From 9d0e2f00a9be1e85199bd7e4e5bfd89e21651ce5 Mon Sep 17 00:00:00 2001 From: Stefan Reimer Date: Tue, 3 Nov 2020 12:51:57 +0000 Subject: [PATCH] First steps of argoless bootstrap --- charts/kubezero-cert-manager/values.yaml | 2 +- deploy/bootstrap.sh | 118 +++++++++++++++++++++++ 2 files changed, 119 insertions(+), 1 deletion(-) create mode 100755 deploy/bootstrap.sh diff --git a/charts/kubezero-cert-manager/values.yaml b/charts/kubezero-cert-manager/values.yaml index b14b4b9..c415290 100644 --- a/charts/kubezero-cert-manager/values.yaml +++ b/charts/kubezero-cert-manager/values.yaml @@ -9,7 +9,7 @@ clusterIssuer: {} # hostedZoneID: 1234567890 localCA: - enabled: true + enabled: false # If selfsigning is false you must provide the ca key and crt below selfsigning: true #ca: diff --git a/deploy/bootstrap.sh b/deploy/bootstrap.sh new file mode 100755 index 0000000..c78e425 --- /dev/null +++ b/deploy/bootstrap.sh @@ -0,0 +1,118 @@ +#!/bin/bash +set -ex + +LOCATION=${1-""} + +# Update only if we use upstream +if [ -z "$LOCATION" ]; then + helm repo add kubezero https://zero-down-time.github.io/kubezero + helm repo update +fi + +DEPLOY_DIR=$( dirname $( realpath $0 )) +which yq || { echo "yq not found!"; exit 1; } + +# Waits for max 300s and retries +function wait_for() { + local TRIES=0 + while true; do + $@ && break + [ $TRIES -eq 200 ] && return 1 + let TRIES=$TRIES+1 + sleep 3 + done +} + +function _helm() { + local action=$1 + local chart=$2 + local release=$3 + local namespace=$4 + shift 4 + + local location + + if [ -z "$LOCATION" ]; then + location="$chart --repo https://zero-down-time.github.io/kubezero" + else + location="$LOCATION/$chart" + fi + + [ -n "$namespace" ] && kubectl get ns $namespace || kubectl create ns $namespace + helm template $location --namespace $namespace --name-template $release $@ | kubectl $action -f - +} + +function deploy() { + _helm apply $@ +} + +function delete() { + _helm delete $@ +} + +################ +# cert-manager # +################ + +# Let's start with minimal cert-manager to get the webhook in place +deploy kubezero-cert-manager cert-manager cert-manager + +echo "Waiting for cert-manager to be ready..." +wait_for kubectl get deployment -n cert-manager cert-manager-webhook 2>/dev/null 1>&2 +kubectl rollout status deployment -n cert-manager cert-manager-webhook +wait_for kubectl get validatingwebhookconfigurations -o yaml | grep "caBundle: LS0" 2>/dev/null 1>&2 + +# Either inject cert-manager backup or bootstrap +if [ -f cert-manager-backup.yaml ]; then + kubectl apply -f cert-manager-backup.yaml +else + deploy kubezero-cert-manager cert-manager cert-manager --set localCA.enabled=true + wait_for kubectl get Issuer -n kube-system kubezero-local-ca-issuer 2>/dev/null 1>&2 + kubectl wait --for=condition=Ready -n kube-system Issuer/kubezero-local-ca-issuer +fi + +echo "KubeZero installed successfully." +read + +# Remove all kubezero +delete kubezero-cert-manager cert-manager cert-manager + +exit 0 + +# Determine if we bootstrap or update +helm list -n argocd -f kubezero -q | grep -q kubezero && rc=$? || rc=$? +if [ $rc -eq 0 ]; then + helm template $DEPLOY_DIR -f values.yaml -f cloudbender.yaml > generated-values.yaml + helm upgrade -n argocd kubezero kubezero/kubezero-argo-cd -f generated-values.yaml +else + + + # Make sure kube-system is allowed to kiam + kubectl annotate --overwrite namespace kube-system 'iam.amazonaws.com/permitted=.*' + + # Now that we have the cert-manager webhook, get the kiam certs in place but do NOT deploy kiam yet + helm template $DEPLOY_DIR -f values.yaml -f cloudbender.yaml -f $DEPLOY_DIR/values-step-3.yaml > generated-values.yaml + helm upgrade -n argocd kubezero kubezero/kubezero-argo-cd -f generated-values.yaml + kubectl wait --for=condition=Ready -n kube-system certificates/kiam-server + + # Now lets make sure kiam is working + helm template $DEPLOY_DIR -f values.yaml -f cloudbender.yaml -f $DEPLOY_DIR/values-step-4.yaml > generated-values.yaml + helm upgrade -n argocd kubezero kubezero/kubezero-argo-cd -f generated-values.yaml + wait_for kubectl get daemonset -n kube-system kiam-agent 2>/dev/null 1>&2 + kubectl rollout status daemonset -n kube-system kiam-agent + + # Install Istio if enabled, but keep ArgoCD istio support disabled for now in case + helm template $DEPLOY_DIR -f values.yaml -f cloudbender.yaml -f $DEPLOY_DIR/values-step-5.yaml > generated-values.yaml + helm upgrade -n argocd kubezero kubezero/kubezero-argo-cd -f generated-values.yaml + wait_for kubectl get deployment -n istio-operator istio-operator 2>/dev/null 1>&2 + kubectl rollout status deployment -n istio-operator istio-operator + + # Metrics + helm template $DEPLOY_DIR -f values.yaml -f cloudbender.yaml -f $DEPLOY_DIR/values-step-6.yaml > generated-values.yaml + helm upgrade -n argocd kubezero kubezero/kubezero-argo-cd -f generated-values.yaml + wait_for kubectl get crds servicemonitors.monitoring.coreos.com 2>/dev/null 1>&2 + + # Finally we could enable the actual config and deploy all + helm template $DEPLOY_DIR -f values.yaml -f cloudbender.yaml > generated-values.yaml + helm upgrade -n argocd kubezero kubezero/kubezero-argo-cd -f generated-values.yaml +fi