mirror of https://github.com/helm/helm
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
281 lines
7.9 KiB
281 lines
7.9 KiB
/*
|
|
Copyright 2016 The Kubernetes Authors All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package installer // import "k8s.io/helm/cmd/helm/installer"
|
|
|
|
import (
|
|
"io/ioutil"
|
|
|
|
"github.com/ghodss/yaml"
|
|
|
|
"k8s.io/kubernetes/pkg/api"
|
|
kerrors "k8s.io/kubernetes/pkg/api/errors"
|
|
"k8s.io/kubernetes/pkg/apis/extensions"
|
|
"k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
|
|
"k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/core/internalversion"
|
|
extensionsclient "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion"
|
|
"k8s.io/kubernetes/pkg/util/intstr"
|
|
)
|
|
|
|
// Install uses kubernetes client to install tiller.
|
|
//
|
|
// Returns an error if the command failed.
|
|
func Install(client internalclientset.Interface, opts *Options) error {
|
|
if err := createDeployment(client.Extensions(), opts); err != nil {
|
|
return err
|
|
}
|
|
if err := createService(client.Core(), opts.Namespace); err != nil {
|
|
return err
|
|
}
|
|
if opts.tls() {
|
|
if err := createSecret(client.Core(), opts); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Upgrade uses kubernetes client to upgrade tiller to current version.
|
|
//
|
|
// Returns an error if the command failed.
|
|
func Upgrade(client internalclientset.Interface, opts *Options) error {
|
|
obj, err := client.Extensions().Deployments(opts.Namespace).Get("tiller-deploy")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
obj.Spec.Template.Spec.Containers[0].Image = opts.selectImage()
|
|
if _, err := client.Extensions().Deployments(opts.Namespace).Update(obj); err != nil {
|
|
return err
|
|
}
|
|
// If the service does not exists that would mean we are upgrading from a tiller version
|
|
// that didn't deploy the service, so install it.
|
|
if _, err := client.Core().Services(opts.Namespace).Get("tiller-deploy"); err != nil {
|
|
if !kerrors.IsNotFound(err) {
|
|
return err
|
|
}
|
|
if err := createService(client.Core(), opts.Namespace); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// createDeployment creates the Tiller deployment reource
|
|
func createDeployment(client extensionsclient.DeploymentsGetter, opts *Options) error {
|
|
obj := deployment(opts)
|
|
_, err := client.Deployments(obj.Namespace).Create(obj)
|
|
return err
|
|
}
|
|
|
|
// deployment gets the deployment object that installs Tiller.
|
|
func deployment(opts *Options) *extensions.Deployment {
|
|
return generateDeployment(opts)
|
|
}
|
|
|
|
// createService creates the Tiller service resource
|
|
func createService(client internalversion.ServicesGetter, namespace string) error {
|
|
obj := service(namespace)
|
|
_, err := client.Services(obj.Namespace).Create(obj)
|
|
return err
|
|
}
|
|
|
|
// service gets the service object that installs Tiller.
|
|
func service(namespace string) *api.Service {
|
|
return generateService(namespace)
|
|
}
|
|
|
|
// DeploymentManifest gets the manifest (as a string) that describes the Tiller Deployment
|
|
// resource.
|
|
func DeploymentManifest(opts *Options) (string, error) {
|
|
obj := deployment(opts)
|
|
buf, err := yaml.Marshal(obj)
|
|
return string(buf), err
|
|
}
|
|
|
|
// ServiceManifest gets the manifest (as a string) that describes the Tiller Service
|
|
// resource.
