k-tools 0.1.6 → 0.2.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/ktools/tools/deliver.rb +5 -4
- data/lib/ktools/tools/spy.rb +12 -20
- data/lib/ktools/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 647da61a9914126279a25569f3f3104426a6d6decba82940e951aaa0b7203318
|
4
|
+
data.tar.gz: a3f8b76c95cbe55c3e83d762ea0476c68c1d62e04705f2bb404b12eeba09da05
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 06b4101fe62a7342d8e71efcfa6b2a5ac5878c6edba511976ec4d53048f2469fbb9c93db6de3e761d6938026d32ecb73570e59485a95c18b7a1696e9f4e3a212
|
7
|
+
data.tar.gz: a819db787b2e6452319ea53cdff91aa868578d84d42d2cefa509b8e21e9a6532b239bb01d90b76c1ad8483d48b3d69ecad510370ddf57d0b054f838632c1804f
|
data/lib/ktools/tools/deliver.rb
CHANGED
@@ -48,7 +48,7 @@ module KTools
|
|
48
48
|
pod = get_pod
|
49
49
|
container = (@argument ? @argument : "#{@subject}-container")
|
50
50
|
|
51
|
-
pod_cmd = "kubectl exec -ti -n
|
51
|
+
pod_cmd = "kubectl exec -ti -n foxbox #{pod}"
|
52
52
|
bash_cmd = "-c #{container} /bin/bash"
|
53
53
|
|
54
54
|
Sh.ell_meta("#{pod_cmd} #{bash_cmd}")
|
@@ -57,11 +57,12 @@ module KTools
|
|
57
57
|
puts ""
|
58
58
|
|
59
59
|
pod = get_pod
|
60
|
+
container = "#{@subject}-container"
|
60
61
|
|
61
62
|
if @argument == "--tail"
|
62
|
-
Sh.ell_in!("kubectl logs -f #{pod} #{@opt}")
|
63
|
+
Sh.ell_in!("kubectl logs -f #{pod} #{@opt} -n foxbox -c #{container}")
|
63
64
|
else
|
64
|
-
Sh.ell_in!("kubectl logs #{pod} #{@argument}")
|
65
|
+
Sh.ell_in!("kubectl logs #{pod} #{@argument} -n foxbox -c #{container}")
|
65
66
|
end
|
66
67
|
else
|
67
68
|
Help.display
|
@@ -76,7 +77,7 @@ module KTools
|
|
76
77
|
end
|
77
78
|
|
78
79
|
def get_pod
|
79
|
-
pods = Sh.elld!("kubectl get pods | grep #{@subject}")
|
80
|
+
pods = Sh.elld!("kubectl get pods -n foxbox | grep #{@subject}")
|
80
81
|
pods[/(^\S*)/]
|
81
82
|
end
|
82
83
|
end
|
data/lib/ktools/tools/spy.rb
CHANGED
@@ -21,31 +21,23 @@ module KTools
|
|
21
21
|
|
22
22
|
registry_name = "#{@subject}-registry"
|
23
23
|
|
24
|
-
Sh.ell("kubectl delete secret #{registry_name}")
|
24
|
+
Sh.ell("kubectl delete secret #{registry_name} -n foxbox")
|
25
25
|
when 'create registry'
|
26
26
|
puts "Creating Docker Registry for #{@subject}..."
|
27
27
|
puts ""
|
28
28
|
|
29
29
|
registry_name = "#{@subject}-registry"
|
30
30
|
env_path = "#{@cfg["secrets"]}/#{@env}/#{@subject}"
|
31
|
-
|
32
|
-
envd = Oj.load(File.read(env_file))
|
33
|
-
|
34
|
-
kube_cmd = <<~HEREDOC
|
35
|
-
kubectl create secret docker-registry #{registry_name} \
|
36
|
-
--docker-server=#{envd["KSPY_DOCKER_SERVER"]} \
|
37
|
-
--docker-username=#{envd["KSPY_DOCKER_USER"]} \
|
38
|
-
--docker-password=#{envd["KSPY_DOCKER_PASSWORD"]}
|
39
|
-
HEREDOC
|
31
|
+
registry_file = "#{env_path}/create_registry.json"
|
40
32
|
|
41
|
-
puts Sh.ellb!(
|
33
|
+
puts Sh.ellb!("kubectl create -f #{registry_file} -n foxbox")
|
42
34
|
when 'drop config'
|
43
35
|
puts "Deleting configMap for #{@subject}..."
