mirror of
				https://github.com/fluxcd/flux2.git
				synced 2025-10-31 08:17:19 +08:00 
			
		
		
		
	 5ea4e814f5
			
		
	
	5ea4e814f5
	
	
	
		
			
			This commit adds multiple safe guards for relative paths, ensuring they never traverse outside the working directory. The `SafeRelativePath` flag calculates the safe relative path based on a relative base dir, which results in a flattened path. The write methods of `manifestgen` make use of the `SecureJoin` as well, to ensure writes are never outside of the given directory when used as a lib outside of the CLI. Signed-off-by: Hidde Beydals <hello@hidde.co>
		
			
				
	
	
		
			292 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			292 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2020 The Flux authors
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package main
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"io/ioutil"
 | |
| 	"net/url"
 | |
| 	"os"
 | |
| 	"path"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/spf13/cobra"
 | |
| 	corev1 "k8s.io/api/core/v1"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 
 | |
| 	"github.com/fluxcd/pkg/git"
 | |
| 
 | |
| 	"github.com/fluxcd/flux2/internal/flags"
 | |
| 	"github.com/fluxcd/flux2/internal/utils"
 | |
| )
 | |
| 
 | |
| var bootstrapGitHubCmd = &cobra.Command{
 | |
| 	Use:   "github",
 | |
| 	Short: "Bootstrap toolkit components in a GitHub repository",
 | |
| 	Long: `The bootstrap github command creates the GitHub repository if it doesn't exists and
 | |
| commits the toolkit components manifests to the main branch.
 | |
| Then it configures the target cluster to synchronize with the repository.
 | |
| If the toolkit components are present on the cluster,
 | |
| the bootstrap command will perform an upgrade if needed.`,
 | |
| 	Example: `  # Create a GitHub personal access token and export it as an env var
 | |
|   export GITHUB_TOKEN=<my-token>
 | |
| 
 | |
|   # Run bootstrap for a private repo owned by a GitHub organization
 | |
|   flux bootstrap github --owner=<organization> --repository=<repo name>
 | |
| 
 | |
|   # Run bootstrap for a private repo and assign organization teams to it
 | |
|   flux bootstrap github --owner=<organization> --repository=<repo name> --team=<team1 slug> --team=<team2 slug>
 | |
| 
 | |
|   # Run bootstrap for a repository path
 | |
|   flux bootstrap github --owner=<organization> --repository=<repo name> --path=dev-cluster
 | |
| 
 | |
|   # Run bootstrap for a public repository on a personal account
 | |
|   flux bootstrap github --owner=<user> --repository=<repo name> --private=false --personal=true 
 | |
| 
 | |
|   # Run bootstrap for a private repo hosted on GitHub Enterprise using SSH auth
 | |
|   flux bootstrap github --owner=<organization> --repository=<repo name> --hostname=<domain> --ssh-hostname=<domain>
 | |
| 
 | |
|   # Run bootstrap for a private repo hosted on GitHub Enterprise using HTTPS auth
 | |
|   flux bootstrap github --owner=<organization> --repository=<repo name> --hostname=<domain> --token-auth
 | |
| 
 | |
|   # Run bootstrap for a an existing repository with a branch named main
 | |
|   flux bootstrap github --owner=<organization> --repository=<repo name> --branch=main
 | |
| `,
 | |
| 	RunE: bootstrapGitHubCmdRun,
 | |
| }
 | |
| 
 | |
| var (
 | |
| 	ghOwner       string
 | |
| 	ghRepository  string
 | |
| 	ghInterval    time.Duration
 | |
| 	ghPersonal    bool
 | |
| 	ghPrivate     bool
 | |
| 	ghHostname    string
 | |
| 	ghPath        flags.SafeRelativePath
 | |
| 	ghTeams       []string
 | |
| 	ghDelete      bool
 | |
| 	ghSSHHostname string
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	ghDefaultPermission = "maintain"
