@axway/axway-central-cli 4.8.0 → 4.9.0-rc.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
Object.defineProperty(exports, "__esModule", {
|
|
4
4
|
value: true
|
|
5
5
|
});
|
|
6
|
-
exports.serviceAccountNameAlreadyExists = exports.selectServiceAccount = exports.selectAWSRegion = exports.secretAlreadyExists = exports.namespaceAlreadyExists = exports.
|
|
6
|
+
exports.serviceAccountNameAlreadyExists = exports.selectServiceAccount = exports.selectAWSRegion = exports.secretAlreadyExists = exports.namespaceAlreadyExists = exports.idpTestables = exports.idpMessages = exports.getCentralEnvironments = exports.envMessages = exports.enterServiceAccountName = exports.enterPublicKeyPath = exports.enterPrivateKeyPath = exports.enterNamespaceName = exports.enterAWSRegion = exports.createNamespace = exports.createGatewayAgentCredsSecret = exports.createAmplifyAgentKeysSecret = exports.clusterMessages = exports.askServiceAccountName = exports.askReferencedEnvironments = exports.askPublicKeyPath = exports.askPublicAndPrivateKeysPath = exports.askPrivateKeyPath = exports.askNamespace = exports.askKeyValuePairLoop = exports.askForSecretName = exports.askForIDPConfiguration = exports.askForIDPAuthConfiguration = exports.askEnvironmentName = exports.askDosaClientId = exports.askClusterName = exports.askBundleType = exports.askArrayLoop = exports.askAgentName = exports.askAWSRegion = exports.agentMessages = exports.addIdentityProvider = void 0;
|
|
7
7
|
var _chalk = _interopRequireDefault(require("chalk"));
|
|
8
8
|
var _snooplogg = _interopRequireDefault(require("snooplogg"));
|
|
9
9
|
var _inquirer = _interopRequireDefault(require("inquirer"));
|
|
@@ -30,8 +30,8 @@ const envMessages = exports.envMessages = {
|
|
|
30
30
|
environmentAlreadyExists: 'Environment already exists. Please enter a new name.',
|
|
31
31
|
selectTeam: 'Select a team'
|
|
32
32
|
};
|
|
33
|
-
const
|
|
34
|
-
|
|
33
|
+
const clusterMessages = exports.clusterMessages = {
|
|
34
|
+
enterClusterName: 'Enter a unique cluster name'
|
|
35
35
|
};
|
|
36
36
|
const agentMessages = exports.agentMessages = {
|
|
37
37
|
enterDiscoveryAgentName: 'Enter a new discovery agent name',
|
|
@@ -317,15 +317,15 @@ const askReferencedEnvironments = async (client, defsManager, envInfo) => {
|
|
|
317
317
|
return selectedRefEnv;
|
|
318
318
|
};
|
|
319
319
|
exports.askReferencedEnvironments = askReferencedEnvironments;
|
|
320
|
-
const
|
|
320
|
+
const askClusterName = async () => {
|
|
321
321
|
const name = await (0, _basicPrompts.askInput)({
|
|
322
|
-
msg:
|
|
322
|
+
msg: clusterMessages.enterClusterName,
|
|
323
323
|
defaultValue: cliNowString,
|
|
324
|
-
validate: (0, _basicPrompts.runValidations)((0, _basicPrompts.validateRegex)(_regex.resourceRegex, (0, _regex.invalidResourceMsg)('
|
|
324
|
+
validate: (0, _basicPrompts.runValidations)((0, _basicPrompts.validateRegex)(_regex.resourceRegex, (0, _regex.invalidResourceMsg)('Cluster')))
|
|
325
325
|
});
|
|
326
326
|
return name;
|
|
327
327
|
};
|
|
328
|
-
exports.
|
|
328
|
+
exports.askClusterName = askClusterName;
|
|
329
329
|
const askAgentName = async (client, defsManager, agentType, scopeName) => {
|
|
330
330
|
var _agents;
|
|
331
331
|
let resourceType;
|
|
@@ -53,10 +53,10 @@ als:
|
|
|
53
53
|
# pullPolicy: IfNotPresent
|
|
54
54
|
# pullSecret:
|
|
55
55
|
|
|
56
|
-
# Header publishing mode. Set to default or verbose.
|
|
56
|
+
# Header publishing mode. Set to ambient, default, or verbose. Ambient is the recommended baseline.
|
|
57
57
|
mode: {{istioAgentValues.alsMode}}
|
|
58
58
|
|
|
59
|
-
# Name of the
|
|
59
|
+
# Name of the cluster
|
|
60
60
|
clusterName: {{istioAgentValues.clusterName}}
|
|
61
61
|
|
|
62
62
|
# Name of the secret containing the public & private keys used by the provided service account client ID
|
|
@@ -95,7 +95,7 @@ da:
|
|
|
95
95
|
# Name of the secret containing the public & private keys used by the provided service account client ID
|
|
96
96
|
keysSecretName: {{istioAgentValues.keysSecretName}}
|
|
97
97
|
|
|
98
|
-
# Name of the
|
|
98
|
+
# Name of the cluster the agent is connected to
|
|
99
99
|
clusterName: {{istioAgentValues.clusterName}}
|
|
100
100
|
|
|
101
101
|
# Resource discovery config
|
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
Object.defineProperty(exports, "__esModule", {
|
|
4
4
|
value: true
|
|
5
5
|
});
|
|
6
|
-
exports.testables = exports.setupKubernetes = exports.setupIstio = exports.istioSystemNs = exports.istioPrompts = exports.installPreprocess = exports.gatewayConnectivity = exports.gatewayCertSecret = exports.defaultLogFiles = exports.createIstioOverride = exports.createIstioGatewayCert = exports.createHybridOverride = exports.