|
44
36
|
puts ""
|
45
37
|
|
46
38
|
config_name = "#{@subject}-config-map"
|
47
39
|
|
48
|
-
Sh.ell("kubectl delete configMap #{config_name}")
|
40
|
+
Sh.ell("kubectl delete configMap #{config_name} -n foxbox")
|
49
41
|
when 'apply config'
|
50
42
|
puts "Updating/Creating configMap for #{@subject}..."
|
51
43
|
|
@@ -60,14 +52,14 @@ module KTools
|
|
60
52
|
env_path = "#{@cfg["secrets"]}/#{@env}/#{@subject}"
|
61
53
|
config_map_file = "#{env_path}/config_map.yml"
|
62
54
|
|
63
|
-
Sh.ell("kubectl apply -f #{config_map_file}")
|
55
|
+
Sh.ell("kubectl apply -f #{config_map_file} -n foxbox")
|
64
56
|
when 'drop ingress'
|
65
57
|
puts "Deleting ingress for #{@subject}..."
|
66
58
|
puts ""
|
67
59
|
|
68
60
|
ingress_name = "#{@subject}-ingress"
|
69
61
|
|
70
|
-
Sh.ell("kubectl delete ingress #{ingress_name}")
|
62
|
+
Sh.ell("kubectl delete ingress #{ingress_name} -n foxbox")
|
71
63
|
when 'apply ingress'
|
72
64
|
puts "Updating/Creating ingress for #{@subject}..."
|
73
65
|
|
@@ -82,7 +74,7 @@ module KTools
|
|
82
74
|
env_path = "#{@cfg["secrets"]}/#{@env}/#{@subject}"
|
83
75
|
ingress_file = "#{env_path}/ingress.yml"
|
84
76
|
|
85
|
-
Sh.ell("kubectl apply -f #{ingress_file}")
|
77
|
+
Sh.ell("kubectl apply -f #{ingress_file} -n foxbox")
|
86
78
|
when 'drop all'
|
87
79
|
puts "Deleting ALL Kubernetes resources of #{@subject}..."
|
88
80
|
|
@@ -92,11 +84,11 @@ module KTools
|
|
92
84
|
puts "Starting..."
|
93
85
|
|
94
86
|
drop_cmd = <<~HEREDOC
|
95
|
-
kubectl delete deployment #{@subject}-deployment &&
|
96
|
-
kubectl delete configMap #{@subject}-config-map &&
|
97
|
-
kubectl delete ingress #{@subject}-ingress &&
|
98
|
-
kubectl delete service #{@subject}-service &&
|
99
|
-
kubectl delete secret #{@subject}-registry
|
87
|
+
kubectl delete deployment #{@subject}-deployment -n foxbox &&
|
88
|
+
kubectl delete configMap #{@subject}-config-map -n foxbox &&
|
89
|
+
kubectl delete ingress #{@subject}-ingress -n foxbox &&
|
90
|
+
kubectl delete service #{@subject}-service -n foxbox &&
|
91
|
+
kubectl delete secret #{@subject}-registry -n foxbox
|
100
92
|
HEREDOC
|
101
93
|
|
102
94
|
Sh.ellb!(drop_cmd)
|
data/lib/ktools/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: k-tools
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.2.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Fernando Schuindt
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2019-
|
11
|
+
date: 2019-10-03 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: bundler
|