cleanup: remove tls configures about helm v2 (#880)
This commit is contained in:
parent
12a984d70f
commit
ae77967bf2
|
|
@ -195,14 +195,6 @@ helmDefaults:
|
||||||
recreatePods: true
|
recreatePods: true
|
||||||
# forces resource update through delete/recreate if needed (default false)
|
# forces resource update through delete/recreate if needed (default false)
|
||||||
force: false
|
force: false
|
||||||
# enable TLS for request to Tiller (default false)
|
|
||||||
tls: true
|
|
||||||
# path to TLS CA certificate file (default "$HELM_HOME/ca.pem")
|
|
||||||
tlsCACert: "path/to/ca.pem"
|
|
||||||
# path to TLS certificate file (default "$HELM_HOME/cert.pem")
|
|
||||||
tlsCert: "path/to/cert.pem"
|
|
||||||
# path to TLS key file (default "$HELM_HOME/key.pem")
|
|
||||||
tlsKey: "path/to/key.pem"
|
|
||||||
# limit the maximum number of revisions saved per release. Use 0 for no limit. (default 10)
|
# limit the maximum number of revisions saved per release. Use 0 for no limit. (default 10)
|
||||||
historyMax: 10
|
historyMax: 10
|
||||||
# when using helm 3.2+, automatically create release namespaces if they do not exist (default true)
|
# when using helm 3.2+, automatically create release namespaces if they do not exist (default true)
|
||||||
|
|
@ -294,16 +286,7 @@ releases:
|
||||||
atomic: true
|
atomic: true
|
||||||
# when true, cleans up any new resources created during a failed release (default false)
|
# when true, cleans up any new resources created during a failed release (default false)
|
||||||
cleanupOnFail: false
|
cleanupOnFail: false
|
||||||
# enable TLS for request to Tiller (default false)
|
|
||||||
tls: true
|
|
||||||
# path to TLS CA certificate file (default "$HELM_HOME/ca.pem")
|
|
||||||
tlsCACert: "path/to/ca.pem"
|
|
||||||
# path to TLS certificate file (default "$HELM_HOME/cert.pem")
|
|
||||||
tlsCert: "path/to/cert.pem"
|
|
||||||
# path to TLS key file (default "$HELM_HOME/key.pem")
|
|
||||||
tlsKey: "path/to/key.pem"
|
|
||||||
# --kube-context to be passed to helm commands
|
# --kube-context to be passed to helm commands
|
||||||
# CAUTION: this doesn't work as expected for `tilerless: true`.
|
|
||||||
# See https://github.com/roboll/helmfile/issues/642
|
# See https://github.com/roboll/helmfile/issues/642
|
||||||
# (default "", which means the standard kubeconfig, either ~/kubeconfig or the file pointed by $KUBECONFIG environment variable)
|
# (default "", which means the standard kubeconfig, either ~/kubeconfig or the file pointed by $KUBECONFIG environment variable)
|
||||||
kubeContext: kube-context
|
kubeContext: kube-context
|
||||||
|
|
|
||||||
|
|
@ -190,12 +190,8 @@ type HelmSpec struct {
|
||||||
// Cascade '--cascade' to helmv3 delete, available values: background, foreground, or orphan, default: background
|
// Cascade '--cascade' to helmv3 delete, available values: background, foreground, or orphan, default: background
|
||||||
Cascade *string `yaml:"cascade,omitempty"`
|
Cascade *string `yaml:"cascade,omitempty"`
|
||||||
|
|
||||||
TLS bool `yaml:"tls"`
|
DisableValidation *bool `yaml:"disableValidation,omitempty"`
|
||||||
