Use base64 strings for chart repo certs [#74]
This should be a more flexible option since certificates aren't likely to be part of the actual workspace and may be environment-dependent. It also mirrors the kube_certificate, which is nice.
This commit is contained in:
parent
ee6d8d1724
commit
18313eeb5c
|
@ -6,7 +6,8 @@
|
||||||
| mode | string | helm_command | Indicates the operation to perform. Recommended, but not required. Valid options are `upgrade`, `uninstall`, `lint`, and `help`. |
|
| mode | string | helm_command | Indicates the operation to perform. Recommended, but not required. Valid options are `upgrade`, `uninstall`, `lint`, and `help`. |
|
||||||
| update_dependencies | boolean | | Calls `helm dependency update` before running the main command.|
|
| update_dependencies | boolean | | Calls `helm dependency update` before running the main command.|
|
||||||
| add_repos | list\<string\> | helm_repos | Calls `helm repo add $repo` before running the main command. Each string should be formatted as `repo_name=https://repo.url/`. |
|
| add_repos | list\<string\> | helm_repos | Calls `helm repo add $repo` before running the main command. Each string should be formatted as `repo_name=https://repo.url/`. |
|
||||||
| repo_ca_file | string | | TLS certificate for a chart repository certificate authority. |
|
| repo_certificate | string | | Base64 encoded TLS certificate for a chart repository. |
|
||||||
|
| repo_ca_certificate | string | | Base64 encoded TLS certificate for a chart repository certificate authority. |
|
||||||
| namespace | string | | Kubernetes namespace to use for this operation. |
|
| namespace | string | | Kubernetes namespace to use for this operation. |
|
||||||
| debug | boolean | | Generate debug output within drone-helm3 and pass `--debug` to all helm commands. Use with care, since the debug output may include secrets. |
|
| debug | boolean | | Generate debug output within drone-helm3 and pass `--debug` to all helm commands. Use with care, since the debug output may include secrets. |
|
||||||
|
|
||||||
|
|
3
internal/env/config.go
vendored
3
internal/env/config.go
vendored
|
@ -24,7 +24,8 @@ type Config struct {
|
||||||
DroneEvent string `envconfig:"drone_build_event"` // Drone event that invoked this plugin.
|
DroneEvent string `envconfig:"drone_build_event"` // Drone event that invoked this plugin.
|
||||||
UpdateDependencies bool `split_words:"true"` // Call `helm dependency update` before the main command
|
UpdateDependencies bool `split_words:"true"` // Call `helm dependency update` before the main command
|
||||||
AddRepos []string `split_words:"true"` // Call `helm repo add` before the main command
|
AddRepos []string `split_words:"true"` // Call `helm repo add` before the main command
|
||||||
RepoCAFile string `envconfig:"repo_ca_file"` // CA certificate for `helm repo add`
|
RepoCertificate string `envconfig:"repo_certificate"` // The Helm chart repository's self-signed certificate (must be base64-encoded)
|
||||||
|
RepoCACertificate string `envconfig:"repo_ca_certificate"` // The Helm chart repository CA's self-signed certificate (must be base64-encoded)
|
||||||
Debug bool `` // Generate debug output and pass --debug to all helm commands
|
Debug bool `` // Generate debug output and pass --debug to all helm commands
|
||||||
Values string `` // Argument to pass to --set in applicable helm commands
|
Values string `` // Argument to pass to --set in applicable helm commands
|
||||||
StringValues string `split_words:"true"` // Argument to pass to --set-string in applicable helm commands
|
StringValues string `split_words:"true"` // Argument to pass to --set-string in applicable helm commands
|
||||||
|
|
|
@ -9,9 +9,9 @@ import (
|
||||||
// AddRepo is an execution step that calls `helm repo add` when executed.
|
// AddRepo is an execution step that calls `helm repo add` when executed.
|
||||||
type AddRepo struct {
|
type AddRepo struct {
|
||||||
*config
|
*config
|
||||||
repo string
|
repo string
|
||||||
caFile string
|
certs *repoCerts
|
||||||
cmd cmd
|
cmd cmd
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewAddRepo creates an AddRepo for the given repo-spec. No validation is performed at this time.
|
// NewAddRepo creates an AddRepo for the given repo-spec. No validation is performed at this time.
