | |
|     --url=https://github.com/stefanprodan/podinfo \
 | |
|     --tag="3.2.3"
 | |
| 
 | |
|   # Create a source from a public Git repository tag that matches a semver range
 | |
|   gotk create source git podinfo \
 | |
|     --url=https://github.com/stefanprodan/podinfo \
 | |
|     --tag-semver=">=3.2.0 <3.3.0"
 | |
| 
 | |
|   # Create a source from a Git repository using SSH authentication
 | |
|   gotk create source git podinfo \
 | |
|     --url=ssh://git@github.com/stefanprodan/podinfo \
 | |
|     --branch=master
 | |
| 
 | |
|   # Create a source from a Git repository using SSH authentication and an
 | |
|   # ECDSA P-521 curve public key
 | |
|   gotk create source git podinfo \
 | |
|     --url=ssh://git@github.com/stefanprodan/podinfo \
 | |
|     --branch=master \
 | |
|     --ssh-key-algorithm=ecdsa \
 | |
|     --ssh-ecdsa-curve=p521
 | |
| 
 | |
|   # Create a source from a Git repository using basic authentication
 | |
|   gotk create source git podinfo \
 | |
|     --url=https://github.com/stefanprodan/podinfo \
 | |
|     --username=username \
 | |
|     --password=password
 | |
| `,
 | |
| 	RunE: createSourceGitCmdRun,
 | |
| }
 | |
| 
 | |
| var (
 | |
| 	sourceGitURL          string
 | |
| 	sourceGitBranch       string
 | |
| 	sourceGitTag          string
 | |
| 	sourceGitSemver       string
 | |
| 	sourceGitUsername     string
 | |
| 	sourceGitPassword     string
 | |
| 	sourceGitKeyAlgorithm flags.PublicKeyAlgorithm = "rsa"
 | |
| 	sourceGitRSABits      flags.RSAKeyBits         = 2048
 | |
| 	sourceGitECDSACurve                            = flags.ECDSACurve{Curve: elliptic.P384()}
 | |
| )
 | |
| 
 | |
| func init() {
 | |
| 	createSourceGitCmd.Flags().StringVar(&sourceGitURL, "url", "", "git address, e.g. ssh://git@host/org/repository")
 | |
| 	createSourceGitCmd.Flags().StringVar(&sourceGitBranch, "branch", "master", "git branch")
 | |
| 	createSourceGitCmd.Flags().StringVar(&sourceGitTag, "tag", "", "git tag")
 | |
| 	createSourceGitCmd.Flags().StringVar(&sourceGitSemver, "tag-semver", "", "git tag semver range")
 | |
| 	createSourceGitCmd.Flags().StringVarP(&sourceGitUsername, "username", "u", "", "basic authentication username")
 | |
| 	createSourceGitCmd.Flags().StringVarP(&sourceGitPassword, "password", "p", "", "basic authentication password")
 | |
| 	createSourceGitCmd.Flags().Var(&sourceGitKeyAlgorithm, "ssh-key-algorithm", sourceGitKeyAlgorithm.Description())
 | |
| 	createSourceGitCmd.Flags().Var(&sourceGitRSABits, "ssh-rsa-bits", sourceGitRSABits.Description())
 | |
| 	createSourceGitCmd.Flags().Var(&sourceGitECDSACurve, "ssh-ecdsa-curve", sourceGitECDSACurve.Description())
 | |
| 
 | |
| 	createSourceCmd.AddCommand(createSourceGitCmd)
 | |
| }
 | |
| 
 | |
| func createSourceGitCmdRun(cmd *cobra.Command, args []string) error {
 | |
| 	if len(args) < 1 {
 | |
| 		return fmt.Errorf("GitRepository source name is required")
 | |
| 	}
 | |
| 	name := args[0]
 | |
| 
 | |
| 	if sourceGitURL == "" {
 | |
| 		return fmt.Errorf("url is required")
 | |
| 	}
 | |
| 
 | |
| 	tmpDir, err := ioutil.TempDir("", name)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer os.RemoveAll(tmpDir)
 | |
| 
 | |
| 	u, err := url.Parse(sourceGitURL)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("git URL parse failed: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	sourceLabels, err := parseLabels()
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	gitRepository := sourcev1.GitRepository{
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Name:      name,
 | |
| 			Namespace: namespace,
 | |
| 			Labels:    sourceLabels,
 | |
| 		},
 | |
| 		Spec: sourcev1.GitRepositorySpec{
 | |
| 			URL: sourceGitURL,
 | |
| 			Interval: metav1.Duration{
 | |
| 				Duration: interval,
 | |
| 			},
 | |
| 			Reference: &sourcev1.GitRepositoryRef{},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	if sourceGitSemver != "" {
 | |
| 		gitRepository.Spec.Reference.SemVer = sourceGitSemver
 | |
| 	} else if sourceGitTag != "" {
 | |
| 		gitRepository.Spec.Reference.Tag = sourceGitTag
 | |
| 	} else {
 | |
| 		gitRepository.Spec.Reference.Branch = sourceGitBranch
 | |
| 	}
 | |
| 
 | |
| 	if export {
 | |
| 		return exportGit(gitRepository)
 | |
| 	}
 | |
| 
 | |
| 	ctx, cancel := context.WithTimeout(context.Background(), timeout)
 | |
| 	defer cancel()
 | |
| 
 | |
| 	kubeClient, err := utils.KubeClient(kubeconfig)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	withAuth := false
 | |
| 	// TODO(hidde): move all auth prep to separate func?
