2019-02-15 15:39:39 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
module Clusters
|
|
|
|
module Applications
|
2019-07-07 11:18:12 +05:30
|
|
|
class CertManager < ApplicationRecord
|
2019-02-15 15:39:39 +05:30
|
|
|
VERSION = 'v0.5.2'.freeze
|
|
|
|
|
|
|
|
self.table_name = 'clusters_applications_cert_managers'
|
|
|
|
|
|
|
|
include ::Clusters::Concerns::ApplicationCore
|
|
|
|
include ::Clusters::Concerns::ApplicationStatus
|
|
|
|
include ::Clusters::Concerns::ApplicationVersion
|
|
|
|
include ::Clusters::Concerns::ApplicationData
|
|
|
|
|
|
|
|
default_value_for :version, VERSION
|
|
|
|
|
|
|
|
default_value_for :email do |cert_manager|
|
|
|
|
cert_manager.cluster&.user&.email
|
|
|
|
end
|
|
|
|
|
|
|
|
validates :email, presence: true
|
|
|
|
|
|
|
|
def chart
|
|
|
|
'stable/cert-manager'
|
|
|
|
end
|
|
|
|
|
|
|
|
def install_command
|
|
|
|
Gitlab::Kubernetes::Helm::InstallCommand.new(
|
|
|
|
name: 'certmanager',
|
|
|
|
version: VERSION,
|
|
|
|
rbac: cluster.platform_kubernetes_rbac?,
|
|
|
|
chart: chart,
|
|
|
|
files: files.merge(cluster_issuer_file),
|
|
|
|
postinstall: post_install_script
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
def uninstall_command
|
|
|
|
Gitlab::Kubernetes::Helm::DeleteCommand.new(
|
|
|
|
name: 'certmanager',
|
|
|
|
rbac: cluster.platform_kubernetes_rbac?,
|
|
|
|
files: files,
|
|
|
|
postdelete: post_delete_script
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2019-02-15 15:39:39 +05:30
|
|
|
private
|
|
|
|
|
|
|
|
def post_install_script
|
2019-10-12 21:52:04 +05:30
|
|
|
["kubectl create -f /data/helm/certmanager/config/cluster_issuer.yaml"]
|
|
|
|
end
|
|
|
|
|
|
|
|
def post_delete_script
|
|
|
|
[
|
|
|
|
delete_private_key,
|
|
|
|
delete_crd('certificates.certmanager.k8s.io'),
|
|
|
|
delete_crd('clusterissuers.certmanager.k8s.io'),
|
|
|
|
delete_crd('issuers.certmanager.k8s.io')
|
|
|
|
].compact
|
|
|
|
end
|
|
|
|
|
|
|
|
def private_key_name
|
|
|
|
@private_key_name ||= cluster_issuer_content.dig('spec', 'acme', 'privateKeySecretRef', 'name')
|
|
|
|
end
|
|
|
|
|
|
|
|
def delete_private_key
|
|
|
|
return unless private_key_name.present?
|
|
|
|
|
|
|
|
args = %W(secret -n #{Gitlab::Kubernetes::Helm::NAMESPACE} #{private_key_name} --ignore-not-found)
|
|
|
|
|
|
|
|
Gitlab::Kubernetes::KubectlCmd.delete(*args)
|
|
|
|
end
|
|
|
|
|
|
|
|
def delete_crd(definition)
|
|
|
|
Gitlab::Kubernetes::KubectlCmd.delete("crd", definition, "--ignore-not-found")
|
2019-02-15 15:39:39 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def cluster_issuer_file
|
|
|
|
{
|
|
|
|
'cluster_issuer.yaml': cluster_issuer_yaml_content
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
def cluster_issuer_yaml_content
|
|
|
|
YAML.dump(cluster_issuer_content.deep_merge(cluster_issue_overlay))
|
|
|
|
end
|
|
|
|
|
|
|
|
def cluster_issuer_content
|
|
|
|
YAML.safe_load(File.read(cluster_issuer_file_path))
|
|
|
|
end
|
|
|
|
|
|
|
|
def cluster_issue_overlay
|
|
|
|
{ "spec" => { "acme" => { "email" => self.email } } }
|
|
|
|
end
|
|
|
|
|
|
|
|
def cluster_issuer_file_path
|
|
|
|
Rails.root.join('vendor', 'cert_manager', 'cluster_issuer.yaml')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|