dapp 0.13.3 → 0.13.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/bin/dapp +0 -13
- data/config/en/common.yml +4 -2
- data/config/en/net_status.yml +15 -3
- data/lib/dapp.rb +11 -6
- data/lib/dapp/cli.rb +1 -1
- data/lib/dapp/cli/command/base.rb +4 -4
- data/lib/dapp/config/directive/base.rb +4 -2
- data/lib/dapp/core_ext/hash.rb +14 -0
- data/lib/dapp/dapp.rb +32 -6
- data/lib/dapp/dapp/dapp_config.rb +85 -0
- data/lib/dapp/dapp/dappfile.rb +4 -0
- data/lib/dapp/dapp/deps/base.rb +2 -2
- data/lib/dapp/dapp/deps/gitartifact.rb +2 -2
- data/lib/dapp/dapp/logging/base.rb +5 -5
- data/lib/dapp/dapp/logging/process.rb +5 -7
- data/lib/dapp/dapp/shellout/base.rb +16 -17
- data/lib/dapp/deployment/cli/command/deployment.rb +2 -3
- data/lib/dapp/deployment/dapp/command/apply.rb +6 -6
- data/lib/dapp/deployment/dapp/dapp.rb +0 -1
- data/lib/dapp/deployment/kube_app.rb +1 -1
- data/lib/dapp/deployment/kube_base.rb +1 -1
- data/lib/dapp/dimg/build/stage/artifact_base.rb +3 -8
- data/lib/dapp/dimg/build/stage/base.rb +57 -38
- data/lib/dapp/dimg/build/stage/docker_instructions.rb +1 -1
- data/lib/dapp/dimg/build/stage/from.rb +6 -2
- data/lib/dapp/dimg/build/stage/ga_archive_dependencies.rb +2 -2
- data/lib/dapp/dimg/build/stage/ga_artifact_patch.rb +1 -5
- data/lib/dapp/dimg/build/stage/ga_base.rb +1 -14
- data/lib/dapp/dimg/build/stage/ga_latest_patch.rb +7 -31
- data/lib/dapp/dimg/build/stage/ga_related_dependencies_base.rb +21 -0
- data/lib/dapp/dimg/build/stage/import_artifact.rb +10 -3
- data/lib/dapp/dimg/build/stage/install/ga_post_install_patch_dependencies.rb +3 -3
- data/lib/dapp/dimg/build/stage/install/ga_pre_install_patch_dependencies.rb +3 -3
- data/lib/dapp/dimg/build/stage/mod/group.rb +19 -7
- data/lib/dapp/dimg/build/stage/mod/logging.rb +7 -20
- data/lib/dapp/dimg/build/stage/setup/ga_post_setup_patch_dependencies.rb +1 -1
- data/lib/dapp/dimg/build/stage/setup/ga_pre_setup_patch_dependencies.rb +3 -3
- data/lib/dapp/dimg/builder/chef.rb +2 -2
- data/lib/dapp/dimg/builder/chef/cookbook.rb +2 -2
- data/lib/dapp/dimg/cli/command/dimg.rb +1 -1
- data/lib/dapp/dimg/cli/command/dimg/build.rb +15 -8
- data/lib/dapp/dimg/config/directive/artifact_base.rb +13 -4
- data/lib/dapp/dimg/config/directive/dimg/instance_methods.rb +1 -1
- data/lib/dapp/dimg/config/directive/dimg/validation.rb +6 -1
- data/lib/dapp/dimg/config/directive/docker/base.rb +1 -2
- data/lib/dapp/dimg/config/directive/git_artifact_local.rb +3 -0
- data/lib/dapp/dimg/config/directive/git_artifact_remote.rb +1 -1
- data/lib/dapp/dimg/config/directive/mount.rb +9 -1
- data/lib/dapp/dimg/dapp/command/build_context/export.rb +13 -15
- data/lib/dapp/dimg/dapp/command/build_context/import.rb +3 -3