 | |
| 	if u.Scheme == "ssh" {
 | |
| 		logger.Actionf("generating deploy key pair")
 | |
| 		pair, err := generateKeyPair(ctx)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		fmt.Printf("%s", pair.PublicKey)
 | |
| 		prompt := promptui.Prompt{
 | |
| 			Label:     "Have you added the deploy key to your repository",
 | |
| 			IsConfirm: true,
 | |
| 		}
 | |
| 		if _, err := prompt.Run(); err != nil {
 | |
| 			return fmt.Errorf("aborting")
 | |
| 		}
 | |
| 
 | |
| 		logger.Actionf("collecting preferred public key from SSH server")
 | |
| 		hostKey, err := scanHostKey(ctx, u)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		logger.Successf("collected public key from SSH server:")
 | |
| 		fmt.Printf("%s", hostKey)
 | |
| 
 | |
| 		logger.Actionf("applying secret with keys")
 | |
| 		secret := corev1.Secret{
 | |
| 			ObjectMeta: metav1.ObjectMeta{
 | |
| 				Name:      name,
 | |
| 				Namespace: namespace,
 | |
| 			},
 | |
| 			StringData: map[string]string{
 | |
| 				"identity":     string(pair.PrivateKey),
 | |
| 				"identity.pub": string(pair.PublicKey),
 | |
| 				"known_hosts":  string(hostKey),
 | |
| 			},
 | |
| 		}
 | |
| 		if err := upsertSecret(ctx, kubeClient, secret); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		withAuth = true
 | |
| 	} else if sourceGitUsername != "" && sourceGitPassword != "" {
 | |
| 		logger.Actionf("applying secret with basic auth credentials")
 | |
| 		secret := corev1.Secret{
 | |
| 			ObjectMeta: metav1.ObjectMeta{
 | |
| 				Name:      name,
 | |
| 				Namespace: namespace,
 | |
| 			},
 | |
| 			StringData: map[string]string{
 | |
| 				"username": sourceGitUsername,
 | |
| 				"password": sourceGitPassword,
 | |
| 			},
 | |
| 		}
 | |
| 		if err := upsertSecret(ctx, kubeClient, secret); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		withAuth = true
 | |
| 	}
 | |
| 
 | |
| 	if withAuth {
 | |
| 		logger.Successf("authentication configured")
 | |
| 	}
 | |
| 
 | |
| 	logger.Generatef("generating GitRepository source")
 | |
| 
 | |
| 	if withAuth {
 | |
| 		gitRepository.Spec.SecretRef = &corev1.LocalObjectReference{
 | |
| 			Name: name,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	logger.Actionf("applying GitRepository source")
 | |
| 	namespacedName, err := upsertGitRepository(ctx, kubeClient, &gitRepository)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	logger.Waitingf("waiting for GitRepository source reconciliation")
 | |
| 	if err := wait.PollImmediate(pollInterval, timeout,
 | |
| 		isGitRepositoryReady(ctx, kubeClient, namespacedName, &gitRepository)); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	logger.Successf("GitRepository source reconciliation completed")
 | |
| 
 | |
| 	if gitRepository.Status.Artifact == nil {
 | |
| 		return fmt.Errorf("GitRepository source reconciliation completed but no artifact was found")
 | |
| 	}
 | |
| 	logger.Successf("fetched revision: %s", gitRepository.Status.Artifact.Revision)
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func generateKeyPair(ctx context.Context) (*ssh.KeyPair, error) {
 | |
| 	var keyGen ssh.KeyPairGenerator
 | |
| 	switch algorithm := sourceGitKeyAlgorithm.String(); algorithm {
 | |
| 	case "rsa":
 | |
| 		keyGen = ssh.NewRSAGenerator(int(sourceGitRSABits))
 | |
| 	case "ecdsa":
 | |
| 		keyGen = ssh.NewECDSAGenerator(sourceGitECDSACurve.Curve)