 | |
| )
 | |
| 
 | |
| func init() {
 | |
| 	bootstrapGitHubCmd.Flags().StringVar(&ghOwner, "owner", "", "GitHub user or organization name")
 | |
| 	bootstrapGitHubCmd.Flags().StringVar(&ghRepository, "repository", "", "GitHub repository name")
 | |
| 	bootstrapGitHubCmd.Flags().StringArrayVar(&ghTeams, "team", []string{}, "GitHub team to be given maintainer access")
 | |
| 	bootstrapGitHubCmd.Flags().BoolVar(&ghPersonal, "personal", false, "is personal repository")
 | |
| 	bootstrapGitHubCmd.Flags().BoolVar(&ghPrivate, "private", true, "is private repository")
 | |
| 	bootstrapGitHubCmd.Flags().DurationVar(&ghInterval, "interval", time.Minute, "sync interval")
 | |
| 	bootstrapGitHubCmd.Flags().StringVar(&ghHostname, "hostname", git.GitHubDefaultHostname, "GitHub hostname")
 | |
| 	bootstrapGitHubCmd.Flags().StringVar(&ghSSHHostname, "ssh-hostname", "", "GitHub SSH hostname, to be used when the SSH host differs from the HTTPS one")
 | |
| 	bootstrapGitHubCmd.Flags().Var(&ghPath, "path", "path relative to the repository root, when specified the cluster sync will be scoped to this path")
 | |
| 
 | |
| 	bootstrapGitHubCmd.Flags().BoolVar(&ghDelete, "delete", false, "delete repository (used for testing only)")
 | |
| 	bootstrapGitHubCmd.Flags().MarkHidden("delete")
 | |
| 
 | |
| 	bootstrapCmd.AddCommand(bootstrapGitHubCmd)
 | |
| }
 | |
| 
 | |
| func bootstrapGitHubCmdRun(cmd *cobra.Command, args []string) error {
 | |
| 	ghToken := os.Getenv(git.GitHubTokenName)
 | |
| 	if ghToken == "" {
 | |
| 		return fmt.Errorf("%s environment variable not found", git.GitHubTokenName)
 | |
| 	}
 | |
| 
 | |
| 	if err := bootstrapValidate(); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	repository, err := git.NewRepository(ghRepository, ghOwner, ghHostname, ghToken, "flux", ghOwner+"@users.noreply.github.com")
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if ghSSHHostname != "" {
 | |
| 		repository.SSHHost = ghSSHHostname
 | |
| 	}
 | |
| 
 | |
| 	provider := &git.GithubProvider{
 | |
| 		IsPrivate:  ghPrivate,
 | |
| 		IsPersonal: ghPersonal,
 | |
| 	}
 | |
| 
 | |
| 	tmpDir, err := ioutil.TempDir("", namespace)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	defer os.RemoveAll(tmpDir)
 | |
| 
 | |
| 	ctx, cancel := context.WithTimeout(context.Background(), timeout)
 | |
| 	defer cancel()
 | |
| 
 | |
| 	if ghDelete {
 | |
| 		if err := provider.DeleteRepository(ctx, repository); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		logger.Successf("repository deleted")
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// create GitHub repository if doesn't exists
 | |
| 	logger.Actionf("connecting to %s", ghHostname)
 | |
| 	changed, err := provider.CreateRepository(ctx, repository)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if changed {
 | |
| 		logger.Successf("repository created")
 | |
| 	}
 | |
| 
 | |
| 	withErrors := false
 | |
| 	// add teams to org repository
 | |
| 	if !ghPersonal {
 | |
| 		for _, team := range ghTeams {
 | |
| 			if changed, err := provider.AddTeam(ctx, repository, team, ghDefaultPermission); err != nil {
 | |
| 				logger.Failuref(err.Error())
 | |
| 				withErrors = true
 | |
| 			} else if changed {
 | |
| 				logger.Successf("%s team access granted", team)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// clone repository and checkout the main branch
 | |
| 	if err := repository.Checkout(ctx, bootstrapBranch, tmpDir); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	logger.Successf("repository cloned")
 | |
| 
 | |
| 	// generate install manifests
 | |
| 	logger.Generatef("generating manifests")
 | |