- data/lib/dapp/dimg/dapp/command/cleanup.rb +1 -1
- data/lib/dapp/dimg/dapp/command/common.rb +17 -6
- data/lib/dapp/dimg/dapp/command/mrproper.rb +9 -4
- data/lib/dapp/dimg/dapp/command/stages/cleanup_local.rb +19 -17
- data/lib/dapp/dimg/dapp/command/stages/cleanup_repo.rb +1 -1
- data/lib/dapp/dimg/dimg.rb +5 -5
- data/lib/dapp/dimg/dimg/git_artifact.rb +11 -6
- data/lib/dapp/dimg/dimg/path.rb +2 -6
- data/lib/dapp/dimg/git_artifact.rb +118 -66
- data/lib/dapp/dimg/git_repo/base.rb +1 -1
- data/lib/dapp/dimg/git_repo/own.rb +1 -1
- data/lib/dapp/dimg/git_repo/remote.rb +23 -14
- data/lib/dapp/dimg/image/docker.rb +11 -11
- data/lib/dapp/dimg/image/scratch.rb +33 -9
- data/lib/dapp/dimg/image/stage.rb +3 -3
- data/lib/dapp/helper/cli.rb +8 -0
- data/lib/dapp/helper/tar.rb +31 -0
- data/lib/dapp/kube/cli/command/kube.rb +5 -4
- data/lib/dapp/kube/cli/command/kube/deploy.rb +5 -0
- data/lib/dapp/kube/cli/command/kube/minikube_setup.rb +13 -0
- data/lib/dapp/kube/cli/command/kube/{secret_file_encrypt.rb → secret_extract.rb} +3 -3
- data/lib/dapp/kube/cli/command/kube/secret_generate.rb +11 -1
- data/lib/dapp/kube/client.rb +1 -1
- data/lib/dapp/kube/client/error.rb +1 -1
- data/lib/dapp/kube/dapp/command/common.rb +29 -4
- data/lib/dapp/kube/dapp/command/deploy.rb +43 -21
- data/lib/dapp/kube/dapp/command/dismiss.rb +1 -1
- data/lib/dapp/{deployment → kube}/dapp/command/minikube_setup.rb +12 -12
- data/lib/dapp/kube/dapp/command/secret_extract.rb +46 -0
- data/lib/dapp/kube/dapp/command/secret_generate.rb +33 -4
- data/lib/dapp/kube/dapp/dapp.rb +3 -2
- data/lib/dapp/kube/error/kubernetes.rb +7 -0
- data/lib/dapp/kube/secret.rb +1 -1
- data/lib/dapp/version.rb +2 -2
- metadata +11 -7
- data/lib/dapp/deployment/cli/command/deployment/minikube_setup.rb +0 -13
- data/lib/dapp/kube/dapp/command/secret_file_encrypt.rb +0 -22
|
@@ -19,8 +19,7 @@ module Dapp
|
|
|
19
19
|
kube_generate_helm_chart_tpl
|
|
20
20
|
|
|
21
21
|
additional_values = [].tap do |options|
|
|
22
|
-
options
|
|
23
|
-
options.concat(self.options[:helm_values_options].map { |opt| "--values #{opt}" })
|
|
22
|
+
options.concat((kube_values_paths + kube_tmp_chart_secret_values_paths).map { |p| "--values #{p}" })
|
|
24
23
|
end
|
|
25
24
|
|
|
26
25
|
set_options = [].tap do |options|
|
|
@@ -43,17 +42,21 @@ module Dapp
|
|
|
43
42
|
|
|
44
43
|
def kube_helm_decode_secrets
|
|
45
44
|
if secret.nil?
|
|
46
|
-
log_warning(desc: {
|
|
45
|
+
log_warning(desc: {
|
|
46
|
+
code: :dapp_secret_key_not_found,
|
|
47
|
+
data: {not_found_in: secret_key_not_found_in.join(', ')}
|
|
48
|
+
}) if !kube_secret_values_paths.empty? || kube_chart_secret_path.directory?
