X-Git-Url: https://gerrit.akraino.org/r/gitweb?a=blobdiff_plain;f=deploy%2Fsite%2Fvm%2Fvm.sh;h=841644b154e88345a1ba666c15f18031c33bd81d;hb=43dbb5a2353606d1801f08dcf3e2fd06399843fb;hp=882a8bda26532bee7c5fcd6da6b1ed3e63ebdf15;hpb=53692156832a326a5d1123e3284a3f8737ed395f;p=icn.git diff --git a/deploy/site/vm/vm.sh b/deploy/site/vm/vm.sh index 882a8bd..841644b 100755 --- a/deploy/site/vm/vm.sh +++ b/deploy/site/vm/vm.sh @@ -5,35 +5,48 @@ SCRIPTDIR="$(readlink -f $(dirname ${BASH_SOURCE[0]}))" LIBDIR="$(dirname $(dirname $(dirname ${SCRIPTDIR})))/env/lib" source $LIBDIR/common.sh +source $SCRIPTDIR/../common.sh BUILDDIR=${SCRIPTDIR/deploy/build} mkdir -p ${BUILDDIR} -function build { - SSH_AUTHORIZED_KEY=$(cat ${HOME}/.ssh/id_rsa.pub) +FLUX_SOPS_KEY_NAME=${FLUX_SOPS_KEY_NAME:-"icn-site-vm"} + +# !!!NOTE!!! THE KEYS USED BELOW ARE FOR TEST PURPOSES ONLY. DO NOT +# USE THESE OUTSIDE OF THIS ICN VIRTUAL TEST ENVIRONMENT. +function build_source { + # First decrypt the existing site YAML, otherwise we'll be + # attempting to encrypt it twice below + if [[ -f ${SCRIPTDIR}/sops.asc ]]; then + gpg --import ${SCRIPTDIR}/sops.asc + sops_decrypt_site ${SCRIPTDIR}/site.yaml + fi + + # Generate user password and authorized key in site YAML + # To login to guest, ssh -i ${SCRIPTDIR}/id_rsa + HASHED_PASSWORD=$(mkpasswd --method=SHA-512 --rounds 10000 "mypasswd") + sed -i -e 's!hashedPassword: .*!hashedPassword: '"${HASHED_PASSWORD}"'!' ${SCRIPTDIR}/site.yaml + ssh-keygen -t rsa -N "" -f ${SCRIPTDIR}/id_rsa <<${BUILDDIR}/cluster-e2etest-values.yaml -} + sed -i -e 's!sshAuthorizedKey: .*!sshAuthorizedKey: '"${SSH_AUTHORIZED_KEY}"'!' ${SCRIPTDIR}/site.yaml + + # Encrypt the site YAML + create_gpg_key ${FLUX_SOPS_KEY_NAME} + sops_encrypt_site ${SCRIPTDIR}/site.yaml ${FLUX_SOPS_KEY_NAME} -function release_name { - local -r values_path=$1 - name=$(basename ${values_path}) - echo ${name%-values.yaml} + # ONLY FOR TEST ENVIRONMENT: save the private key used + export_gpg_private_key ${FLUX_SOPS_KEY_NAME} >${SCRIPTDIR}/sops.asc } function deploy { - for values in ${BUILDDIR}/machine-*-values.yaml; do - helm -n metal3 install $(release_name ${values}) ${SCRIPTDIR}/../../machine --create-namespace -f ${values} - done - helm -n metal3 install cluster-e2etest ${SCRIPTDIR}/../../cluster --create-namespace -f ${BUILDDIR}/cluster-e2etest-values.yaml + gpg --import ${SCRIPTDIR}/sops.asc + flux_create_site https://gerrit.akraino.org/r/icn master deploy/site/vm ${FLUX_SOPS_KEY_NAME} } function clean { - helm -n metal3 uninstall cluster-e2etest - for values in ${BUILDDIR}/machine-*-values.yaml; do - helm -n metal3 uninstall $(release_name ${values}) - done + kubectl -n flux-system delete kustomization icn-master-site-vm } function is_cluster_ready { @@ -48,6 +61,28 @@ function is_control_plane_ready { [[ $(kubectl --kubeconfig=${BUILDDIR}/e2etest-admin.conf get nodes -l node-role.kubernetes.io/control-plane -o jsonpath='{range .items[*]}{.status.conditions[?(@.type=="Ready")].status}{"\n"}{end}' | grep -c True) == ${replicas} ]] } +function insert_control_plane_network_identity_into_ssh_config { + # This enables logging into the control plane machines from this + # machine without specifying the identify file on the command line + + # Create ssh config if it doesn't exist + mkdir -p ${HOME}/.ssh && chmod 700 ${HOME}/.ssh + touch ${HOME}/.ssh/config + chmod 600 ${HOME}/.ssh/config + # Add the entry for the control plane network, host value in ssh + # config is a wildcard + endpoint=$(helm -n metal3 get values -a cluster-e2etest | awk '/controlPlaneEndpoint:/ {print $2}') + prefix=$(helm -n metal3 get values -a cluster-e2etest | awk '/controlPlanePrefix:/ {print $2}') + host=$(ipcalc ${endpoint}/${prefix} | awk '/Network:/ {sub(/\.0.*/,".*"); print $2}') + if [[ $(grep -c "Host ${host}" ${HOME}/.ssh/config) != 0 ]]; then + sed -i -e '/Host '"${host}"'/,+1 d' ${HOME}/.ssh/config + fi + cat <>${HOME}/.ssh/config +Host ${host} + IdentityFile ${SCRIPTDIR}/id_rsa +EOF +} + function wait_for_all_ready { WAIT_FOR_INTERVAL=60s WAIT_FOR_TRIES=30 @@ -55,10 +90,11 @@ function wait_for_all_ready { clusterctl -n metal3 get kubeconfig e2etest >${BUILDDIR}/e2etest-admin.conf chmod 600 ${BUILDDIR}/e2etest-admin.conf wait_for is_control_plane_ready + insert_control_plane_network_identity_into_ssh_config } case $1 in - "build") build ;; + "build-source") build_source ;; "clean") clean ;; "deploy") deploy ;; "wait") wait_for_all_ready ;; @@ -66,7 +102,7 @@ case $1 in Usage: $(basename $0) COMMAND Commands: - build - Build the site deployment values + build-source - Build the in-tree site values clean - Remove the site deploy - Deploy the site wait - Wait for the site to be ready