| 	installManifest, err := generateInstallManifests(ghPath.String(), namespace, tmpDir, bootstrapManifestsPath)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// stage install manifests
 | |
| 	changed, err = repository.Commit(ctx, path.Join(ghPath.String(), namespace), "Add manifests")
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// push install manifests
 | |
| 	if changed {
 | |
| 		if err := repository.Push(ctx); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		logger.Successf("components manifests pushed")
 | |
| 	} else {
 | |
| 		logger.Successf("components are up to date")
 | |
| 	}
 | |
| 
 | |
| 	kubeClient, err := utils.KubeClient(kubeconfig, kubecontext)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// determine if repo synchronization is working
 | |
| 	isInstall := shouldInstallManifests(ctx, kubeClient, namespace)
 | |
| 
 | |
| 	if isInstall {
 | |
| 		// apply install manifests
 | |
| 		logger.Actionf("installing components in %s namespace", namespace)
 | |
| 		if err := applyInstallManifests(ctx, installManifest, bootstrapComponents()); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		logger.Successf("install completed")
 | |
| 	}
 | |
| 
 | |
| 	repoURL := repository.GetURL()
 | |
| 
 | |
| 	if bootstrapTokenAuth {
 | |
| 		// setup HTTPS token auth
 | |
| 		secret := corev1.Secret{
 | |
| 			ObjectMeta: metav1.ObjectMeta{
 | |
| 				Name:      namespace,
 | |
| 				Namespace: namespace,
 | |
| 			},
 | |
| 			StringData: map[string]string{
 | |
| 				"username": "git",
 | |
| 				"password": ghToken,
 | |
| 			},
 | |
| 		}
 | |
| 		if err := upsertSecret(ctx, kubeClient, secret); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	} else {
 | |
| 		// setup SSH deploy key
 | |
| 		repoURL = repository.GetSSH()
 | |
| 		if shouldCreateDeployKey(ctx, kubeClient, namespace) {
 | |
| 			logger.Actionf("configuring deploy key")
 | |
| 			u, err := url.Parse(repository.GetSSH())
 | |
| 			if err != nil {
 | |
| 				return fmt.Errorf("git URL parse failed: %w", err)
 | |
| 			}
 | |
| 
 | |
| 			key, err := generateDeployKey(ctx, kubeClient, u, namespace)
 | |
| 			if err != nil {
 | |
| 				return fmt.Errorf("generating deploy key failed: %w", err)
 | |
| 			}
 | |
| 
 | |
| 			keyName := "flux"
 | |
| 			if ghPath != "" {
 | |
| 				keyName = fmt.Sprintf("flux-%s", ghPath)
 | |
| 			}
 | |
| 
 | |
| 			if changed, err := provider.AddDeployKey(ctx, repository, key, keyName); err != nil {
 | |
| 				return err
 | |
| 			} else if changed {
 | |
| 				logger.Successf("deploy key configured")
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// configure repo synchronization
 | |
| 	logger.Actionf("generating sync manifests")
 | |
| 	syncManifests, err := generateSyncManifests(repoURL, bootstrapBranch, namespace, namespace, ghPath.String(), tmpDir, ghInterval)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// commit and push manifests
 | |
| 	if changed, err = repository.Commit(ctx, path.Join(ghPath.String(), namespace), "Add manifests"); err != nil {
 | |
| 		return err
 | |
| 	} else if changed {
 | |
| 		if err := repository.Push(ctx); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		logger.Successf("sync manifests pushed")
 | |
| 	}
 | |
| 
 | |
| 	// apply manifests and waiting for sync
 | |
| 	logger.Actionf("applying sync manifests")
 | |
| 	if err := applySyncManifests(ctx, kubeClient, namespace, namespace, syncManifests); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if withErrors {
 | |
| 		return fmt.Errorf("bootstrap completed with errors")
 | |
| 	}
 | |
| 
 | |
| 	logger.Successf("bootstrap finished")
 | |
| 	return nil
 | |
| }
 |