代码拉取完成,页面将自动刷新
同步操作将从 Gitee 极速下载/Jenkins-x 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
#!/bin/bash -e
##
## TODO - When the $INSTANCE_NAME approaches 253 characters, this script should
## truncate accordingly to make sure that any secrets/configmaps that
## get saved here don't get blocked by the K8S API due to names being
## too long.
##
# Let the finalizer or manual destroy by passing in $DESTROY="true"
# Terraforms will be applyed only then $APPLY="true"
function run_terraform {
# options:
# destroy=true|false
declare $@
if [ "$destroy" = "true" ];then
destroy_when_true='-destroy'
fi
terraform -chdir=. init
if [ $? -gt 0 ];then return 1;fi
terraform -chdir=. plan $TFOPS_VARFILE_FLAG $destroy_when_true -out plan.out 2>&1| tee $TMP
if [ ${PIPESTATUS[0]} -gt 0 ];then
set +x
save_plan
set -x
return 1
else
set +x
save_plan
set -x
fi
set +x
n=0
while true;do
(( n++ ))
get_action # sets $action variable
if [ "$action" = "apply" ];then
break
elif [ "$action" = "abort" ];then
exit 0
fi
if [ $n -gt 60 ];then
echo "Waiting for user action. Check the cm/${INSTANCE_NAME}-action"
n=0
fi
sleep 1
done
set -x
terraform apply plan.out
if [ $? -gt 0 ];then return 1;fi
set +x
# Replan to see what tf thinks should happen next.
terraform -chdir=. plan $TFOPS_VARFILE_FLAG $destroy_when_true 2>&1| tee $TMP
}
function save_plan {
# Clean the output from coloration
cat $TMP | sed -r "s/\x1B\[([0-9]{1,2}(;[0-9]{1,2})?)?[mGK]//g" > $CLEAN
# Save the intermediate plan
cp $CLEAN tfplan
kubectl delete cm ${INSTANCE_NAME}-plan > /dev/null 2>&1 || true
kubectl create cm ${INSTANCE_NAME}-plan --from-file tfplan
}
function save_output {
# Save terraform output as a configmap
# TODO sensative items should be stored as a secret
cat << EOF > "$INSTANCE_NAME-output.yaml"
---
apiVersion: v1
kind: ConfigMap
metadata:
name: $INSTANCE_NAME-output
namespace: $NAMESPACE
data:
$(terraform output -json| jq -r '.|keys[] as $k| " \($k): |-\n \(.[$k].value)"')
EOF
kubectl apply -f "$INSTANCE_NAME-output.yaml"
}
function get_action {
action=`kubectl get cm ${INSTANCE_NAME}-action -ojsonpath='{.data.action}'`
export action
}
if [ "${AWS_WEB_IDENTITY_TOKEN_FILE}" != "" ] ;then
apk add --update-cache \
python \
python-dev \
py-pip \
build-base \
&& pip install boto3
cat << EOF_HERE > .get_assumed_credentials.py
#!/usr/bin/python
import os
import boto3
session = boto3.Session()
credentials = session.get_credentials().get_frozen_credentials()
print('export AWS_ACCESS_KEY_ID="{0}"\nexport AWS_SECRET_ACCESS_KEY="{1}"\nexport AWS_SECURITY_TOKEN="{2}"\nexport AWS_SESSION_TOKEN="{2}"'.format(credentials.access_key, credentials.secret_key, credentials.token))
EOF_HERE
chmod +x .get_assumed_credentials.py
eval `./.get_assumed_credentials.py`
rm .get_assumed_credentials.py
unset AWS_ROLE_ARN
unset AWS_WEB_IDENTITY_TOKEN_FILE
fi
if [ "$GIT_PASSWORD" != "" ];then
echo setting git password
ASKPASS=`mktemp`
cat << EOF > $ASKPASS
#!/bin/sh
exec echo "$GIT_PASSWORD"
EOF
chmod +x $ASKPASS
export GIT_ASKPASS=$ASKPASS
fi
# Troubleshooting lines
# env
# ls -lah ~/.ssh
#
# Assume the default is to use git to pull tf files and
# Assume the tfvars lives at "tfvars" in root of untar-ed dir
export TMP=`mktemp`
export CLEAN=`mktemp`
REPO_COUNT=`find /tfops -type f -not -path /tfops -name repo.tar|wc -l`
if [ "$STACK_REPO" != "" ];then
set -x
MAIN_MODULE_TMP=`mktemp -d`
git clone $STACK_REPO $MAIN_MODULE_TMP/stack || exit $?
cd $MAIN_MODULE_TMP/stack
git checkout $STACK_REPO_HASH
if [ "$STACK_REPO_SUBDIR" != "" ];then
pwd
ls -lah
cp -r $STACK_REPO_SUBDIR /$TFOPS_MAIN_MODULE
else
mv $MAIN_MODULE_TMP/stack /$TFOPS_MAIN_MODULE
fi
elif [ "$REPO_COUNT" -gt 0 ];then
find /tfops -type f -not -path /tfops -name repo.tar -exec tar -xf {} -C / \;
else
echo "No terraform stack to run"
exit 1
fi
if [ "$TFOPS_CONFIGMAP_PATH" != "" ];then
cp $TFOPS_CONFIGMAP_PATH/* /$TFOPS_MAIN_MODULE
fi
cd /$TFOPS_MAIN_MODULE
# Load a custom backend
if stat backend_override.tf >/dev/null 2>/dev/null; then
echo "Using custom backend"
else
echo "Loading hashicorp backend"
set -x
envsubst < /backend.tf > /backend_override.tf
mv /backend_override.tf .
fi
# Run the prerun script
if stat prerun.sh >/dev/null 2>/dev/null; then
# prerun.sh needs exec privileges
chmod +x prerun.sh
./prerun.sh
fi
WAIT_TIME=${WAIT_TIME:-60}
ATTEMPTS=${ATTEMPTS:-10}
i=0
until run_terraform destroy=$DESTROY || (( i++ >= $ATTEMPTS ));do
echo "($i/$ATTEMPTS) Terraform did not exit 0, waiting $WAIT_TIME"
sleep $WAIT_TIME
done
# Clean the output from coloration
cat $TMP | sed -r "s/\x1B\[([0-9]{1,2}(;[0-9]{1,2})?)?[mGK]//g" > $CLEAN
# Status Helpers:
awk '/^Error:/{y=1}y' $CLEAN > ERROR
read -d '' -r -a arr <<< `grep "^Plan:" $CLEAN|tr -dc '0-9,'|tr ',' ' '` #`
echo -n ${arr[0]} > PLAN
echo -n ${arr[1]} > CHANGE
echo -n ${arr[2]} > DESTROY
kubectl delete cm ${INSTANCE_NAME}-status > /dev/null 2>&1 || true
kubectl create cm ${INSTANCE_NAME}-status \
--from-file ERROR \
--from-file PLAN \
--from-file CHANGE \
--from-file DESTROY
save_output
save_plan
# Run the postrun script
if stat postrun.sh >/dev/null 2>/dev/null; then
# postrun.sh needs exec privileges
chmod +x postrun.sh
./postrun.sh
fi
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。