|
|
47
49
|
else
|
|
48
|
-
kube_helm_decode_secret_values
|
|
49
50
|
kube_helm_decode_secret_files
|
|
50
51
|
end
|
|
52
|
+
kube_helm_decode_secret_values
|
|
51
53
|
end
|
|
52
54
|
|
|
53
55
|
def kube_helm_decode_secret_values
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
56
|
+
kube_secret_values_paths.each_with_index do |secret_values_file, index|
|
|
57
|
+
decoded_data = kube_helm_decode_json(YAML::load(secret_values_file.read))
|
|
58
|
+
kube_tmp_chart_secret_values_paths[index].write(decoded_data.to_yaml)
|
|
59
|
+
end
|
|
57
60
|
end
|
|
58
61
|
|
|
59
62
|
def kube_helm_decode_json(json)
|
|
@@ -62,7 +65,7 @@ module Dapp
|
|
|
62
65
|
when Array then value.map { |v| decode_value.call(v) }
|
|
63
66
|
when Hash then kube_helm_decode_json(value)
|
|
64
67
|
else
|
|
65
|
-
secret.extract(value)
|
|
68
|
+
secret.nil? ? '' : secret.extract(value)
|
|
66
69
|
end
|
|
67
70
|
end
|
|
68
71
|
json.each { |k, v| json[k] = decode_value.call(v) }
|
|
@@ -79,20 +82,24 @@ module Dapp
|
|
|
79
82
|
end
|
|
80
83
|
|
|
81
84
|
def kube_generate_helm_chart_tpl
|
|
82
|
-
secret_directory = secret.nil? ? 'secret' : kube_tmp_chart_secret_path.subpath_of(kube_tmp_chart_path)
|
|
83
85
|
cont = <<-EOF
|
|
84
86
|
{{/* vim: set filetype=mustache: */}}
|
|
85
87
|
|
|
86
|
-
{{- define "dimg" -}}
|
|
88
|
+
{{- define "dimg" -}}
|
|
89
|
+
{{- if (ge (len (index .)) 2) -}}
|
|
87
90
|
{{- $name := index . 0 -}}
|
|
88
|
-
{{- $context := index . 1 -}}
|
|
91
|
+
{{- $context := index . 1 -}}
|
|
89
92
|
{{- printf "%s:%s-%s" $context.Values.global.dapp.repo $name $context.Values.global.dapp.image_version -}}
|
|
93
|
+
{{- else -}}
|
|
94
|
+
{{- $context := index . 0 -}}
|
|
95
|
+
{{- printf "%s:%s" $context.Values.global.dapp.repo $context.Values.global.dapp.image_version -}}
|
|
96
|
+
{{- end -}}
|
|
90
97
|
{{- end -}}
|
|
91
98
|
|
|
92
99
|
{{- define "dapp_secret_file" -}}
|
|
93
100
|
{{- $relative_file_path := index . 0 -}}
|
|
94
101
|
{{- $context := index . 1 -}}
|
|
95
|
-
{{- $context.Files.Get (print "#{
|
|
102
|
+
{{- $context.Files.Get (print "#{kube_tmp_chart_secret_path.subpath_of(kube_tmp_chart_path)}/" $relative_file_path) -}}
|
|
96
103
|
{{- end -}}
|
|
97
104
|
EOF
|
|
98
105
|
kube_tmp_chart_path('templates/_dapp_helpers.tpl').write(cont)
|
|
@@ -115,13 +122,13 @@ module Dapp
|
|
|
115
122
|
end
|
|
116
123
|
|
|
117
124
|
args = [kube_release_name, kube_tmp_chart_path, additional_values, set_options, kube_helm_extra_options(dry_run: true)].flatten
|
|
118
|
-
output = shellout!("helm upgrade #{args.join(' ')}"
|
|
125
|
+
output = shellout!("helm upgrade #{args.join(' ')}").stdout
|
|
119
126
|
|
|
120
127
|
manifest_start_index = output.lines.index("MANIFEST:\n") + 1
|
|
121
128
|
hook_start_index = output.lines.index("HOOKS:\n") + 1
|
|
122
129
|
