2017-02-08 06:04:53 +00:00
|
|
|
#!/bin/bash
|
2017-12-11 10:10:44 +00:00
|
|
|
set -euo pipefail
|
2017-01-13 10:07:48 +00:00
|
|
|
|
2018-01-25 07:18:19 +00:00
|
|
|
# globals
|
|
|
|
USER=""
|
|
|
|
NAMESPACE=""
|
|
|
|
CLUSTER=""
|
|
|
|
DEPLOYMENTS=""
|
|
|
|
SERVER_URL=""
|
|
|
|
|
|
|
|
# set globals
|
|
|
|
setUser(){
|
2018-01-10 11:28:04 +00:00
|
|
|
USER=${PLUGIN_USER:-default}
|
2018-01-25 07:18:19 +00:00
|
|
|
}
|
2017-01-16 02:00:29 +00:00
|
|
|
|
2018-01-25 07:18:19 +00:00
|
|
|
setNamespace(){
|
2018-01-10 11:28:04 +00:00
|
|
|
NAMESPACE=${PLUGIN_NAMESPACE:-default}
|
2018-01-25 07:18:19 +00:00
|
|
|
}
|
2018-01-09 22:32:29 +00:00
|
|
|
|
2018-01-25 07:18:19 +00:00
|
|
|
setCluster(){
|
|
|
|
if [ ! -z ${PLUGIN_CLUSTER} ]; then
|
|
|
|
# convert cluster name to ucase and assign
|
|
|
|
CLUSTER=${PLUGIN_CLUSTER^^}
|
|
|
|
else
|
|
|
|
echo "[ERROR] Required pipeline parameter: cluster not provided"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
2018-01-09 22:32:29 +00:00
|
|
|
|
2018-01-25 07:18:19 +00:00
|
|
|
setServerUrl(){
|
|
|
|
# create dynamic cert var names
|
|
|
|
local SERVER_URL_VAR=SERVER_URL_${CLUSTER}
|
|
|
|
SERVER_URL=${!SERVER_URL_VAR}
|
2018-01-10 11:28:04 +00:00
|
|
|
if [[ -z "${SERVER_URL}" ]]; then
|
2018-01-25 07:18:19 +00:00
|
|
|
echo "[ERROR] Required drone secret: ${SERVER_URL_VAR} not added!"
|
2018-01-10 11:28:04 +00:00
|
|
|
exit 1
|
2018-01-09 22:32:29 +00:00
|
|
|
fi
|
2018-01-25 07:18:19 +00:00
|
|
|
}
|
2017-02-20 10:06:46 +00:00
|
|
|
|
2018-01-25 07:18:19 +00:00
|
|
|
setGlobals(){
|
|
|
|
setUser
|
|
|
|
setNamespace
|
|
|
|
setCluster
|
|
|
|
setServerUrl
|
|
|
|
}
|
|
|
|
|
|
|
|
setSecureCluster(){
|
|
|
|
local CLUSTER=$1; shift
|
|
|
|
local SERVER_URL=$1; shift
|
|
|
|
local SERVER_CERT=$1
|
|
|
|
|
|
|
|
echo "[INFO] Using secure connection with tls-certificate."
|
|
|
|
echo ${SERVER_CERT} | base64 -d > ca.crt
|
|
|
|
kubectl config set-cluster ${CLUSTER} --server=${SERVER_URL} --certificate-authority=ca.crt
|
|
|
|
}
|
|
|
|
|
|
|
|
setInsecureCluster(){
|
|
|
|
local CLUSTER=$1; shift
|
|
|
|
local SERVER_URL=$1
|
|
|
|
|
|
|
|
echo "[WARNING] Using insecure connection to cluster"
|
|
|
|
kubectl config set-cluster ${CLUSTER} --server=${SERVER_URL} --insecure-skip-tls-verify=true
|
|
|
|
}
|
|
|
|
|
2018-01-30 15:28:22 +00:00
|
|
|
setClientToken(){
|
2018-01-25 07:18:19 +00:00
|
|
|
local USER=$1; shift
|
|
|
|
local SERVER_TOKEN=$1
|
|
|
|
|
|
|
|
echo "[INFO] Setting client credentials with token"
|
|
|
|
kubectl config set-credentials ${USER} --token=${SERVER_TOKEN}
|
|
|
|
}
|
|
|
|
|
|
|
|
setClientCertAndKey(){
|
|
|
|
local USER=$1; shift
|
|
|
|
local CLIENT_CERT=$1; shift
|
|
|
|
local CLIENT_KEY=$1
|
|
|
|
|
|
|
|
echo "[INFO] Setting client credentials with signed-certificate and key."
