author
int64
658
755k
date
stringlengths
19
19
timezone
int64
-46,800
43.2k
hash
stringlengths
40
40
message
stringlengths
5
490
mods
list
language
stringclasses
20 values
license
stringclasses
3 values
repo
stringlengths
5
68
original_message
stringlengths
12
491
596,240
19.10.2017 17:36:49
-7,200
ddf978df9cfe1c6c239390a53f8c6984fd8c1e24
fixes loading behaviour of default starting config
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/credenitals.go", "new_path": "pkg/cmd/kubernikusctl/credenitals.go", "diff": "@@ -133,9 +133,16 @@ func (o *CredentialsOptions) Run(c *cobra.Command) error {\nif o.kubeconfigPath != \"\" {\nif err := o.loadKubeconfig(); err != nil {\nglog.V(3).Infof(\"%v\", err)\n- return errors.Errorf(\"Loading of the specified kubeconfig failed\")\n+ return errors.Errorf(\"Loading the specified kubeconfig failed\")\n}\nglog.V(2).Infof(\"Loaded kubeconfig from %v\", o.kubeconfigPath)\n+ } else {\n+ o.kubeconfig, err = clientcmd.NewDefaultPathOptions().GetStartingConfig()\n+ if err != nil {\n+ glog.V(3).Infof(\"%v\", err)\n+ return errors.Errorf(\"Loading the default kubeconfig failed\")\n+ }\n+ glog.V(2).Infof(\"Loaded kubeconfig from %v\", clientcmd.NewDefaultPathOptions().GetDefaultFilename())\n}\nif o.context == \"\" && o.kubeconfig.CurrentContext != \"\" {\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes loading behaviour of default starting config
596,240
19.10.2017 17:54:09
-7,200
c1debdf65ad324cdaf565b74df3cc214d022397a
fixes loading another behaviour of default starting config
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/credenitals.go", "new_path": "pkg/cmd/kubernikusctl/credenitals.go", "diff": "@@ -126,10 +126,6 @@ func (o *CredentialsOptions) Run(c *cobra.Command) error {\n// fetch credentials\n// update kubeconfigs\n- if o.kubeconfigPath == \"\" {\n- o.kubeconfigPath = clientcmd.NewDefaultPathOptions().GetDefaultFilename()\n- }\n-\nif o.kubeconfigPath != \"\" {\nif err := o.loadKubeconfig(); err != nil {\nglog.V(3).Infof(\"%v\", err)\n@@ -137,12 +133,13 @@ func (o *CredentialsOptions) Run(c *cobra.Command) error {\n}\nglog.V(2).Infof(\"Loaded kubeconfig from %v\", o.kubeconfigPath)\n} else {\n+ o.kubeconfigPath = clientcmd.NewDefaultPathOptions().GetDefaultFilename()\no.kubeconfig, err = clientcmd.NewDefaultPathOptions().GetStartingConfig()\nif err != nil {\nglog.V(3).Infof(\"%v\", err)\nreturn errors.Errorf(\"Loading the default kubeconfig failed\")\n}\n- glog.V(2).Infof(\"Loaded kubeconfig from %v\", clientcmd.NewDefaultPathOptions().GetDefaultFilename())\n+ glog.V(2).Infof(\"Using kubeconfig at %v\", o.kubeconfigPath)\n}\nif o.context == \"\" && o.kubeconfig.CurrentContext != \"\" {\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes loading another behaviour of default starting config
596,240
20.10.2017 18:16:28
-7,200
238ac105576d36167a1281168fae7ca12a928f9b
prompts for password if missing