configs = generator.call(output.lines[hook_start_index..manifest_start_index-1].join)
|
|
123
130
|
|
|
124
|
-
(configs['Job'] ||
|
|
131
|
+
(configs['Job'] || {}).reject do |_, c|
|
|
125
132
|
c['metadata'] ||= {}
|
|
126
133
|
c['metadata']['annotations'] ||= {}
|
|
127
134
|
c['metadata']['annotations']['helm.sh/resource-policy'] == 'keep'
|
|
@@ -141,10 +148,10 @@ module Dapp
|
|
|
141
148
|
end
|
|
142
149
|
|
|
143
150
|
def kube_run_deploy(additional_values, set_options)
|
|
144
|
-
log_process("Deploy release #{kube_release_name}
|
|
151
|
+
log_process("Deploy release #{kube_release_name}") do
|
|
145
152
|
args = [kube_release_name, kube_tmp_chart_path, additional_values, set_options, kube_helm_extra_options].flatten
|
|
146
153
|
kubernetes.create_namespace!(kube_namespace) unless kubernetes.namespace?(kube_namespace)
|
|
147
|
-
shellout! "helm upgrade #{args.join(' ')}",
|
|
154
|
+
shellout! "helm upgrade #{args.join(' ')}", verbose: true
|
|
148
155
|
end
|
|
149
156
|
end
|
|
150
157
|
|
|
@@ -164,19 +171,34 @@ module Dapp
|
|
|
164
171
|
end
|
|
165
172
|
end
|
|
166
173
|
|
|
167
|
-
def kube_tmp_chart_secret_values_path
|
|
168
|
-
kube_tmp_chart_path('decoded-secret-values.yaml')
|
|
169
|
-
end
|
|
170
|
-
|
|
171
174
|
def kube_tmp_chart_secret_path(*path)
|
|
172
175
|
kube_tmp_chart_path('decoded-secret', *path).tap { |p| p.parent.mkpath }
|
|
173
176
|
end
|
|
174
177
|
|
|
175
178
|
def kube_tmp_chart_path(*path)
|
|
176
|
-
@kube_tmp_path ||= Dir.mktmpdir('dapp-helm-chart-',
|
|
179
|
+
@kube_tmp_path ||= Dir.mktmpdir('dapp-helm-chart-', tmp_base_dir)
|
|
177
180
|
make_path(@kube_tmp_path, *path).expand_path.tap { |p| p.parent.mkpath }
|
|
178
181
|
end
|
|
179
182
|
|
|
183
|
+
def kube_values_paths
|
|
184
|
+
self.options[:helm_values_options].map { |p| Pathname(p).expand_path }.each do |f|
|
|
185
|
+
raise Error::Command, code: :values_file_not_found, data: { path: f } unless f.file?
|
|
186
|
+
end
|
|
187
|
+
end
|
|
188
|
+
|
|
189
|
+
def kube_tmp_chart_secret_values_paths
|
|
190
|
+
@kube_tmp_chart_secret_values_paths ||= kube_secret_values_paths.map { |f| kube_tmp_chart_path("#{SecureRandom.uuid}-#{f.basename}") }
|
|
191
|
+
end
|
|
192
|
+
|
|
193
|
+
def kube_secret_values_paths
|
|
194
|
+
@kube_chart_secret_values_files ||= [].tap do |files|
|
|
195
|
+
files << kube_chart_secret_values_path if kube_chart_secret_values_path.file?
|
|
196
|
+
files.concat(options[:helm_secret_values_options].map { |p| Pathname(p).expand_path }.each do |f|
|
|
197
|
+
raise Error::Command, code: :secret_values_file_not_found, data: { path: f } unless f.file?
|
|
198
|
+
end)
|
|
199
|
+
end
|
|
200
|
+
end
|
|
201
|
+
|
|
180
202
|
def kube_chart_secret_values_path
|
|
181
203
|
kube_chart_path('secret-values.yaml').expand_path
|
|
182
204
|
end
|
|
@@ -6,7 +6,7 @@ module Dapp
|
|
|
6
6
|
def kube_dismiss
|
|
7
7
|
kube_check_helm!