|
|
6
|
+
exports.testables = exports.setupKubernetes = exports.setupIstio = exports.istioSystemNs = exports.istioPrompts = exports.installPreprocess = exports.gatewayConnectivity = exports.gatewayCertSecret = exports.defaultLogFiles = exports.createIstioOverride = exports.createIstioGatewayCert = exports.createHybridOverride = exports.completeInstall = exports.askIstioSecret = exports.askConfigType = exports.askBundleType = exports.amplifyAgentsNs = exports.amplifyAgentsCredsSecret = exports.ampcDemoNs = exports.IstioInstallMethods = exports.ConfigFiles = exports.AlsMode = void 0;
|
|
7
7
|
var _chalk = _interopRequireDefault(require("chalk"));
|
|
8
8
|
var _snooplogg = _interopRequireDefault(require("snooplogg"));
|
|
9
9
|
var _bashCommands = require("../../common/bashCommands");
|
|
@@ -30,6 +30,7 @@ const amplifyAgentsCredsSecret = exports.amplifyAgentsCredsSecret = 'amplify-age
|
|
|
30
30
|
let AlsMode = exports.AlsMode = /*#__PURE__*/function (AlsMode) {
|
|
31
31
|
AlsMode["Verbose"] = "verbose";
|
|
32
32
|
AlsMode["Default"] = "default";
|
|
33
|
+
AlsMode["Ambient"] = "ambient";
|
|
33
34
|
return AlsMode;
|
|
34
35
|
}({}); // ConfigFiles - all the config file that are used in the setup
|
|
35
36
|
const ConfigFiles = exports.ConfigFiles = {
|
|
@@ -189,12 +190,16 @@ const askALSMode = async () => {
|
|
|
189
190
|
return (0, _basicPrompts.askList)({
|
|
190
191
|
msg: istioPrompts.alsMode,
|
|
191
192
|
choices: [{
|
|
193
|
+
name: AlsMode.Ambient.charAt(0).toUpperCase() + AlsMode.Ambient.slice(1),
|
|
194
|
+
value: AlsMode.Ambient
|
|
195
|
+
}, {
|
|
192
196
|
name: AlsMode.Default.charAt(0).toUpperCase() + AlsMode.Default.slice(1),
|
|
193
197
|
value: AlsMode.Default
|
|
194
198
|
}, {
|
|
195
199
|
name: AlsMode.Verbose.charAt(0).toUpperCase() + AlsMode.Verbose.slice(1),
|
|
196
200
|
value: AlsMode.Verbose
|
|
197
|
-
}]
|
|
201
|
+
}],
|
|
202
|
+
default: AlsMode.Ambient
|
|
198
203
|
});
|
|
199
204
|
};
|
|
200
205
|
const askVsNamespacePrompt = async () => {
|
|
@@ -218,7 +223,7 @@ const setupKubernetes = async istioValues => {
|
|
|
218
223
|
let istioAgentValues = istioValues.istioAgentValues;
|
|
219
224
|
console.log(_chalk.default.gray(`\nThere are several steps to prepare a Kubernetes cluster for the Amplify Istio Agents.\nThe following questions collect the namespace and secret to use for the Istio gateway.\n`));
|
|
220
225
|
if (istioAgentValues.alsEnabled) {
|
|
221
|
-
console.log(_chalk.default.gray(`\nThe Istio Traceability Agent
|
|
226
|
+
console.log(_chalk.default.gray(`\nThe Istio Traceability Agent supports three modes: default (minimal required header subset), ambient (baseline headers with optional Telemetry CR emission), and verbose (capture all request/response headers).\n`));
|
|
222
227
|
istioAgentValues.alsMode = await askALSMode();
|
|
223
228
|
}
|
|
224
229
|
if (istioAgentValues.discoveryEnabled) {
|
|
@@ -233,7 +238,7 @@ const setupKubernetes = async istioValues => {
|
|
|
233
238
|
|
|
234
239
|
// set keySecretName
|
|
235
240
|
istioAgentValues.keysSecretName = helpers.amplifyAgentsKeysSecret;
|
|
236
|
-
istioAgentValues.clusterName = await (0, _helpers.
|
|
241
|
+
istioAgentValues.clusterName = await (0, _helpers.askClusterName)();
|
|
237
242
|
return istioAgentValues;
|
|
238
243
|
};
|
|
239
244
|
exports.setupKubernetes = setupKubernetes;
|
|
@@ -273,11 +278,6 @@ const createIstioOverride = overrides => {
|
|
|
273
278
|
}
|
|
274
279
|
};
|
|
275
280
|
exports.createIstioOverride = createIstioOverride;
|
|
276
|
-
const createEnvResources = async (client, defs, clusterName) => {
|
|
277
|
-
// Create the mesh K8SCluster resource
|
|
278
|
-
await helpers.createByResourceType(client, defs, clusterName, 'K8SCluster', 'k8sc', {}, '');
|
|
279
|
-
};
|
|
280
|
-
exports.createEnvResources = createEnvResources;
|
|
281
281
|
const createHybridOverride = overrides => {
|
|
282
282
|
const overrideFileName = ConfigFiles.HybridOverrideFile;
|
|
283
283
|
(0, _utils.writeTemplates)(overrideFileName, overrides, helpers.istioAgentsTemplate);
|