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/auth/init.go", "new_path": "pkg/cmd/kubernikusctl/auth/init.go", "diff": "@@ -6,6 +6,7 @@ import (\n\"os\"\n\"github.com/golang/glog\"\n+ \"github.com/howeyc/gopass\"\n\"github.com/imdario/mergo\"\n\"github.com/pkg/errors\"\n\"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/common\"\n@@ -84,6 +85,15 @@ func (o *InitOptions) Complete(args []string) (err error) {\n}\n}\n+ if o.openstack.Password == \"\" {\n+ fmt.Printf(\"Password: \")\n+ if password, err := gopass.GetPasswdMasked(); err != nil {\n+ return err\n+ } else {\n+ o.openstack.Password = string(password)\n+ }\n+ }\n+\nreturn nil\n}\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/common/openstack.go", "new_path": "pkg/cmd/kubernikusctl/common/openstack.go", "diff": "@@ -74,10 +74,6 @@ func (o *OpenstackClient) Validate(c *cobra.Command, args []string) error {\n}\n}\n- if o.Password == \"\" {\n- return errors.Errorf(\"You need to provide --password or OS_PASSWORD\")\n- }\n-\nif o.Scope.ProjectName == \"\" {\nif o.Scope.ProjectID == \"\" {\nreturn errors.Errorf(\"You need to provide --project-name/--project-id or OS_PROJECT_NAME/OS_PROJECT_ID\")\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
prompts for password if missing
596,240
20.10.2017 22:05:34
-7,200
963079f05a35c31ee4b54dcf06b10a24ae3b4c8b
renames credentials command
[ { "change_type": "MODIFY", "old_path": "ci/task_helm_kubernikus-system.yaml", "new_path": "ci/task_helm_kubernikus-system.yaml", "diff": "@@ -17,7 +17,7 @@ run:\n- -c\n- |\nset -exo pipefail\n- kubernikusctl credentials\n+ kubernikusctl auth init\nhelm dep up --skip-refresh charts.git/charts/kubernikus-system/\nhelm upgrade kubernikus-system charts.git/charts/kubernikus-system/ --namespace=kubernikus-system --values secrets.git/$KUBERNIKUS_NAME/values/kubernikus-system.yaml --install\n" }, { "change_type": "MODIFY", "old_path": "ci/task_helm_kubernikus.yaml", "new_path": "ci/task_helm_kubernikus.yaml", "diff": "@@ -19,7 +19,7 @@ run:\n- |\nset -exo pipefail\nVERSION=$(cat version/version)\n- kubernikusctl credentials\n+ kubernikusctl auth init\nhelm dep up --skip-refresh kubernikus.git/charts/kubernikus/\nhelm upgrade kubernikus kubernikus.git/charts/kubernikus/ --namespace=kubernikus-system --values secrets.git/$KUBERNIKUS_NAME/values/kubernikus.yaml --set imageTag=$VERSION --install\nkubectl rollout status deployment/kubernikus-api --namespace=kubernikus-system\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
renames credentials command
596,240
20.10.2017 22:06:00
-7,200
23b23f49c8a0efa888f14a1155a8338584b633f4
burns kubernikus entrypoint into ca certificates
[ { "change_type": "MODIFY", "old_path": "pkg/util/certificates.go", "new_path": "pkg/util/certificates.go", "diff": "@@ -277,7 +277,7 @@ func createEnrichedCA(kluster *v1.Kluster, kubernikusAPIURL, authURL, common_nam\nCommonName: common_name,\nOrganizationalUnit: []string{CA_ISSUER_KUBERNIKUS_IDENTIFIER_0, CA_ISSUER_KUBERNIKUS_IDENTIFIER_1, kluster.Name},\nProvince: []string{authURL, kluster.Spec.Openstack.ProjectID},\n- Locality: []string{kluster.Status.Apiserver},\n+ Locality: []string{kubernikusAPIURL},\n},\nNotBefore: now.UTC(),\nNotAfter: now.Add(caValidity).UTC(),\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
burns kubernikus entrypoint into ca certificates
596,240
20.10.2017 22:32:08
-7,200
edd1b85b3a0a39796d8743ce3eb451fd3217c0b6
fixes certificate expiration check
