X-Git-Url: https://gerrit.akraino.org/r/gitweb?a=blobdiff_plain;f=deploy%2Fsite%2Fvm%2Fvm.sh;h=9f6e455edbac364654c3b6d16b2a8ac4af67813f;hb=adbd076f40c348b04e52321c3c5cdaa528915f1a;hp=51ad4c9c9130ae1e9d49aed24f240925aa6a93da;hpb=77249ba85760fc2111a98dc6719670312f64a31a;p=icn.git diff --git a/deploy/site/vm/vm.sh b/deploy/site/vm/vm.sh old mode 100644 new mode 100755 index 51ad4c9..9f6e455 --- a/deploy/site/vm/vm.sh +++ b/deploy/site/vm/vm.sh @@ -12,125 +12,26 @@ mkdir -p ${BUILDDIR} SITE_REPO=${SITE_REPO:-"https://gerrit.akraino.org/r/icn"} SITE_BRANCH=${SITE_BRANCH:-"master"} -SITE_PATH=${SITE_PATH:-"deploy/site/vm"} - -FLUX_SOPS_KEY_NAME=${FLUX_SOPS_KEY_NAME:-"icn-site-vm"} -FLUX_SOPS_PRIVATE_KEY="${SCRIPTDIR}/../secrets/sops.asc" - -# !!!NOTE!!! THE KEYS USED BELOW ARE FOR TEST PURPOSES ONLY. DO NOT -# USE THESE OUTSIDE OF THIS ICN VIRTUAL TEST ENVIRONMENT. -function build_source { - # First decrypt the existing site YAML, otherwise we'll be - # attempting to encrypt it twice below - if [[ -f ${FLUX_SOPS_PRIVATE_KEY} ]]; then - gpg --import ${FLUX_SOPS_PRIVATE_KEY} - sops_decrypt ${SCRIPTDIR}/site.yaml - fi - - # Generate user password and authorized key in site YAML - # To login to guest, ssh -i ${SCRIPTDIR}/id_rsa - HASHED_PASSWORD=$(mkpasswd --method=SHA-512 --rounds 10000 "mypasswd") - sed -i -e 's!hashedPassword: .*!hashedPassword: '"${HASHED_PASSWORD}"'!' ${SCRIPTDIR}/site.yaml - ssh-keygen -t rsa -N "" -f ${SCRIPTDIR}/id_rsa <<${FLUX_SOPS_PRIVATE_KEY} -} - -function deploy { - gpg --import ${FLUX_SOPS_PRIVATE_KEY} - flux_create_site ${SITE_REPO} ${SITE_BRANCH} ${SITE_PATH} ${FLUX_SOPS_KEY_NAME} -} - -function clean { - kubectl -n flux-system delete kustomization $(flux_site_kustomization_name ${SITE_REPO} ${SITE_BRANCH} ${SITE_PATH}) -} - -function is_cluster_ready { - [[ $(kubectl -n ${SITE_NAMESPACE} get cluster icn -o jsonpath='{.status.conditions[?(@.type=="Ready")].status}') == "True" ]] -} - -function is_control_plane_ready { - # Checking the Cluster resource status is not sufficient, it - # reports the control plane as ready before the nodes forming the - # control plane are ready - local -r replicas=$(kubectl -n ${SITE_NAMESPACE} get kubeadmcontrolplane icn -o jsonpath='{.spec.replicas}') - [[ $(kubectl --kubeconfig=${BUILDDIR}/icn-admin.conf get nodes -l node-role.kubernetes.io/control-plane -o jsonpath='{range .items[*]}{.status.conditions[?(@.type=="Ready")].status}{"\n"}{end}' | grep -c True) == ${replicas} ]] -} - -function insert_control_plane_network_identity_into_ssh_config { - # This enables logging into the control plane machines from this - # machine without specifying the identify file on the command line - - if [[ ! $(which ipcalc) ]]; then - apt-get install -y ipcalc - fi - - # Create ssh config if it doesn't exist - mkdir -p ${HOME}/.ssh && chmod 700 ${HOME}/.ssh - touch ${HOME}/.ssh/config - chmod 600 ${HOME}/.ssh/config - # Add the entry for the control plane network, host value in ssh - # config is a wildcard - endpoint=$(helm -n ${SITE_NAMESPACE} get values -a cluster-icn | awk '/controlPlaneEndpoint:/ {print $2}') - prefix=$(helm -n ${SITE_NAMESPACE} get values -a cluster-icn | awk '/controlPlanePrefix:/ {print $2}') - host=$(ipcalc ${endpoint}/${prefix} | awk '/Network:/ {sub(/\.0.*/,".*"); print $2}') - if [[ $(grep -c "Host ${host}" ${HOME}/.ssh/config) != 0 ]]; then - sed -i -e '/Host '"${host}"'/,+1 d' ${HOME}/.ssh/config - fi - cat <>${HOME}/.ssh/config -Host ${host} - IdentityFile ${SCRIPTDIR}/id_rsa - StrictHostKeyChecking no - UserKnownHostsFile /dev/null -EOF - # Add the identity to authorized keys on this host to enable ssh - # logins via its control plane address - cat ${SCRIPTDIR}/id_rsa.pub >> ~/.ssh/authorized_keys -} - -function wait_for_all_ready { - WAIT_FOR_INTERVAL=60s - WAIT_FOR_TRIES=30 - wait_for is_cluster_ready - clusterctl -n ${SITE_NAMESPACE} get kubeconfig icn >${BUILDDIR}/icn-admin.conf - chmod 600 ${BUILDDIR}/icn-admin.conf - wait_for is_control_plane_ready - insert_control_plane_network_identity_into_ssh_config -} - -function is_cluster_deleted { - ! kubectl -n ${SITE_NAMESPACE} get cluster icn -} - -function wait_for_all_deleted { - WAIT_FOR_INTERVAL=60s - WAIT_FOR_TRIES=30 - wait_for is_cluster_deleted -} +SITE_PATH=${SITE_PATH:-"deploy/site/vm/deployment"} case $1 in - "build-source") build_source ;; - "clean") clean ;; - "deploy") deploy ;; - "wait") wait_for_all_ready ;; - "wait-clean") wait_for_all_deleted ;; + "clean") site_clean ;; + "deploy") + gpg --import ${FLUX_SOPS_PRIVATE_KEY} + site_deploy ;; + "wait") + site_wait_for_all_ready + site_insert_control_plane_network_identity_into_ssh_config + ;; + "wait-clean") site_wait_for_all_deleted ;; *) cat <