|
||||||
|
@ -19,7 +19,7 @@ func NewAddRepo(cfg env.Config, repo string) *AddRepo {
|
||||||
return &AddRepo{
|
return &AddRepo{
|
||||||
config: newConfig(cfg),
|
config: newConfig(cfg),
|
||||||
repo: repo,
|
repo: repo,
|
||||||
caFile: cfg.RepoCAFile,
|
certs: newRepoCerts(cfg),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -38,14 +38,16 @@ func (a *AddRepo) Prepare() error {
|
||||||
return fmt.Errorf("bad repo spec '%s'", a.repo)
|
return fmt.Errorf("bad repo spec '%s'", a.repo)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if err := a.certs.write(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
name := split[0]
|
name := split[0]
|
||||||
url := split[1]
|
url := split[1]
|
||||||
|
|
||||||
args := a.globalFlags()
|
args := a.globalFlags()
|
||||||
args = append(args, "repo", "add")
|
args = append(args, "repo", "add")
|
||||||
if a.caFile != "" {
|
args = append(args, a.certs.flags()...)
|
||||||
args = append(args, "--ca-file", a.caFile)
|
|
||||||
}
|
|
||||||
args = append(args, name, url)
|
args = append(args, name, url)
|
||||||
|
|
||||||
a.cmd = command(helmBin, args...)
|
a.cmd = command(helmBin, args...)
|
||||||
|
|
|
@ -43,6 +43,7 @@ func (suite *AddRepoTestSuite) TestNewAddRepo() {
|
||||||
suite.Require().NotNil(repo)
|
suite.Require().NotNil(repo)
|
||||||
suite.Equal("picompress=https://github.com/caleb_phipps/picompress", repo.repo)
|
suite.Equal("picompress=https://github.com/caleb_phipps/picompress", repo.repo)
|
||||||
suite.NotNil(repo.config)
|
suite.NotNil(repo.config)
|
||||||
|
suite.NotNil(repo.certs)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *AddRepoTestSuite) TestPrepareAndExecute() {
|
func (suite *AddRepoTestSuite) TestPrepareAndExecute() {
|
||||||
|
@ -100,10 +101,11 @@ func (suite *AddRepoTestSuite) TestPrepareWithEqualSignInURL() {
|
||||||
func (suite *AddRepoTestSuite) TestRepoAddFlags() {
|
func (suite *AddRepoTestSuite) TestRepoAddFlags() {
|
||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
cfg := env.Config{
|
cfg := env.Config{}
|
||||||
RepoCAFile: "./helm/reporepo.cert",
|
|
||||||
}
|
|
||||||
a := NewAddRepo(cfg, "machine=https://github.com/harold_finch/themachine")
|
a := NewAddRepo(cfg, "machine=https://github.com/harold_finch/themachine")
|
||||||
|
|
||||||
|
// inject a ca cert filename so repoCerts won't create any files that we'd have to clean up
|
||||||
|
a.certs.caCertFilename = "./helm/reporepo.cert"
|
||||||
suite.NoError(a.Prepare())
|
suite.NoError(a.Prepare())
|
||||||
suite.Equal([]string{"repo", "add", "--ca-file", "./helm/reporepo.cert",
|
suite.Equal([]string{"repo", "add", "--ca-file", "./helm/reporepo.cert",
|
||||||
"machine", "https://github.com/harold_finch/themachine"}, suite.commandArgs)
|
"machine", "https://github.com/harold_finch/themachine"}, suite.commandArgs)
|
||||||
|
|
77
internal/run/repocerts.go
Normal file
77
internal/run/repocerts.go
Normal file
|
@ -0,0 +1,77 @@
|
||||||
|
package run
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/base64"
|
||||||
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
|
"io/ioutil"
|
||||||
|
)
|
||||||
|
|
||||||
|
type repoCerts struct {
|
||||||
|
*config
|
||||||
|
cert string
|
||||||
|
certFilename string
|
||||||
|
caCert string
|
||||||
|
caCertFilename string
|
||||||
|
}
|
||||||
|
|
||||||
|
func newRepoCerts(cfg env.Config) *repoCerts {
|
||||||
|
return &repoCerts{
|
||||||
|
config: newConfig(cfg),
|
||||||
|
cert: cfg.RepoCertificate,
|
||||||
|
caCert: cfg.RepoCACertificate,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (rc *repoCerts) write() error {
|
||||||
|
if rc.cert != "" {
|
||||||
|
file, err := ioutil.TempFile("", "repo********.cert")
|
||||||
|