|
|
8
8
|
kube_check_helm_release!
|
|
9
|
-
log_process("Delete release #{kube_release_name}
|
|
9
|
+
log_process("Delete release #{kube_release_name}") do
|
|
10
10
|
with_log_indent do
|
|
11
11
|
shellout! "helm delete #{kube_release_name} --purge"
|
|
12
12
|
kubernetes.delete_namespace!(kube_namespace) if options[:with_namespace]
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
module Dapp
|
|
2
|
-
module
|
|
2
|
+
module Kube
|
|
3
3
|
module Dapp
|
|
4
4
|
module Command
|
|
5
5
|
module MinikubeSetup
|
|
@@ -9,7 +9,7 @@ module Dapp
|
|
|
9
9
|
end
|
|
10
10
|
end
|
|
11
11
|
|
|
12
|
-
def
|
|
12
|
+
def kube_minikube_setup
|
|
13
13
|
_minikube_restart_minikube
|
|
14
14
|
|
|
15
15
|
# NOTICE: На данный момент выключено из-за непригодной
|
|
@@ -33,17 +33,17 @@ module Dapp
|
|
|
33
33
|
end
|
|
34
34
|
|
|
35
35
|
def _minikube_restart_minikube
|
|
36
|
-
log_process(
|
|
36
|
+
log_process("Restart minikube") do
|
|
37
37
|
raise MinikubeSetupError, code: :minikube_not_found if shellout('which minikube').exitstatus == 1
|
|
38
38
|
|
|
39
39
|
Process.fork do
|
|
40
40
|
_minikube_set_original_sudo_caller_process_user!
|
|
41
41
|
|
|
42
42
|
begin
|
|
43
|
-
if shellout!('minikube status',
|
|
44
|
-
shellout! 'minikube stop',
|
|
43
|
+
if shellout!('minikube status', verbose: true).stdout.split("\n").map(&:strip).first == 'minikubeVM: Running'
|
|
44
|
+
shellout! 'minikube stop', verbose: true
|
|
45
45
|
end
|
|
46
|
-
shellout! 'minikube start --insecure-registry localhost:5000',
|
|
46
|
+
shellout! 'minikube start --insecure-registry localhost:5000', verbose: true
|
|
47
47
|
rescue ::Dapp::Error::Shellout
|
|
48
48
|
exit 1
|
|
49
49
|
end
|
|
@@ -93,7 +93,7 @@ module Dapp
|
|
|
93
93
|
end
|
|
94
94
|
|
|
95
95
|
def _minikube_run_minikube_persisted_storage_daemon
|
|
96
|
-
log_process(
|
|
96
|
+
log_process("Run minikube persisted storage daemon") do
|
|
97
97
|
_minikube_run_daemon(:minikube_persisted_storage) do
|
|
98
98
|
_minikube_set_original_sudo_caller_process_user!