TLSCACert string `yaml:"tlsCACert,omitempty"`
|
DisableOpenAPIValidation *bool `yaml:"disableOpenAPIValidation,omitempty"`
|
||||||
TLSKey string `yaml:"tlsKey,omitempty"`
|
|
||||||
TLSCert string `yaml:"tlsCert,omitempty"`
|
|
||||||
DisableValidation *bool `yaml:"disableValidation,omitempty"`
|
|
||||||
DisableOpenAPIValidation *bool `yaml:"disableOpenAPIValidation,omitempty"`
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// RepositorySpec that defines values for a helm repo
|
// RepositorySpec that defines values for a helm repo
|
||||||
|
|
@ -314,11 +310,6 @@ type ReleaseSpec struct {
|
||||||
|
|
||||||
KubeContext string `yaml:"kubeContext,omitempty"`
|
KubeContext string `yaml:"kubeContext,omitempty"`
|
||||||
|
|
||||||
TLS *bool `yaml:"tls,omitempty"`
|
|
||||||
TLSCACert string `yaml:"tlsCACert,omitempty"`
|
|
||||||
TLSKey string `yaml:"tlsKey,omitempty"`
|
|
||||||
TLSCert string `yaml:"tlsCert,omitempty"`
|
|
||||||
|
|
||||||
// These values are used in templating
|
// These values are used in templating
|
||||||
VerifyTemplate *string `yaml:"verifyTemplate,omitempty"`
|
VerifyTemplate *string `yaml:"verifyTemplate,omitempty"`
|
||||||
WaitTemplate *string `yaml:"waitTemplate,omitempty"`
|
WaitTemplate *string `yaml:"waitTemplate,omitempty"`
|
||||||
|
|
@ -2435,7 +2426,7 @@ func findChartDirectory(topLevelDir string) (string, error) {
|
||||||
return topLevelDir, errors.New("no Chart.yaml found")
|
return topLevelDir, errors.New("no Chart.yaml found")
|
||||||
}
|
}
|
||||||
|
|
||||||
// appendConnectionFlags append all the helm command-line flags related to K8s API and Tiller connection including the kubecontext
|
// appendConnectionFlags append all the helm command-line flags related to K8s API including the kubecontext
|
||||||
func (st *HelmState) appendConnectionFlags(flags []string, release *ReleaseSpec) []string {
|
func (st *HelmState) appendConnectionFlags(flags []string, release *ReleaseSpec) []string {
|
||||||
adds := st.connectionFlags(release)
|
adds := st.connectionFlags(release)
|
||||||
flags = append(flags, adds...)
|
flags = append(flags, adds...)
|
||||||
|
|
@ -2444,28 +2435,6 @@ func (st *HelmState) appendConnectionFlags(flags []string, release *ReleaseSpec)
|
||||||
|
|
||||||
func (st *HelmState) connectionFlags(release *ReleaseSpec) []string {
|
func (st *HelmState) connectionFlags(release *ReleaseSpec) []string {
|
||||||
flags := []string{}
|
flags := []string{}
|
||||||
if release.TLS != nil && *release.TLS || release.TLS == nil && st.HelmDefaults.TLS {
|
|
||||||
flags = append(flags, "--tls")
|
|
||||||
}
|
|
||||||
|
|
||||||
if release.TLSKey != "" {
|
|
||||||
flags = append(flags, "--tls-key", release.TLSKey)
|
|
||||||
} else if st.HelmDefaults.TLSKey != "" {
|
|
||||||
flags = append(flags, "--tls-key", st.HelmDefaults.TLSKey)
|
|
||||||
}
|
|
||||||
|
|
||||||
if release.TLSCert != "" {
|
|
||||||
flags = append(flags, "--tls-cert", release.TLSCert)
|
|
||||||
} else if st.HelmDefaults.TLSCert != "" {
|
|
||||||
flags = append(flags, "--tls-cert", st.HelmDefaults.TLSCert)
|
|
||||||
}
|
|
||||||
|
|
||||||
if release.TLSCACert != "" {
|
|
||||||
