forked from jenkins-x/jx
-
Notifications
You must be signed in to change notification settings - Fork 0
/
install.go
314 lines (263 loc) · 9.42 KB
/
install.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
package cmd
import (
"bytes"
"encoding/base64"
"encoding/json"
"errors"
"fmt"
"path/filepath"
"os/exec"
"io"
"io/ioutil"
"net/http"
"os"
"strings"
"github.com/spf13/cobra"
"github.com/jenkins-x/jx/pkg/jx/cmd/log"
"github.com/jenkins-x/jx/pkg/jx/cmd/templates"
cmdutil "github.com/jenkins-x/jx/pkg/jx/cmd/util"
"golang.org/x/crypto/ssh/terminal"
"gopkg.in/src-d/go-git.v4"
)
// GetOptions is the start of the data required to perform the operation. As new fields are added, add them here instead of
// referencing the cmd.Flags()
type InstallOptions struct {
Factory cmdutil.Factory
Out io.Writer
Err io.Writer
Flags InstallFlags
}
type InstallFlags struct {
Domain string
GitProvider string
GitToken string
GitUser string
GitPass string
KubernetesProvider string
CloudEnvRepository string
}
type Secrets struct {
Login string
Token string
}
const (
JX_GIT_TOKEN = "JX_GIT_TOKEN"
JX_GIT_USER = "JX_GIT_USER"
JX_GIT_PASSWORD = "JX_GIT_PASSWORD"
)
var (
instalLong = templates.LongDesc(`
Installs the Jenkins X platform on a Kubernetes cluster
Requires a --git-username and either --git-token or --git-password that can be used to create a new token.
This is so the Jenkins-X platform can git tag your releases
`)
instalExample = templates.Examples(`
# Default installer which uses interactive prompts to generate git secrets
jx install
# Install with a GitHub personal access token
jx install --git-username jenkins-x-bot --git-token 9fdbd2d070cd81eb12bca87861bcd850
`)
)
// NewCmdGet creates a command object for the generic "install" action, which
// installs the jenkins-x platform on a kubernetes cluster.
func NewCmdInstall(f cmdutil.Factory, out io.Writer, errOut io.Writer) *cobra.Command {
options := &InstallOptions{
Factory: f,
Out: out,
Err: errOut,
}
cmd := &cobra.Command{
Use: "install [flags]",
Short: "Install Jenkins-X",
Long: instalLong,
Example: instalExample,
Run: func(cmd *cobra.Command, args []string) {
err := RunInstall(f, out, errOut, cmd, args, options)
cmdutil.CheckErr(err)
},
SuggestFor: []string{"list", "ps"},
}
cmd.Flags().StringP("git-provider", "", "GitHub", "Git provider, used to create tokens if not provided. Supported providers: [GitHub]")
cmd.Flags().StringP("git-token", "t", "", "Git token used to clone and tag releases, typically using a bot user account. For GitHub use a personal access token with 'public_repo' scope, see https://help.github.com/articles/creating-a-personal-access-token-for-the-command-line")
cmd.Flags().StringP("git-username", "u", "", "Git username used to tag releases in pipelines, typically this is a bot user")
cmd.Flags().StringP("git-password", "p", "", "Git username if a Personal Access Token should be created")
cmd.Flags().StringP("domain", "d", "", "Domain to expose ingress endpoints. Example: jenkinsx.io")
cmd.Flags().StringP("kubernetes-provider", "k", "minikube", "Service providing the kubernetes cluster. Supported providers: [minikube,gke,thunder]")
cmd.Flags().StringP("cloud-environment-repo", "c", "https://github.com/jenkins-x/cloud-environments", "Cloud Environments git repo")
return cmd
}
// RunInstall implements the generic Install command
func RunInstall(f cmdutil.Factory, out, errOut io.Writer, cmd *cobra.Command, args []string, options *InstallOptions) error {
flags := InstallFlags{
Domain: cmd.Flags().Lookup("domain").Value.String(),
GitProvider: cmd.Flags().Lookup("git-provider").Value.String(),
GitToken: cmd.Flags().Lookup("git-token").Value.String(),
GitUser: cmd.Flags().Lookup("git-username").Value.String(),
GitPass: cmd.Flags().Lookup("git-password").Value.String(),
KubernetesProvider: cmd.Flags().Lookup("kubernetes-provider").Value.String(),
CloudEnvRepository: cmd.Flags().Lookup("cloud-environment-repo").Value.String(),
}
options.Flags = flags
// get secrets to use in helm install
secrets, err := options.getGitSecrets()
if err != nil {
return err
}
// clone the environments repo
wrkDir := filepath.Join(cmdutil.HomeDir(), ".jenkins-x", "cloud-environments")
err = options.cloneJXCloudEnvironmentsRepo(wrkDir)
if err != nil {
return err
}
// run helm install setting the token and domain values
makefileDir := filepath.Join(wrkDir, fmt.Sprintf("env-%s", strings.ToLower(options.Flags.KubernetesProvider)))
err = ioutil.WriteFile(filepath.Join(makefileDir, "secrets.yaml"), []byte(secrets), 0644)
if err != nil {
return err
}
makefile := exec.Command("make", "install")
makefile.Dir = makefileDir