 | |
| 	case "ed25519":
 | |
| 		keyGen = ssh.NewEd25519Generator()
 | |
| 	default:
 | |
| 		return nil, fmt.Errorf("unsupported public key algorithm: %s", algorithm)
 | |
| 	}
 | |
| 	pair, err := keyGen.Generate()
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("key pair generation failed, error: %w", err)
 | |
| 	}
 | |
| 	return pair, nil
 | |
| }
 | |
| 
 | |
| func scanHostKey(ctx context.Context, url *url.URL) ([]byte, error) {
 | |
| 	host := url.Host
 | |
| 	if url.Port() == "" {
 | |
| 		host = host + ":22"
 | |
| 	}
 | |
| 	hostKey, err := ssh.ScanHostKey(host, 30*time.Second)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("SSH key scan for host %s failed, error: %w", host, err)
 | |
| 	}
 | |
| 	return hostKey, nil
 | |
| }
 | |
| 
 | |
| func upsertSecret(ctx context.Context, kubeClient client.Client, secret corev1.Secret) error {
 | |
| 	namespacedName := types.NamespacedName{
 | |
| 		Namespace: secret.GetNamespace(),
 | |
| 		Name:      secret.GetName(),
 | |
| 	}
 | |
| 
 | |
| 	var existing corev1.Secret
 | |
| 	err := kubeClient.Get(ctx, namespacedName, &existing)
 | |
| 	if err != nil {
 | |
| 		if errors.IsNotFound(err) {
 | |
| 			if err := kubeClient.Create(ctx, &secret); err != nil {
 | |
| 				return err
 | |
| 			} else {
 | |
| 				return nil
 | |
| 			}
 | |
| 		}
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	existing.StringData = secret.StringData
 | |
| 	if err := kubeClient.Update(ctx, &existing); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func upsertGitRepository(ctx context.Context, kubeClient client.Client,
 | |
| 	gitRepository *sourcev1.GitRepository) (types.NamespacedName, error) {
 | |
| 	namespacedName := types.NamespacedName{
 | |
| 		Namespace: gitRepository.GetNamespace(),
 | |
| 		Name:      gitRepository.GetName(),
 | |
| 	}
 | |
| 
 | |
| 	var existing sourcev1.GitRepository
 | |
| 	err := kubeClient.Get(ctx, namespacedName, &existing)
 | |
| 	if err != nil {
 | |
| 		if errors.IsNotFound(err) {
 | |
| 			if err := kubeClient.Create(ctx, gitRepository); err != nil {
 | |
| 				return namespacedName, err
 | |
| 			} else {
 | |
| 				logger.Successf("GitRepository source created")
 | |
| 				return namespacedName, nil
 | |
| 			}
 | |
| 		}
 | |
| 		return namespacedName, err
 | |
| 	}
 | |
| 
 | |
| 	existing.Labels = gitRepository.Labels
 | |
| 	existing.Spec = gitRepository.Spec
 | |
| 	if err := kubeClient.Update(ctx, &existing); err != nil {
 | |
| 		return namespacedName, err
 | |
| 	}
 | |
| 	gitRepository = &existing
 | |
| 	logger.Successf("GitRepository source updated")
 | |
| 	return namespacedName, nil
 | |
| }
 | |
| 
 | |
| func isGitRepositoryReady(ctx context.Context, kubeClient client.Client,
 | |
| 	namespacedName types.NamespacedName, gitRepository *sourcev1.GitRepository) wait.ConditionFunc {
 | |
| 	return func() (bool, error) {
 | |
| 		err := kubeClient.Get(ctx, namespacedName, gitRepository)
 | |
| 		if err != nil {
 | |
| 			return false, err
 | |
| 		}
 | |
| 
 | |
| 		if c := meta.GetCondition(gitRepository.Status.Conditions, meta.ReadyCondition); c != nil {
 | |
| 			switch c.Status {
 | |
| 			case corev1.ConditionTrue:
 | |
| 				return true, nil
 | |
| 			case corev1.ConditionFalse:
 | |
| 				return false, fmt.Errorf(c.Message)
 | |
| 			}
 | |
| 		}
 | |
| 		return false, nil
 | |
| 	}
 | |
| }
 | 
