Skip to content

Commit 4069099

Browse files
authored
Merge pull request #281 from covexo/config-fix
Config fix
2 parents 52e986b + 8581cb0 commit 4069099

13 files changed

Lines changed: 899 additions & 761 deletions

File tree

cmd/init.go

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -391,7 +391,9 @@ func (cmd *InitCmd) useCloudProvider() bool {
391391
cmd.config.Cluster.CloudProvider = &cloudProviderSelected
392392
cmd.config.Cluster.UseKubeConfig = &addToContext
393393

394+
log.StartWait("Logging into cloud provider " + providerConfig[cloudProviderSelected].Host + cloud.LoginEndpoint + "...")
394395
err := cloud.Update(providerConfig, cmd.config, true)
396+
log.StopWait()
395397
if err != nil {
396398
log.Fatalf("Couldn't authenticate to devspace cloud: %v", err)
397399
}
@@ -415,7 +417,9 @@ func (cmd *InitCmd) useCloudProvider() bool {
415417
cmd.config.Cluster.CloudProvider = configutil.String(cloud.DevSpaceCloudProviderName)
416418
cmd.config.Cluster.UseKubeConfig = &addToContext
417419

420+
log.StartWait("Logging into cloud provider " + providerConfig[cloud.DevSpaceCloudProviderName].Host + cloud.LoginEndpoint + "...")
418421
err := cloud.Update(providerConfig, cmd.config, true)
422+
log.StopWait()
419423
if err != nil {
420424
log.Fatalf("Couldn't authenticate to devspace cloud: %v", err)
421425
}

cmd/reset.go

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -284,9 +284,7 @@ func (cmd *ResetCmd) deleteRegistry() error {
284284
}
285285

286286
func (cmd *ResetCmd) deleteTiller() error {
287-
config := configutil.GetConfig(false)
288-
289-
return helmClient.DeleteTiller(cmd.kubectl, config.Services.Tiller)
287+
return helmClient.DeleteTiller(cmd.kubectl)
290288
}
291289

292290
func (cmd *ResetCmd) deleteDockerfile() error {

cmd/up.go

Lines changed: 14 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ func (cmd *UpCmd) Run(cobraCmd *cobra.Command, args []string) {
142142

143143
err = cmd.ensureNamespace()
144144
if err != nil {
145-
log.Fatalf("Unable to create release namespace: %v", err)
145+
log.Fatalf("Unable to create namespace: %v", err)
146146
}
147147

148148
err = cmd.ensureClusterRoleBinding()
@@ -159,7 +159,7 @@ func (cmd *UpCmd) Run(cobraCmd *cobra.Command, args []string) {
159159
// Build image if necessary
160160
mustRedeploy := cmd.buildImages()
161161

162-
// Check if we find a running release pod
162+
// Check if the chart directory has changed
163163
hash, err := hash.Directory("chart")
164164
if err != nil {
165165
log.Fatalf("Error hashing chart directory: %v", err)
@@ -168,6 +168,7 @@ func (cmd *UpCmd) Run(cobraCmd *cobra.Command, args []string) {
168168
// Load config
169169
config := configutil.GetConfig(false)
170170

171+
// Check if we find a running release pod
171172
pod, err := getRunningDevSpacePod(cmd.helm, cmd.kubectl)
172173
if err != nil || mustRedeploy || cmd.flags.deploy || config.DevSpace.ChartHash == nil || *config.DevSpace.ChartHash != hash {
173174
cmd.deployChart()
@@ -202,52 +203,27 @@ func (cmd *UpCmd) ensureNamespace() error {
202203
config := configutil.GetConfig(false)
203204
releaseNamespace := *config.DevSpace.Release.Namespace
204205

205-
// Check if registry namespace exists
206206
_, err := cmd.kubectl.CoreV1().Namespaces().Get(releaseNamespace, metav1.GetOptions{})
207207
if err != nil {
208-
// Create registry namespace
208+
// Create release namespace
209209
_, err = cmd.kubectl.CoreV1().Namespaces().Create(&k8sv1.Namespace{
210210
ObjectMeta: metav1.ObjectMeta{
211211
Name: releaseNamespace,
212212
},
213213
})
214-
215-
if err != nil {
216-
return err
217-
}
218214
}
219215

220-
return nil
216+
return err
221217
}
222218

223219
func (cmd *UpCmd) ensureClusterRoleBinding() error {
224-
/*
225-
config := configutil.GetConfig(false)
226-
227-
accessReview := &k8sauthorizationv1.SelfSubjectAccessReview{
228-
Spec: k8sauthorizationv1.SelfSubjectAccessReviewSpec{
229-
ResourceAttributes: &k8sauthorizationv1.ResourceAttributes{
230-
Namespace: *config.DevSpace.Release.Namespace,
231-
Verb: "create",
232-
Group: "rbac.authorization.k8s.io",
233-
Resource: "roles",
234-
},
235-
},
236-
}
237-
238-
resp, permErr := cmd.kubectl.Authorization().SelfSubjectAccessReviews().Create(accessReview)
239-
240-
if permErr != nil {*/
241-
242220
if kubectl.IsMinikube() {
243221
return nil
244222
}
245223

246224
_, err := cmd.kubectl.RbacV1beta1().ClusterRoleBindings().Get(clusterRoleBindingName, metav1.GetOptions{})
247-
248225
if err != nil {
249226
clusterConfig, _ := kubectl.GetClientConfig()
250-
251227
if clusterConfig.AuthProvider != nil && clusterConfig.AuthProvider.Name == "gcp" {
252228
createRoleBinding := stdinutil.GetFromStdin(&stdinutil.GetFromStdinParams{
253229
Question: "Do you want the ClusterRoleBinding '" + clusterRoleBindingName + "' to be created automatically? (yes|no)",
@@ -295,14 +271,19 @@ func (cmd *UpCmd) ensureClusterRoleBinding() error {
295271
},
296272
}
297273

298-
_, roleBindingErr := cmd.kubectl.RbacV1beta1().ClusterRoleBindings().Create(rolebinding)
299-
if roleBindingErr != nil {
300-
return roleBindingErr
274+
_, err = cmd.kubectl.RbacV1beta1().ClusterRoleBindings().Create(rolebinding)
275+
if err != nil {
276+
return err
301277
}
302278
} else {
303-
log.Warn("Unable to check permissions: If you run into errors, please create the ClusterRoleBinding '" + clusterRoleBindingName + "' as described here: https://devspace.covexo.com/docs/advanced/rbac.html")
279+
cfg := configutil.GetConfig(false)
280+
281+
if cfg.Cluster.CloudProvider == nil || *cfg.Cluster.CloudProvider == "" {
282+
log.Warn("Unable to check permissions: If you run into errors, please create the ClusterRoleBinding '" + clusterRoleBindingName + "' as described here: https://devspace.covexo.com/docs/advanced/rbac.html")
283+
}
304284
}
305285
}
286+
306287
return nil
307288
}
308289

0 commit comments

Comments
 (0)