|
|
func ServiceManifest(namespace string) (string, error) {
|
|
obj := service(namespace)
|
|
|
|
buf, err := yaml.Marshal(obj)
|
|
return string(buf), err
|
|
}
|
|
|
|
func generateLabels(labels map[string]string) map[string]string {
|
|
labels["app"] = "helm"
|
|
return labels
|
|
}
|
|
|
|
func generateDeployment(opts *Options) *extensions.Deployment {
|
|
labels := generateLabels(map[string]string{"name": "tiller"})
|
|
d := &extensions.Deployment{
|
|
ObjectMeta: api.ObjectMeta{
|
|
Namespace: opts.Namespace,
|
|
Name: "tiller-deploy",
|
|
Labels: labels,
|
|
},
|
|
Spec: extensions.DeploymentSpec{
|
|
Replicas: 1,
|
|
Template: api.PodTemplateSpec{
|
|
ObjectMeta: api.ObjectMeta{
|
|
Labels: labels,
|
|
},
|
|
Spec: api.PodSpec{
|
|
Containers: []api.Container{
|
|
{
|
|
Name: "tiller",
|
|
Image: opts.selectImage(),
|
|
ImagePullPolicy: "IfNotPresent",
|
|
Ports: []api.ContainerPort{
|
|
{ContainerPort: 44134, Name: "tiller"},
|
|
},
|
|
Env: []api.EnvVar{
|
|
{Name: "TILLER_NAMESPACE", Value: opts.Namespace},
|
|
},
|
|
LivenessProbe: &api.Probe{
|
|
Handler: api.Handler{
|
|
HTTPGet: &api.HTTPGetAction{
|
|
Path: "/liveness",
|
|
Port: intstr.FromInt(44135),
|
|
},
|
|
},
|
|
InitialDelaySeconds: 1,
|
|
TimeoutSeconds: 1,
|
|
},
|
|
ReadinessProbe: &api.Probe{
|
|
Handler: api.Handler{
|
|
HTTPGet: &api.HTTPGetAction{
|
|
Path: "/readiness",
|
|
Port: intstr.FromInt(44135),
|
|
},
|
|
},
|
|
InitialDelaySeconds: 1,
|
|
TimeoutSeconds: 1,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
if opts.tls() {
|
|
const certsDir = "/etc/certs"
|
|
|
|
var tlsVerify, tlsEnable = "", "1"
|
|
if opts.VerifyTLS {
|
|
tlsVerify = "1"
|
|
}
|
|
|
|
// Mount secret to "/etc/certs"
|
|
d.Spec.Template.Spec.Containers[0].VolumeMounts = append(d.Spec.Template.Spec.Containers[0].VolumeMounts, api.VolumeMount{
|
|
Name: "tiller-certs",
|
|
ReadOnly: true,
|
|
MountPath: certsDir,
|
|
})
|
|
// Add environment variable required for enabling TLS
|
|
d.Spec.Template.Spec.Containers[0].Env = append(d.Spec.Template.Spec.Containers[0].Env, []api.EnvVar{
|
|
{Name: "TILLER_TLS_VERIFY", Value: tlsVerify},
|
|
{Name: "TILLER_TLS_ENABLE", Value: tlsEnable},
|
|
{Name: "TILLER_TLS_CERTS", Value: certsDir},
|
|
}...)
|
|
// Add secret volume to deployment
|
|
d.Spec.Template.Spec.Volumes = append(d.Spec.Template.Spec.Volumes, api.Volume{
|
|
Name: "tiller-certs",
|
|
VolumeSource: api.VolumeSource{
|
|
Secret: &api.SecretVolumeSource{
|
|
SecretName: "tiller-secret",
|
|
},
|
|
},
|
|
})
|
|
}
|
|
return d
|
|
}
|
|
|
|
func generateService(namespace string) *api.Service {
|
|
labels := generateLabels(map[string]string{"name": "tiller"})
|
|
s := &api.Service{
|
|
ObjectMeta: api.ObjectMeta{
|
|
Namespace: namespace,
|
|
Name: "tiller-deploy",
|
|
Labels: labels,
|
|
},
|
|
Spec: api.ServiceSpec{
|
|
Type: api.ServiceTypeClusterIP,
|
|
Ports: []api.ServicePort{
|
|
{
|
|
Name: "tiller",
|
|
Port: 44134,
|
|
TargetPort: intstr.FromString("tiller"),
|
|
},
|
|
},
|
|
Selector: labels,
|
|
},
|
|
}
|
|
return s
|
|
}
|
|
|
|
// SecretManifest gets the manifest (as a string) that describes the Tiller Secret resource.
|
|
func SecretManifest(opts *Options) (string, error) {
|
|
o, err := generateSecret(opts)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
buf, err := yaml.Marshal(o)
|
|
return string(buf), err
|
|
}
|
|
|
|
// createSecret creates the Tiller secret resource.
|
|
func createSecret(client internalversion.SecretsGetter, opts *Options) error {
|
|
o, err := generateSecret(opts)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
_, err = client.Secrets(o.Namespace).Create(o)
|
|
return err
|
|
}
|
|
|
|
// generateSecret builds the secret object that hold Tiller secrets.
|
|
func generateSecret(opts *Options) (*api.Secret, error) {
|
|
const secretName = "tiller-secret"
|
|
|
|
labels := generateLabels(map[string]string{"name": "tiller"})
|
|
secret := &api.Secret{
|
|
Type: api.SecretTypeOpaque,
|
|
Data: make(map[string][]byte),
|
|
ObjectMeta: api.ObjectMeta{
|
|
Name: secretName,
|
|
Labels: labels,
|
|
Namespace: opts.Namespace,
|
|
},
|
|
}
|
|
var err error
|
|
if secret.Data["tls.key"], err = read(opts.TLSKeyFile); err != nil {
|
|
return nil, err
|
|
}
|
|
if secret.Data["tls.crt"], err = read(opts.TLSCertFile); err != nil {
|
|
return nil, err
|
|
}
|
|
if opts.VerifyTLS {
|
|
if secret.Data["ca.crt"], err = read(opts.TLSCaCertFile); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
return secret, nil
|
|
}
|
|
|
|
func read(path string) (b []byte, err error) { return ioutil.ReadFile(path) }
|