Skip to content

Commit 6032e22

Browse files
committed
Refactor helm package & rbac creation
1 parent 768a6cb commit 6032e22

11 files changed

Lines changed: 729 additions & 659 deletions

File tree

cmd/init.go

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -391,7 +391,9 @@ func (cmd *InitCmd) useCloudProvider() bool {
391391
cmd.config.Cluster.CloudProvider = &cloudProviderSelected
392392
cmd.config.Cluster.UseKubeConfig = &addToContext
393393

394+
log.StartWait("Logging into cloud provider " + providerConfig[cloudProviderSelected].Host + cloud.LoginEndpoint + "...")
394395
err := cloud.Update(providerConfig, cmd.config, true)
396+
log.StopWait()
395397
if err != nil {
396398
log.Fatalf("Couldn't authenticate to devspace cloud: %v", err)
397399
}
@@ -415,7 +417,9 @@ func (cmd *InitCmd) useCloudProvider() bool {
415417
cmd.config.Cluster.CloudProvider = configutil.String(cloud.DevSpaceCloudProviderName)
416418
cmd.config.Cluster.UseKubeConfig = &addToContext
417419

420+
log.StartWait("Logging into cloud provider " + providerConfig[cloud.DevSpaceCloudProviderName].Host + cloud.LoginEndpoint + "...")
418421
err := cloud.Update(providerConfig, cmd.config, true)
422+
log.StopWait()
419423
if err != nil {
420424
log.Fatalf("Couldn't authenticate to devspace cloud: %v", err)
421425
}

cmd/reset.go

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -284,9 +284,7 @@ func (cmd *ResetCmd) deleteRegistry() error {
284284
}
285285

286286
func (cmd *ResetCmd) deleteTiller() error {
287-
config := configutil.GetConfig(false)
288-
289-
return helmClient.DeleteTiller(cmd.kubectl, config.Services.Tiller)
287+
return helmClient.DeleteTiller(cmd.kubectl)
290288
}
291289

292290
func (cmd *ResetCmd) deleteDockerfile() error {

cmd/up.go

Lines changed: 17 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -140,10 +140,7 @@ func (cmd *UpCmd) Run(cobraCmd *cobra.Command, args []string) {
140140
log.Fatalf("Unable to create new kubectl client: %v", err)
141141
}
142142

143-
err = cmd.ensureNamespace()
144-
if err != nil {
145-
log.Fatalf("Unable to create release namespace: %v", err)
146-
}
143+
cmd.ensureNamespace()
147144

148145
err = cmd.ensureClusterRoleBinding()
149146
if err != nil {
@@ -198,56 +195,26 @@ func (cmd *UpCmd) Run(cobraCmd *cobra.Command, args []string) {
198195
enterTerminal(cmd.kubectl, cmd.pod, cmd.flags.container, args)
199196
}
200197

201-
func (cmd *UpCmd) ensureNamespace() error {
198+
func (cmd *UpCmd) ensureNamespace() {
202199
config := configutil.GetConfig(false)
203200
releaseNamespace := *config.DevSpace.Release.Namespace
204201

205-
// Check if registry namespace exists
206-
_, err := cmd.kubectl.CoreV1().Namespaces().Get(releaseNamespace, metav1.GetOptions{})
207-
if err != nil {
208-
// Create registry namespace
209-
_, err = cmd.kubectl.CoreV1().Namespaces().Create(&k8sv1.Namespace{
210-
ObjectMeta: metav1.ObjectMeta{
211-
Name: releaseNamespace,
212-
},
213-
})
214-
215-
if err != nil {
216-
return err
217-
}
218-
}
219-
220-
return nil
202+
// Create release namespace and ignore errors
203+
_, _ = cmd.kubectl.CoreV1().Namespaces().Create(&k8sv1.Namespace{
204+
ObjectMeta: metav1.ObjectMeta{
205+
Name: releaseNamespace,
206+
},
207+
})
221208
}
222209

223210
func (cmd *UpCmd) ensureClusterRoleBinding() error {
224-
/*
225-
config := configutil.GetConfig(false)
226-
227-
accessReview := &k8sauthorizationv1.SelfSubjectAccessReview{
228-
Spec: k8sauthorizationv1.SelfSubjectAccessReviewSpec{
229-
ResourceAttributes: &k8sauthorizationv1.ResourceAttributes{
230-
Namespace: *config.DevSpace.Release.Namespace,
231-
Verb: "create",
232-
Group: "rbac.authorization.k8s.io",
233-
Resource: "roles",
234-
},
235-
},
236-
}
237-
238-
resp, permErr := cmd.kubectl.Authorization().SelfSubjectAccessReviews().Create(accessReview)
239-
240-
if permErr != nil {*/
241-
242211
if kubectl.IsMinikube() {
243212
return nil
244213
}
245214

246215
_, err := cmd.kubectl.RbacV1beta1().ClusterRoleBindings().Get(clusterRoleBindingName, metav1.GetOptions{})
247-
248216
if err != nil {
249217
clusterConfig, _ := kubectl.GetClientConfig()
250-
251218
if clusterConfig.AuthProvider != nil && clusterConfig.AuthProvider.Name == "gcp" {
252219
createRoleBinding := stdinutil.GetFromStdin(&stdinutil.GetFromStdinParams{
253220
Question: "Do you want the ClusterRoleBinding '" + clusterRoleBindingName + "' to be created automatically? (yes|no)",
@@ -295,14 +262,19 @@ func (cmd *UpCmd) ensureClusterRoleBinding() error {
295262
},
296263
}
297264

298-
_, roleBindingErr := cmd.kubectl.RbacV1beta1().ClusterRoleBindings().Create(rolebinding)
299-
if roleBindingErr != nil {
300-
return roleBindingErr
265+
_, err = cmd.kubectl.RbacV1beta1().ClusterRoleBindings().Create(rolebinding)
266+
if err != nil {
267+
return err
301268
}
302269
} else {
303-
log.Warn("Unable to check permissions: If you run into errors, please create the ClusterRoleBinding '" + clusterRoleBindingName + "' as described here: https://devspace.covexo.com/docs/advanced/rbac.html")
270+
cfg := configutil.GetConfig(false)
271+
272+
if cfg.Cluster.CloudProvider == nil || *cfg.Cluster.CloudProvider == "" {
273+
log.Warn("Unable to check permissions: If you run into errors, please create the ClusterRoleBinding '" + clusterRoleBindingName + "' as described here: https://devspace.covexo.com/docs/advanced/rbac.html")
274+
}
304275
}
305276
}
277+
306278
return nil
307279
}
308280

0 commit comments

Comments
 (0)