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/auth/refresh.go", "new_path": "pkg/cmd/kubernikusctl/auth/refresh.go", "diff": "@@ -6,6 +6,7 @@ import (\n\"fmt\"\n\"net/url\"\n\"strings\"\n+ \"time\"\n\"github.com/golang/glog\"\n\"github.com/howeyc/gopass\"\n@@ -93,15 +94,6 @@ func (o *RefreshOptions) Complete(args []string) (err error) {\n}\n}\n- if ok, err := o.isCertificateValid(); err != nil {\n- return errors.Wrap(err, \"Verification of certifcates failed.\")\n- } else {\n- if ok {\n- glog.V(2).Infof(\"Certificates are good. Doing nothing.\")\n- return nil\n- }\n- }\n-\nif identityEndpoint, err := o.autoDetectAuthURL(); err != nil {\nerrors.Wrap(err, \"Auto-Detection of auth-url caused an error\")\n} else {\n@@ -150,15 +142,20 @@ func (o *RefreshOptions) Complete(args []string) (err error) {\n}\n}\n- if err := o.openstack.Setup(); err != nil {\n- return err\n+ return nil\n}\n+func (o *RefreshOptions) Run(c *cobra.Command) error {\n+ if ok, err := o.isCertificateValid(); err != nil {\n+ return errors.Wrap(err, \"Verification of certifcates failed.\")\n+ } else {\n+ if ok {\n+ glog.V(2).Infof(\"Certificates are good. Doing nothing.\")\nreturn nil\n}\n+ }\n-func (o *RefreshOptions) Run(c *cobra.Command) error {\n- if err := o.setup(); err != nil {\n+ if err := o.setupClients(); err != nil {\nreturn err\n}\n@@ -178,7 +175,11 @@ func (o *RefreshOptions) Run(c *cobra.Command) error {\nreturn nil\n}\n-func (o *RefreshOptions) setup() error {\n+func (o *RefreshOptions) setupClients() error {\n+ if err := o.openstack.Setup(); err != nil {\n+ return err\n+ }\n+\nglog.V(2).Infof(o.openstack.PrintDebugAuthInfo())\nfmt.Println(o.openstack.PrintAuthInfo())\n@@ -344,25 +345,12 @@ func (o *RefreshOptions) getClientCertificate() (*x509.Certificate, error) {\n}\nfunc (o *RefreshOptions) isCertificateValid() (bool, error) {\n- caData, err := o.getRawCACertificate()\n- if err != nil {\n- return false, err\n- }\n-\ncert, err := o.getClientCertificate()\nif err != nil {\nreturn false, err\n}\n- caCertPool := x509.NewCertPool()\n- caCertPool.AppendCertsFromPEM(caData)\n-\n- opts := x509.VerifyOptions{\n- Roots: caCertPool,\n- KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},\n- }\n-\n- if _, err := cert.Verify(opts); err != nil {\n+ if time.Now().After(cert.NotAfter) || time.Now().Before(cert.NotBefore) {\nreturn false, nil\n}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes certificate expiration check
596,240
20.10.2017 22:53:38
-7,200
49b2431fc583bc648f0dcc2bac18b4b57a45fb5b
smartens kubernikus context detection
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/auth/refresh.go", "new_path": "pkg/cmd/kubernikusctl/auth/refresh.go", "diff": "@@ -87,10 +87,12 @@ func (o *RefreshOptions) Complete(args []string) (err error) {\nglog.V(2).Infof(\"Using context %v\", o.context)\nif isKubernikusContext, err := o.isKubernikusContext(); err != nil {\n- return errors.Wrap(err, \"Detection of Kubernikus issued certificates failed\")\n+ glog.V(2).Infof(\"Not a valid Kubernikus context: %v\", err)\n+ return nil\n} else {\nif !isKubernikusContext {\n- return errors.Errorf(\"Context %v is not a Kubernikus cluster...