defer file.Close()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create certificate file: %w", err)
|
||||||
|
}
|
||||||
|
rc.certFilename = file.Name()
|
||||||
|
rawCert, err := base64.StdEncoding.DecodeString(rc.cert)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to base64-decode certificate string: %w", err)
|
||||||
|
}
|
||||||
|
if rc.debug {
|
||||||
|
fmt.Fprintf(rc.stderr, "writing repo certificate to %s\n", rc.certFilename)
|
||||||
|
}
|
||||||
|
if _, err := file.Write(rawCert); err != nil {
|
||||||
|
return fmt.Errorf("failed to write certificate file: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if rc.caCert != "" {
|
||||||
|
file, err := ioutil.TempFile("", "repo********.ca.cert")
|
||||||
|
defer file.Close()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create CA certificate file: %w", err)
|
||||||
|
}
|
||||||
|
rc.caCertFilename = file.Name()
|
||||||
|
rawCert, err := base64.StdEncoding.DecodeString(rc.caCert)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to base64-decode CA certificate string: %w", err)
|
||||||
|
}
|
||||||
|
if rc.debug {
|
||||||
|
fmt.Fprintf(rc.stderr, "writing repo ca certificate to %s\n", rc.caCertFilename)
|
||||||
|
}
|
||||||
|
if _, err := file.Write(rawCert); err != nil {
|
||||||
|
return fmt.Errorf("failed to write CA certificate file: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (rc *repoCerts) flags() []string {
|
||||||
|
flags := make([]string, 0)
|
||||||
|
if rc.certFilename != "" {
|
||||||
|
flags = append(flags, "--cert-file", rc.certFilename)
|
||||||
|
}
|
||||||
|
if rc.caCertFilename != "" {
|
||||||
|
flags = append(flags, "--ca-file", rc.caCertFilename)
|
||||||
|
}
|
||||||
|
|
||||||
|
return flags
|
||||||
|
}
|
80
internal/run/repocerts_test.go
Normal file
80
internal/run/repocerts_test.go
Normal file
|
@ -0,0 +1,80 @@
|
||||||
|
package run
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
|
"github.com/stretchr/testify/suite"
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
type RepoCertsTestSuite struct {
|
||||||
|
suite.Suite
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestRepoCertsTestSuite(t *testing.T) {
|
||||||
|
suite.Run(t, new(RepoCertsTestSuite))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *RepoCertsTestSuite) TestNewRepoCerts() {
|
||||||
|
cfg := env.Config{
|
||||||
|
RepoCertificate: "bGljZW5zZWQgYnkgdGhlIFN0YXRlIG9mIE9yZWdvbiB0byBwZXJmb3JtIHJlcG9zc2Vzc2lvbnM=",
|
||||||
|
RepoCACertificate: "T3JlZ29uIFN0YXRlIExpY2Vuc3VyZSBib2FyZA==",
|
||||||
|
}
|
||||||
|
rc := newRepoCerts(cfg)
|
||||||
|
suite.Require().NotNil(rc)
|
||||||
|
suite.Equal("bGljZW5zZWQgYnkgdGhlIFN0YXRlIG9mIE9yZWdvbiB0byBwZXJmb3JtIHJlcG9zc2Vzc2lvbnM=", rc.cert)
|
||||||
|
suite.Equal("T3JlZ29uIFN0YXRlIExpY2Vuc3VyZSBib2FyZA==", rc.caCert)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *RepoCertsTestSuite) TestWrite() {
|
||||||
|
cfg := env.Config{
|
||||||
|
RepoCertificate: "bGljZW5zZWQgYnkgdGhlIFN0YXRlIG9mIE9yZWdvbiB0byBwZXJmb3JtIHJlcG9zc2Vzc2lvbnM=",
|
||||||
|
RepoCACertificate: "T3JlZ29uIFN0YXRlIExpY2Vuc3VyZSBib2FyZA==",
|
||||||
|
}
|
||||||
|
rc := newRepoCerts(cfg)
|
||||||
|
suite.Require().NotNil(rc)
|
||||||
|
|
||||||
|
suite.NoError(rc.write())
|
||||||
|
defer os.Remove(rc.certFilename)
|
||||||
|
defer os.Remove(rc.caCertFilename)
|
||||||
|
suite.NotEqual("", rc.certFilename)
|
||||||
|
suite.NotEqual("", rc.caCertFilename)
|
||||||
|
|
||||||
|
cert, err := ioutil.ReadFile(rc.certFilename)
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
caCert, err := ioutil.ReadFile(rc.caCertFilename)
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
suite.Equal("licensed by the State of Oregon to perform repossessions", string(cert))
|
||||||
|