|
|
|
|
echo ${CLIENT_CERT} | base64 -d > client.crt
|
|
|
|
echo ${CLIENT_KEY} | base64 -d > client.key
|
|
|
|
kubectl config set-credentials ${USER} --client-certificate=client.crt --client-key=client.key
|
|
|
|
}
|
|
|
|
|
|
|
|
setContext(){
|
|
|
|
local CLUSTER=$1; shift
|
|
|
|
local USER=$1
|
|
|
|
|
|
|
|
kubectl config set-context ${CLUSTER} --cluster=${CLUSTER} --user=${USER}
|
|
|
|
kubectl config use-context ${CLUSTER}
|
|
|
|
}
|
|
|
|
|
|
|
|
pollDeploymentRollout(){
|
|
|
|
local NAMESPACE=$1; shift
|
|
|
|
local DEPLOY=$1
|
2018-01-30 15:28:22 +00:00
|
|
|
local TIMEOUT=600
|
|
|
|
|
2018-01-25 07:18:19 +00:00
|
|
|
# wait on deployment rollout status
|
2018-01-30 15:28:22 +00:00
|
|
|
echo "[INFO] Watching ${DEPLOY} rollout status..."
|
2018-01-25 11:07:09 +00:00
|
|
|
while true; do
|
|
|
|
result=`kubectl -n ${NAMESPACE} rollout status --watch=false --revision=0 deployment/${DEPLOY}`
|
2018-01-30 15:28:22 +00:00
|
|
|
echo ${result}
|
2018-01-25 11:07:09 +00:00
|
|
|
if [[ "${result}" == "deployment \"${DEPLOY}\" successfully rolled out" ]]; then
|
2018-01-30 15:28:22 +00:00
|
|
|
return 0
|
2018-01-25 11:07:09 +00:00
|
|
|
else
|
2018-01-30 15:28:22 +00:00
|
|
|
# TODO: more conditions for error handling based on result text
|
2018-01-25 11:07:09 +00:00
|
|
|
sleep 10
|
2018-01-30 15:28:22 +00:00
|
|
|
TIMEOUT=$((TIMEOUT-10))
|
|
|
|
if [ "${TIMEOUT}" -eq 0 ]; then
|
|
|
|
return 1
|
|
|
|
fi
|
2018-01-25 11:07:09 +00:00
|
|
|
fi
|
|
|
|
done
|
2018-01-25 07:18:19 +00:00
|
|
|
}
|
|
|
|
|
2018-01-30 15:28:22 +00:00
|
|
|
startDeployments(){
|
|
|
|
local CLUSTER=$1; shift
|
|
|
|
local NAMESPACE=$1
|
|
|
|
|
|
|
|
IFS=',' read -r -a DEPLOYMENTS <<< "${PLUGIN_DEPLOYMENT}"
|
2018-01-25 07:18:19 +00:00
|
|
|
|
|
|
|
for DEPLOY in ${DEPLOYMENTS[@]}; do
|
2018-01-30 15:28:22 +00:00
|
|
|
echo "[INFO] Deploying ${DEPLOY} to ${CLUSTER} ${NAMESPACE}"
|
2018-03-05 13:33:29 +00:00
|
|
|
kubectl -n ${NAMESPACE} set image deployment/${DEPLOY} \
|
|
|
|
*="${PLUGIN_REPO}:${PLUGIN_TAG}" --record
|
|
|
|
pollDeploymentRollout ${NAMESPACE} ${DEPLOY}
|
|
|
|
|
2018-03-05 13:27:56 +00:00
|
|
|
if [ "$?" -eq 0 ]; then
|
|
|
|
continue
|
|
|
|
else
|
|
|
|
exit 0
|
|
|
|
fi
|
2018-01-25 07:18:19 +00:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
clientAuthToken(){
|
|
|
|
local CLUSTER=$1; shift
|
|
|
|
local USER=$1
|
|
|
|
|
|
|
|
echo "[INFO] Using Server token to authorize"
|
|
|
|
|
|
|
|
CLIENT_TOKEN_VAR=CLIENT_TOKEN_${CLUSTER}
|
|
|
|
CLIENT_TOKEN=${!CLIENT_TOKEN_VAR}
|
|
|
|
|
|
|
