diff options
author | Dylan Griffith <dyl.griffith@gmail.com> | 2018-07-24 12:02:35 +0100 |
---|---|---|
committer | Dylan Griffith <dyl.griffith@gmail.com> | 2018-07-30 13:08:30 +0000 |
commit | 11edbcccef37f08b089386c41d3914df7f48a677 (patch) | |
tree | 3017e5e2904d11023075c5e84ddba5320e2b623f /app/models/clusters/applications/helm.rb | |
parent | ce897f11a0650b0d6938cb506a030ef00160ab7a (diff) | |
download | gitlab-ce-11edbcccef37f08b089386c41d3914df7f48a677.tar.gz |
Get mutual SSL working with helm tiller
Diffstat (limited to 'app/models/clusters/applications/helm.rb')
-rw-r--r-- | app/models/clusters/applications/helm.rb | 38 |
1 files changed, 37 insertions, 1 deletions
diff --git a/app/models/clusters/applications/helm.rb b/app/models/clusters/applications/helm.rb index 06d85a69b29..f08224e94c2 100644 --- a/app/models/clusters/applications/helm.rb +++ b/app/models/clusters/applications/helm.rb @@ -1,13 +1,40 @@ +require 'openssl' + module Clusters module Applications class Helm < ActiveRecord::Base self.table_name = 'clusters_applications_helm' + attr_encrypted :ca_key, + mode: :per_attribute_iv, + key: Settings.attr_encrypted_db_key_base_truncated, + algorithm: 'aes-256-cbc' + include ::Clusters::Concerns::ApplicationCore include ::Clusters::Concerns::ApplicationStatus default_value_for :version, Gitlab::Kubernetes::Helm::HELM_VERSION + before_create :create_keys_and_certs + + def create_keys_and_certs + ca_cert = Gitlab::Kubernetes::Helm::Certificate.generate_root + self.ca_key = ca_cert.key_string + self.ca_cert = ca_cert.cert_string + end + + def ca_cert_obj + return unless has_ssl? + + Gitlab::Kubernetes::Helm::Certificate + .from_strings(ca_key, ca_cert) + end + + def issue_cert + ca_cert_obj + .issue + end + def set_initial_status return unless not_installable? @@ -15,11 +42,20 @@ module Clusters end def install_command + tiller_cert = issue_cert Gitlab::Kubernetes::Helm::InitCommand.new( name: name, - files: {} + files: { + 'ca.pem': ca_cert, + 'cert.pem': tiller_cert.cert_string, + 'key.pem': tiller_cert.key_string + } ) end + + def has_ssl? + ca_key.present? && ca_cert.present? + end end end end |