suite.Equal("Oregon State Licensure board", string(caCert))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *RepoCertsTestSuite) TestFlags() {
|
||||||
|
rc := newRepoCerts(env.Config{})
|
||||||
|
suite.Equal([]string{}, rc.flags())
|
||||||
|
rc.certFilename = "hurgityburgity"
|
||||||
|
suite.Equal([]string{"--cert-file", "hurgityburgity"}, rc.flags())
|
||||||
|
rc.caCertFilename = "honglydongly"
|
||||||
|
suite.Equal([]string{"--cert-file", "hurgityburgity", "--ca-file", "honglydongly"}, rc.flags())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *RepoCertsTestSuite) TestDebug() {
|
||||||
|
stderr := strings.Builder{}
|
||||||
|
cfg := env.Config{
|
||||||
|
RepoCertificate: "bGljZW5zZWQgYnkgdGhlIFN0YXRlIG9mIE9yZWdvbiB0byBwZXJmb3JtIHJlcG9zc2Vzc2lvbnM=",
|
||||||
|
RepoCACertificate: "T3JlZ29uIFN0YXRlIExpY2Vuc3VyZSBib2FyZA==",
|
||||||
|
Stderr: &stderr,
|
||||||
|
Debug: true,
|
||||||
|
}
|
||||||
|
rc := newRepoCerts(cfg)
|
||||||
|
suite.Require().NotNil(rc)
|
||||||
|
|
||||||
|
suite.NoError(rc.write())
|
||||||
|
defer os.Remove(rc.certFilename)
|
||||||
|
defer os.Remove(rc.caCertFilename)
|
||||||
|
|
||||||
|
suite.Contains(stderr.String(), fmt.Sprintf("writing repo certificate to %s", rc.certFilename))
|
||||||
|
suite.Contains(stderr.String(), fmt.Sprintf("writing repo ca certificate to %s", rc.caCertFilename))
|
||||||
|
}
|
|
@ -22,7 +22,7 @@ type Upgrade struct {
|
||||||
force bool
|
force bool
|
||||||
atomic bool
|
atomic bool
|
||||||
cleanupOnFail bool
|
cleanupOnFail bool
|
||||||
caFile string
|
certs *repoCerts
|
||||||
|
|
||||||
cmd cmd
|
cmd cmd
|
||||||
}
|
}
|
||||||
|
@ -44,7 +44,7 @@ func NewUpgrade(cfg env.Config) *Upgrade {
|
||||||
force: cfg.Force,
|
force: cfg.Force,
|
||||||
atomic: cfg.AtomicUpgrade,
|
atomic: cfg.AtomicUpgrade,
|
||||||
cleanupOnFail: cfg.CleanupOnFail,
|
cleanupOnFail: cfg.CleanupOnFail,
|
||||||
caFile: cfg.RepoCAFile,
|
certs: newRepoCerts(cfg),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -98,9 +98,7 @@ func (u *Upgrade) Prepare() error {
|
||||||
for _, vFile := range u.valuesFiles {
|
for _, vFile := range u.valuesFiles {
|
||||||
args = append(args, "--values", vFile)
|
args = append(args, "--values", vFile)
|
||||||
}
|
}
|
||||||
if u.caFile != "" {
|
args = append(args, u.certs.flags()...)
|
||||||
args = append(args, "--ca-file", u.caFile)
|
|
||||||
}
|
|
||||||
|
|
||||||
args = append(args, u.release, u.chart)
|
args = append(args, u.release, u.chart)
|
||||||
u.cmd = command(helmBin, args...)
|
u.cmd = command(helmBin, args...)
|
||||||
|
|
|
@ -64,6 +64,7 @@ func (suite *UpgradeTestSuite) TestNewUpgrade() {
|
||||||
suite.Equal(true, up.atomic)
|
suite.Equal(true, up.atomic)
|
||||||
suite.Equal(true, up.cleanupOnFail)
|
suite.Equal(true, up.cleanupOnFail)
|
||||||
suite.NotNil(up.config)
|
suite.NotNil(up.config)
|
||||||
|
suite.NotNil(up.certs)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *UpgradeTestSuite) TestPrepareAndExecute() {
|
func (suite *UpgradeTestSuite) TestPrepareAndExecute() {
|
||||||
|
@ -136,9 +137,10 @@ func (suite *UpgradeTestSuite) TestPrepareWithUpgradeFlags() {
|
||||||
Force: true,
|
Force: true,
|
||||||
AtomicUpgrade: true,
|
AtomicUpgrade: true,
|
||||||
CleanupOnFail: true,
|
CleanupOnFail: true,
|
||||||
RepoCAFile: "local_ca.cert",
|
|
||||||
}
|
}
|
||||||
u := NewUpgrade(cfg)
|
u := NewUpgrade(cfg)
|
||||||
|
// inject a ca cert filename so repoCerts won't create any files that we'd have to clean up
|
||||||
|
u.certs.caCertFilename = "local_ca.cert"
|
||||||
|
|
||||||
command = func(path string, args ...string) cmd {
|
command = func(path string, args ...string) cmd {
|
||||||
suite.Equal(helmBin, path)
|
suite.Equal(helmBin, path)
|
||||||
|
|
Loading…
Reference in a new issue