makefile.Stdout = out
makefile.Stderr = errOut
err = makefile.Run()
if err != nil {
return err
}
log.Success("Jenkins-X installation completed successfully")
return nil
}
// clones the jenkins-x cloud-environments repo to a local working dir
func (o *InstallOptions) cloneJXCloudEnvironmentsRepo(wrkDir string) error {
log.Infof("Cloning the Jenkins-X cloud environments repo to %s\n", wrkDir)
_, err := git.PlainClone(wrkDir, false, &git.CloneOptions{
URL: o.Flags.CloudEnvRepository,
ReferenceName: "refs/heads/master",
SingleBranch: true,
Progress: o.Out,
})
if err != nil {
if strings.Contains(err.Error(), "repository already exists") {
log.Infof("Jenkins-X cloud environments repository already exists, check for changes? y/n: ")
if log.AskForConfirmation(false) {
r, err := git.PlainOpen(wrkDir)
if err != nil {
return err
}
// Get the working directory for the repository
w, err := r.Worktree()
if err != nil {
return err
}
// Pull the latest changes from the origin remote and merge into the current branch
err = w.Pull(&git.PullOptions{RemoteName: "origin"})
if err != nil && !strings.Contains(err.Error(), "already up-to-date") {
return err
}
}
} else {
return err
}
}
return nil
}
// returns secrets that are used as values during the helm install
func (o *InstallOptions) getGitSecrets() (string, error) {
username, token, err := o.getGitToken()
if err != nil {
return "", err
}
pipelineSecrets := `
PipelineSecrets:
Netrc: |-
machine github.com
login %s
password %s`
return fmt.Sprintf(pipelineSecrets, username, token), nil
}
// returns the Git Token that should be used by Jenkins-X to setup credentials to clone repos and creates a secret for pipelines to tag a release
func (o *InstallOptions) getGitToken() (string, string, error) {
username := o.Flags.GitUser
if username == "" {
if os.Getenv(JX_GIT_USER) != "" {
username = os.Getenv(JX_GIT_USER)
} else {
log.Info("Git username to tag releases: ")
_, err := fmt.Scanln(&username)
if err != nil {
errors.New(fmt.Sprintf("error reading username: %v", err))
}
}
}
// first check git-token flag
if o.Flags.GitToken != "" {
return username, o.Flags.GitToken, nil
}
// second check for an environment variable
if os.Getenv(JX_GIT_TOKEN) != "" {
return username, os.Getenv(JX_GIT_TOKEN), nil
}
// third if github provider request a new personal access token
log.Warn("No flag --git-token or JX_GIT_TOKEN environment variable found, this is required so Jenkins-X can setup the secrets to clone and tag your releases\n")
if o.Flags.GitProvider == "GitHub" {
//fmt.Print("Would you like to create a new GitHub personal access token now? (y):")
log.Info("Would you like to create a new GitHub personal access token now? y/n: ")
if log.AskForConfirmation(false) {
return o.createGitHubPersonalAccessToken(username)
} else {
os.Exit(-1)
}
}
return "", "", nil
}
func basicAuth(username, password string) string {
auth := username + ":" + password
return base64.StdEncoding.EncodeToString([]byte(auth))
}
func (o *InstallOptions) createGitHubPersonalAccessToken(username string) (string, string, error) {
password := o.Flags.GitPass
if password == "" {
if os.Getenv(JX_GIT_PASSWORD) != "" {
password = os.Getenv(JX_GIT_PASSWORD)
} else {
log.Infof("GitHub password for user/bot [%s]: ", username)
b, err := terminal.ReadPassword(0)
log.Error("\n")
if err != nil {
errors.New(fmt.Sprintf("error reading password: %v", err))
}
password = string(b)
}
}
client := &http.Client{}
b := bytes.NewBufferString("{\"scopes\":[\"public_repo\"],\"note\":\"jx-bot\"}")
req, err := http.NewRequest("POST", "https://api.github.com/authorizations", b)
req.Header.Add("Authorization", "Basic "+basicAuth(username, password))
resp, err := client.Do(req)
if err != nil {
errors.New(fmt.Sprintf("error creating github authorization: %v", err))
}
defer resp.Body.Close()
body, err := ioutil.ReadAll(resp.Body)
if err != nil {
errors.New(fmt.Sprintf("error reading create authorization response: %v", err))
}
if strings.Contains(string(body), "already_exists") {
log.Error("A jx-bot personal access token already exists, check here: https://github.com/settings/tokens\n")
log.Info("Reuse this with the --git-token flag or delete from GitHub and try again.\n")
os.Exit(-1)
}
var dat map[string]interface{}
err = json.Unmarshal(body, &dat)
if err != nil {
errors.New(fmt.Sprintf("error unmarshalling authorization response: %v", err))
}
if token, ok := dat["token"].(string); ok {
log.Successf("Your new GitHub personal access token: %s", token)
return username, token, nil
} else {
log.Error("Not a valid user\n")
log.Info("Ensure the user is valid on GitHub.\n")
os.Exit(-1)
return "", "", nil
}
}