|
|
99
99
|
|
|
@@ -109,11 +109,11 @@ module Dapp
|
|
|
109
109
|
end
|
|
110
110
|
|
|
111
111
|
def _minikube_wait_till_ready
|
|
112
|
-
log_process(
|
|
112
|
+
log_process("Wait till minikube ready") do
|
|
113
113
|
600.times do
|
|
114
114
|
begin
|
|
115
115
|
return if _minikube_kubernetes.service?('kube-dns')
|
|
116
|
-
rescue
|
|
116
|
+
rescue Client::Error::ConnectionRefused
|
|
117
117
|
end
|
|
118
118
|
|
|
119
119
|
sleep 1
|
|
@@ -124,7 +124,7 @@ module Dapp
|
|
|
124
124
|
end
|
|
125
125
|
|
|
126
126
|
def _minikube_run_registry
|
|
127
|
-
log_process(
|
|
127
|
+
log_process("Run registry") do
|
|
128
128
|
_minikube_kubernetes.with_query(gracePeriodSeconds: 0) do
|
|
129
129
|
with_log_indent do
|
|
130
130
|
if _minikube_kubernetes.replicationcontroller? _minikube_registry_replicationcontroller_spec['metadata']['name']
|
|
@@ -224,7 +224,7 @@ module Dapp
|
|
|
224
224
|
end
|
|
225
225
|
|
|
226
226
|
def _minikube_run_registry_forwarder_daemon
|
|
227
|
-
log_process(
|
|
227
|
+
log_process("Run registry forwarder daemon") do
|
|
228
228
|
registry_port_in_use = begin
|
|
229
229
|
Socket.tcp('localhost', 5000).close
|
|
230
230
|
true
|
|
@@ -251,7 +251,7 @@ module Dapp
|
|
|
251
251
|
end
|
|
252
252
|
|
|
253
253
|
def _minikube_kubernetes
|
|
254
|
-
@
|
|
254
|
+
@_minikube_kubernetes ||= Client.new(namespace: 'kube-system')
|
|
255
255
|
end
|
|
256
256
|
|
|
257
257
|
def _minikube_registry_replicationcontroller_spec
|
|
@@ -0,0 +1,46 @@
|
|
|
1
|
+
module Dapp
|
|
2
|
+
module Kube
|
|
3
|
+
module Dapp
|
|
4
|
+
module Command
|
|
5
|
+
module SecretExtract
|
|
6
|
+
def kube_secret_extract(file_path)
|
|
7
|
+
secret_key_should_exist!
|
|
8
|
+
|
|
9
|
+
if file_path.nil?
|
|
10
|
+
kube_extract_secret
|
|
11
|
+
else
|
|
12
|
+
kube_extract_secret_file(file_path)
|
|
13
|
+
end
|
|
14
|
+
end
|
|
15
|
+
|
|
16
|
+
def kube_extract_secret
|
|
17
|
+
data = begin
|
|
18
|
+
if $stdin.tty?
|
|
19
|
+
print 'Enter secret: '
|
|
20
|
+
$stdin.noecho(&:gets).tap { print "\n" }
|
|
21
|
+
else
|
|
22
|
+
$stdin.read
|
|
23
|
+
end
|
|
24
|
+
end
|
|
25
|
+
|
|
26
|
+
unless (data = data.to_s.chomp).empty?
|
|
27
|
+
puts secret.extract(data)
|
|
28
|
+
end
|
|
29
|
+
end
|
|
30
|
+
|
|
31
|
+
def kube_extract_secret_file(file_path)
|
|
32
|
+
raise Error::Command, code: :file_not_exist, data: { path: File.expand_path(file_path) } unless File.exist?(file_path)
|
|
33
|
+
|
|
34
|
+
decrypted_data = secret.extract(IO.binread(file_path).chomp("\n"))
|
|
35
|
+
if (output_file_path = options[:output_file_path]).nil?
|
|
36
|
+
puts decrypted_data
|
|
37
|
+
else
|
|
38
|
+
FileUtils.mkpath File.dirname(output_file_path)
|
|
39
|
+
IO.binwrite(output_file_path, "#{decrypted_data}\n")
|
|
40
|
+
end
|
|
41
|
+
end
|
|
42
|
+
end
|
|
43
|
+
end
|
|
44
|
+
end
|
|
45
|
+
end
|
|
46
|
+
end
|
|
@@ -3,13 +3,42 @@ module Dapp
|
|
|
3
3
|
module Dapp
|
|
4
4
|
module Command
|
|
5
5
|
module SecretGenerate
|
|
6
|
-
def kube_secret_generate
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
6
|
+
def kube_secret_generate(file_path)
|
|
7
|
+
secret_key_should_exist!
|
|
8
|
+
|
|
9
|
+
if file_path.nil?
|
|
10
|
+
kube_secret
|
|
11
|
+
else
|
|
12
|
+
kube_secret_file(file_path)
|
|
13
|
+
end
|
|
14
|
+
end
|
|
15
|
+
|
|
16
|
+
def kube_secret
|
|
17
|
+
data = begin
|
|
18
|
+
if $stdin.tty?
