2018-11-18 11:00:15 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'openssl'
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
module Clusters
|
|
|
|
module Applications
|
2019-07-07 11:18:12 +05:30
|
|
|
class Helm < ApplicationRecord
|
2018-03-17 18:26:18 +05:30
|
|
|
self.table_name = 'clusters_applications_helm'
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
attr_encrypted :ca_key,
|
|
|
|
mode: :per_attribute_iv,
|
|
|
|
key: Settings.attr_encrypted_db_key_base_truncated,
|
|
|
|
algorithm: 'aes-256-cbc'
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
include ::Clusters::Concerns::ApplicationCore
|
|
|
|
include ::Clusters::Concerns::ApplicationStatus
|
2019-10-12 21:52:04 +05:30
|
|
|
include ::Gitlab::Utils::StrongMemoize
|
2018-03-17 18:26:18 +05:30
|
|
|
|
|
|
|
default_value_for :version, Gitlab::Kubernetes::Helm::HELM_VERSION
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
before_create :create_keys_and_certs
|
|
|
|
|
|
|
|
def issue_client_cert
|
|
|
|
ca_cert_obj.issue
|
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
def set_initial_status
|
|
|
|
return unless not_installable?
|
|
|
|
|
|
|
|
self.status = 'installable' if cluster&.platform_kubernetes_active?
|
|
|
|
end
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
# It can only be uninstalled if there are no other applications installed
|
|
|
|
# or with intermitent installation statuses in the database.
|
2019-07-31 22:56:46 +05:30
|
|
|
def allowed_to_uninstall?
|
2019-10-12 21:52:04 +05:30
|
|
|
strong_memoize(:allowed_to_uninstall) do
|
|
|
|
applications = nil
|
|
|
|
|
|
|
|
Clusters::Cluster::APPLICATIONS.each do |application_name, klass|
|
|
|
|
next if application_name == 'helm'
|
|
|
|
|
|
|
|
extra_apps = Clusters::Applications::Helm.where('EXISTS (?)', klass.select(1).where(cluster_id: cluster_id))
|
|
|
|
|
|
|
|
applications = applications ? applications.or(extra_apps) : extra_apps
|
|
|
|
end
|
|
|
|
|
|
|
|
!applications.exists?
|
|
|
|
end
|
2019-07-31 22:56:46 +05:30
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
def install_command
|
2018-11-18 11:00:15 +05:30
|
|
|
Gitlab::Kubernetes::Helm::InitCommand.new(
|
|
|
|
name: name,
|
2018-11-20 20:47:30 +05:30
|
|
|
files: files,
|
|
|
|
rbac: cluster.platform_kubernetes_rbac?
|
2018-11-18 11:00:15 +05:30
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
def uninstall_command
|
|
|
|
Gitlab::Kubernetes::Helm::ResetCommand.new(
|
|
|
|
name: name,
|
|
|
|
files: files,
|
|
|
|
rbac: cluster.platform_kubernetes_rbac?
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
def has_ssl?
|
|
|
|
ca_key.present? && ca_cert.present?
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
def files
|
|
|
|
{
|
|
|
|
'ca.pem': ca_cert,
|
|
|
|
'cert.pem': tiller_cert.cert_string,
|
|
|
|
'key.pem': tiller_cert.key_string
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
def create_keys_and_certs
|
|
|
|
ca_cert = Gitlab::Kubernetes::Helm::Certificate.generate_root
|
|
|
|
self.ca_key = ca_cert.key_string
|
|
|
|
self.ca_cert = ca_cert.cert_string
|
|
|
|
end
|
|
|
|
|
|
|
|
def tiller_cert
|
|
|
|
@tiller_cert ||= ca_cert_obj.issue(expires_in: Gitlab::Kubernetes::Helm::Certificate::INFINITE_EXPIRY)
|
|
|
|
end
|
|
|
|
|
|
|
|
def ca_cert_obj
|
|
|
|
return unless has_ssl?
|
|
|
|
|
|
|
|
Gitlab::Kubernetes::Helm::Certificate
|
|
|
|
.from_strings(ca_key, ca_cert)
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|