|
if [[ ! -z "${CLIENT_TOKEN}" ]]; then
|
|
|
|
setClientToken ${USER} ${CLIENT_TOKEN}
|
|
|
|
else
|
|
|
|
echo "[ERROR] Required plugin secrets:"
|
|
|
|
echo " - ${CLIENT_TOKEN_VAR}"
|
|
|
|
echo "not provided."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
clientAuthCert(){
|
|
|
|
local CLUSTER=$1; shift
|
|
|
|
local USER=$1
|
|
|
|
|
|
|
|
echo "[INFO] Using Client cert and Key to authorize"
|
|
|
|
CLIENT_CERT_VAR=CLIENT_CERT_${CLUSTER}
|
|
|
|
CLIENT_KEY_VAR=CLIENT_KEY_${CLUSTER}
|
|
|
|
# expand
|
|
|
|
CLIENT_CERT=${!CLIENT_CERT_VAR}
|
|
|
|
CLIENT_KEY=${!CLIENT_KEY_VAR}
|
|
|
|
|
|
|
|
if [[ ! -z "${CLIENT_CERT}" ]] && [[ ! -z "${CLIENT_KEY}" ]]; then
|
|
|
|
setClientCertAndKey ${USER} ${CLIENT_CERT} ${CLIENT_KEY}
|
|
|
|
else
|
|
|
|
echo "[ERROR] Required plugin secrets:"
|
|
|
|
echo " - ${CLIENT_CERT_VAR}"
|
|
|
|
echo " - ${CLIENT_KEY_VAR}"
|
|
|
|
echo "not provided"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
clientAuth(){
|
|
|
|
local AUTH_MODE=$1; shift
|
|
|
|
local CLUSTER=$1; shift
|
|
|
|
local USER=$1
|
|
|
|
|
|
|
|
if [ ! -z ${AUTH_MODE} ]; then
|
|
|
|
if [[ "${AUTH_MODE}" == "token" ]]; then
|
|
|
|
clientAuthToken ${CLUSTER} ${USER}
|
|
|
|
elif [[ "${AUTH_MODE}" == "client-cert" ]]; then
|
|
|
|
clientAuthCert ${CLUSTER} ${USER}
|
|
|
|
else
|
|
|
|
echo "[ERROR] Required plugin param - auth_mode - Should be either:"
|
|
|
|
echo "[ token | client-cert ]"
|
|
|
|
exit 1
|
2018-01-10 11:28:04 +00:00
|
|
|
fi
|
2018-01-25 07:18:19 +00:00
|
|
|
else
|
|
|
|
echo "[ERROR] Required plugin param - auth_mode - not provided"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
clusterAuth(){
|
|
|
|
local SERVER_URL=$1; shift
|
|
|
|
local CLUSTER=$1; shift
|
|
|
|
local USER=$1
|
|
|
|
|
|
|
|
SERVER_CERT_VAR=SERVER_CERT_${CLUSTER}
|
|
|
|
SERVER_CERT=${!SERVER_CERT_VAR}
|
|
|
|
|
|
|
|
if [[ ! -z "${SERVER_CERT}" ]]; then
|
|
|
|
setSecureCluster ${CLUSTER} ${SERVER_URL} ${SERVER_CERT}
|
|
|
|
AUTH_MODE=${PLUGIN_AUTH_MODE}
|
|
|
|
clientAuth ${AUTH_MODE} ${CLUSTER} ${USER}
|
2018-01-10 11:28:04 +00:00
|
|
|
else
|
|
|
|
echo "[WARNING] Required plugin parameter: ${SERVER_CERT_VAR} not added!"
|
2018-01-25 07:18:19 +00:00
|
|
|
setInsecureCluster ${CLUSTER} ${SERVER_URL}
|
2018-01-10 11:28:04 +00:00
|
|
|
fi
|
2018-01-25 07:18:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
setGlobals
|
|
|
|
clusterAuth ${SERVER_URL} ${CLUSTER} ${USER}
|
|
|
|
setContext ${CLUSTER} ${USER}
|
2018-01-30 15:28:22 +00:00
|
|
|
startDeployments ${CLUSTER} ${NAMESPACE}
|