|
|
19
|
+
print 'Enter secret: '
|
|
20
|
+
$stdin.noecho(&:gets).tap { print "\n" }
|
|
21
|
+
else
|
|
22
|
+
$stdin.read
|
|
23
|
+
end
|
|
24
|
+
end
|
|
25
|
+
|
|
26
|
+
unless (data = data.to_s.chomp).empty?
|
|
10
27
|
puts secret.generate(data)
|
|
11
28
|
end
|
|
12
29
|
end
|
|
30
|
+
|
|
31
|
+
def kube_secret_file(file_path)
|
|
32
|
+
raise Error::Command, code: :file_not_exist, data: { path: File.expand_path(file_path) } unless File.exist?(file_path)
|
|
33
|
+
|
|
34
|
+
encrypted_data = secret.generate(IO.binread(file_path))
|
|
35
|
+
if (output_file_path = options[:output_file_path]).nil?
|
|
36
|
+
puts encrypted_data
|
|
37
|
+
else
|
|
38
|
+
FileUtils.mkpath File.dirname(output_file_path)
|
|
39
|
+
IO.binwrite(output_file_path, "#{encrypted_data}\n")
|
|
40
|
+
end
|
|
41
|
+
end
|
|
13
42
|
end
|
|
14
43
|
end
|
|
15
44
|
end
|
data/lib/dapp/kube/dapp/dapp.rb
CHANGED
|
@@ -4,9 +4,10 @@ module Dapp
|
|
|
4
4
|
module Dapp
|
|
5
5
|
include Command::Deploy
|
|
6
6
|
include Command::Dismiss
|
|
7
|
-
include Command::SecretGenerate
|
|
8
7
|
include Command::SecretKeyGenerate
|
|
9
|
-
include Command::
|
|
8
|
+
include Command::SecretGenerate
|
|
9
|
+
include Command::SecretExtract
|
|
10
|
+
include Command::MinikubeSetup
|
|
10
11
|
include Command::Common
|
|
11
12
|
end
|
|
12
13
|
end
|
data/lib/dapp/kube/secret.rb
CHANGED
data/lib/dapp/version.rb
CHANGED
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: dapp
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.13.
|
|
4
|
+
version: 0.13.4
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Dmitry Stolyarov
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2017-06-
|
|
11
|
+
date: 2017-06-28 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: mixlib-shellout
|
|
@@ -411,6 +411,7 @@ files:
|
|
|
411
411
|
- lib/dapp/core_ext/pathname.rb
|
|
412
412
|
- lib/dapp/dapp.rb
|
|
413
413
|
- lib/dapp/dapp/chef.rb
|
|
414
|
+
- lib/dapp/dapp/dapp_config.rb
|
|
414
415
|
- lib/dapp/dapp/dappfile.rb
|
|
415
416
|
- lib/dapp/dapp/deps/base.rb
|
|
416
417
|
- lib/dapp/dapp/deps/gitartifact.rb
|
|
@@ -429,7 +430,6 @@ files:
|
|
|
429
430
|
- lib/dapp/deployment/cli/command/base.rb
|
|
430
431
|
- lib/dapp/deployment/cli/command/deployment.rb
|
|
431
432
|
- lib/dapp/deployment/cli/command/deployment/apply.rb
|
|
432
|
-
- lib/dapp/deployment/cli/command/deployment/minikube_setup.rb
|
|
433
433
|
- lib/dapp/deployment/cli/command/deployment/mrproper.rb
|
|
434
434
|
- lib/dapp/deployment/config/config.rb
|
|
435
435
|
- lib/dapp/deployment/config/directive/app.rb
|
|
@@ -446,7 +446,6 @@ files:
|
|
|
446
446
|
- lib/dapp/deployment/core_ext/hash.rb
|
|
447
447
|
- lib/dapp/deployment/dapp/command/apply.rb
|
|
448
448
|