flags = append(flags, "--tls-ca-cert", release.TLSCACert)
|
|
||||||
} else if st.HelmDefaults.TLSCACert != "" {
|
|
||||||
flags = append(flags, "--tls-ca-cert", st.HelmDefaults.TLSCACert)
|
|
||||||
}
|
|
||||||
|
|
||||||
if release.KubeContext != "" {
|
if release.KubeContext != "" {
|
||||||
flags = append(flags, "--kube-context", release.KubeContext)
|
flags = append(flags, "--kube-context", release.KubeContext)
|
||||||
} else if st.Environments[st.Env.Name].KubeContext != "" {
|
} else if st.Environments[st.Env.Name].KubeContext != "" {
|
||||||
|
|
|
||||||
|
|
@ -38,39 +38,39 @@ func TestGenerateID(t *testing.T) {
|
||||||
run(testcase{
|
run(testcase{
|
||||||
subject: "baseline",
|
subject: "baseline",
|
||||||
release: ReleaseSpec{Name: "foo", Chart: "incubator/raw"},
|
release: ReleaseSpec{Name: "foo", Chart: "incubator/raw"},
|
||||||
want: "foo-values-6cbf8f5f9f",
|
want: "foo-values-fc7df494d",
|
||||||
})
|
})
|
||||||
|
|
||||||
run(testcase{
|
run(testcase{
|
||||||
subject: "different bytes content",
|
subject: "different bytes content",
|
||||||
release: ReleaseSpec{Name: "foo", Chart: "incubator/raw"},
|
release: ReleaseSpec{Name: "foo", Chart: "incubator/raw"},
|
||||||
data: []byte(`{"k":"v"}`),
|
data: []byte(`{"k":"v"}`),
|
||||||
want: "foo-values-6cb9d4f956",
|
want: "foo-values-56b47664f5",
|
||||||
})
|
})
|
||||||
|
|
||||||
run(testcase{
|
run(testcase{
|
||||||
subject: "different map content",
|
subject: "different map content",
|
||||||
release: ReleaseSpec{Name: "foo", Chart: "incubator/raw"},
|
release: ReleaseSpec{Name: "foo", Chart: "incubator/raw"},
|
||||||
data: map[string]interface{}{"k": "v"},
|
data: map[string]interface{}{"k": "v"},
|
||||||
want: "foo-values-5bdffb5f4b",
|
want: "foo-values-558ff84c89",
|
||||||
})
|
})
|
||||||
|
|
||||||
run(testcase{
|
run(testcase{
|
||||||
subject: "different chart",
|
subject: "different chart",
|
||||||
release: ReleaseSpec{Name: "foo", Chart: "stable/envoy"},
|
release: ReleaseSpec{Name: "foo", Chart: "stable/envoy"},
|
||||||
want: "foo-values-6595bd68c6",
|
want: "foo-values-5595f4fc5c",
|
||||||
})
|
})
|
||||||
|
|
||||||
run(testcase{
|
run(testcase{
|
||||||
subject: "different name",
|
subject: "different name",
|
||||||
release: ReleaseSpec{Name: "bar", Chart: "incubator/raw"},
|
release: ReleaseSpec{Name: "bar", Chart: "incubator/raw"},
|
||||||
want: "bar-values-75698946b",
|
want: "bar-values-5bf654bff9",
|
||||||
})
|
})
|
||||||
|
|
||||||
run(testcase{
|
run(testcase{
|
||||||
subject: "specific ns",
|
subject: "specific ns",
|
||||||
release: ReleaseSpec{Name: "foo", Chart: "incubator/raw", Namespace: "myns"},
|
release: ReleaseSpec{Name: "foo", Chart: "incubator/raw", Namespace: "myns"},
|
||||||
want: "myns-foo-values-5bf477bbfb",
|
want: "myns-foo-values-c685d945",
|
||||||
})
|
})
|
||||||
|
|
||||||
for id, n := range ids {
|
for id, n := range ids {
|
||||||
|
|
|
||||||
|
|
@ -10,5 +10,4 @@ environments:
|
||||||
helmDefaults:
|
helmDefaults:
|
||||||
verify: false
|
verify: false
|
||||||
wait: true
|
wait: true
|
||||||
timeout: 1800
|
timeout: 1800
|
||||||
tls: false
|
|
||||||
Loading…
Reference in New Issue