- lib/dapp/deployment/dapp/command/common.rb
|
|
449
|
-
- lib/dapp/deployment/dapp/command/minikube_setup.rb
|
|
450
449
|
- lib/dapp/deployment/dapp/command/mrproper.rb
|
|
451
450
|
- lib/dapp/deployment/dapp/dapp.rb
|
|
452
451
|
- lib/dapp/deployment/dapp/dappfile.rb
|
|
@@ -486,6 +485,7 @@ files:
|
|
|
486
485
|
- lib/dapp/dimg/build/stage/ga_base.rb
|
|
487
486
|
- lib/dapp/dimg/build/stage/ga_dependencies_base.rb
|
|
488
487
|
- lib/dapp/dimg/build/stage/ga_latest_patch.rb
|
|
488
|
+
- lib/dapp/dimg/build/stage/ga_related_dependencies_base.rb
|
|
489
489
|
- lib/dapp/dimg/build/stage/import_artifact.rb
|
|
490
490
|
- lib/dapp/dimg/build/stage/install/ga_post_install_patch.rb
|
|
491
491
|
- lib/dapp/dimg/build/stage/install/ga_post_install_patch_dependencies.rb
|
|
@@ -615,6 +615,7 @@ files:
|
|
|
615
615
|
- lib/dapp/helper/cli.rb
|
|
616
616
|
- lib/dapp/helper/net_status.rb
|
|
617
617
|
- lib/dapp/helper/sha256.rb
|
|
618
|
+
- lib/dapp/helper/tar.rb
|
|
618
619
|
- lib/dapp/helper/trivia.rb
|
|
619
620
|
- lib/dapp/kube.rb
|
|
620
621
|
- lib/dapp/kube/cli/cli.rb
|
|
@@ -622,7 +623,8 @@ files:
|
|
|
622
623
|
- lib/dapp/kube/cli/command/kube.rb
|
|
623
624
|
- lib/dapp/kube/cli/command/kube/deploy.rb
|
|
624
625
|
- lib/dapp/kube/cli/command/kube/dismiss.rb
|
|
625
|
-
- lib/dapp/kube/cli/command/kube/
|
|
626
|
+
- lib/dapp/kube/cli/command/kube/minikube_setup.rb
|
|
627
|
+
- lib/dapp/kube/cli/command/kube/secret_extract.rb
|
|
626
628
|
- lib/dapp/kube/cli/command/kube/secret_generate.rb
|
|
627
629
|
- lib/dapp/kube/cli/command/kube/secret_key_generate.rb
|
|
628
630
|
- lib/dapp/kube/client.rb
|
|
@@ -630,12 +632,14 @@ files:
|
|
|
630
632
|
- lib/dapp/kube/dapp/command/common.rb
|
|
631
633
|
- lib/dapp/kube/dapp/command/deploy.rb
|
|
632
634
|
- lib/dapp/kube/dapp/command/dismiss.rb
|
|
633
|
-
- lib/dapp/kube/dapp/command/
|
|
635
|
+
- lib/dapp/kube/dapp/command/minikube_setup.rb
|
|
636
|
+
- lib/dapp/kube/dapp/command/secret_extract.rb
|
|
634
637
|
- lib/dapp/kube/dapp/command/secret_generate.rb
|
|
635
638
|
- lib/dapp/kube/dapp/command/secret_key_generate.rb
|
|
636
639
|
- lib/dapp/kube/dapp/dapp.rb
|
|
637
640
|
- lib/dapp/kube/error/base.rb
|
|
638
641
|
- lib/dapp/kube/error/command.rb
|
|
642
|
+
- lib/dapp/kube/error/kubernetes.rb
|
|
639
643
|
- lib/dapp/kube/secret.rb
|
|
640
644
|
- lib/dapp/prctl.rb
|
|
641
645
|
- lib/dapp/version.rb
|
|
@@ -659,7 +663,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
|
659
663
|
version: 2.5.0
|
|
660
664
|
requirements: []
|
|
661
665
|
rubyforge_project:
|
|
662
|
-
rubygems_version: 2.
|
|
666
|
+
rubygems_version: 2.6.12
|
|
663
667
|
signing_key:
|
|
664
668
|
specification_version: 4
|
|
665
669
|
summary: Build docker packaged apps using chef or shell
|