\")\n+ glog.V(2).Infof(\"Not a valid Kubernikus context\")\n+ return nil\n}\n}\n@@ -146,6 +148,14 @@ func (o *RefreshOptions) Complete(args []string) (err error) {\n}\nfunc (o *RefreshOptions) Run(c *cobra.Command) error {\n+ if isKubernikusContext, err := o.isKubernikusContext(); err != nil {\n+ return nil\n+ } else {\n+ if !isKubernikusContext {\n+ return nil\n+ }\n+ }\n+\nif ok, err := o.isCertificateValid(); err != nil {\nreturn errors.Wrap(err, \"Verification of certifcates failed.\")\n} else {\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
smartens kubernikus context detection
596,240
21.10.2017 10:45:37
-7,200
fa5cf345bd569843b010d6a607fe8d30dd13919a
reorders initialization logic to remove double context validation
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/auth/refresh.go", "new_path": "pkg/cmd/kubernikusctl/auth/refresh.go", "diff": "@@ -85,6 +85,10 @@ func (o *RefreshOptions) Complete(args []string) (err error) {\nreturn errors.Errorf(\"The context you provided does not exist\")\n}\n+ return nil\n+}\n+\n+func (o *RefreshOptions) Run(c *cobra.Command) error {\nglog.V(2).Infof(\"Using context %v\", o.context)\nif isKubernikusContext, err := o.isKubernikusContext(); err != nil {\nglog.V(2).Infof(\"Not a valid Kubernikus context: %v\", err)\n@@ -96,6 +100,15 @@ func (o *RefreshOptions) Complete(args []string) (err error) {\n}\n}\n+ if ok, err := o.isCertificateValid(); err != nil {\n+ return errors.Wrap(err, \"Verification of certifcates failed.\")\n+ } else {\n+ if ok {\n+ glog.V(2).Infof(\"Certificates are good. Doing nothing.\")\n+ return nil\n+ }\n+ }\n+\nif identityEndpoint, err := o.autoDetectAuthURL(); err != nil {\nerrors.Wrap(err, \"Auto-Detection of auth-url caused an error\")\n} else {\n@@ -144,27 +157,6 @@ func (o *RefreshOptions) Complete(args []string) (err error) {\n}\n}\n- return nil\n-}\n-\n-func (o *RefreshOptions) Run(c *cobra.Command) error {\n- if isKubernikusContext, err := o.isKubernikusContext(); err != nil {\n- return nil\n- } else {\n- if !isKubernikusContext {\n- return nil\n- }\n- }\n-\n- if ok, err := o.isCertificateValid(); err != nil {\n- return errors.Wrap(err, \"Verification of certifcates failed.\")\n- } else {\n- if ok {\n- glog.V(2).Infof(\"Certificates are good. Doing nothing.\")\n- return nil\n- }\n- }\n-\nif err := o.setupClients(); err != nil {\nreturn err\n}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
reorders initialization logic to remove double context validation
596,240
23.10.2017 13:08:28
-7,200
5f701dd6f6eef281de06f103788ac42f2e00a6cb
adds info path to expose info about this kubernikus instance
[ { "change_type": "ADD", "old_path": null, "new_path": "pkg/api/handlers/info.go", "diff": "+package handlers\n+\n+import (\n+ \"github.com/go-openapi/runtime/middleware\"\n+ \"github.com/sapcc/kubernikus/pkg/api\"\n+ \"github.com/sapcc/kubernikus/pkg/api/models\"\n+ \"github.com/sapcc/kubernikus/pkg/api/rest/operations\"\n+ \"github.com/sapcc/kubernikus/pkg/version\"\n+)\n+\n+func NewInfo(rt *api.Runtime) operations.InfoHandler {\n+ return &info{rt}\n+}\n+\n+type info struct {\n+ *api.Runtime\n+}\n+\n+func (d *info) Handle(params operations.InfoParams) middleware.Responder {\n+\n+ info := &models.Info{\n+ Version: version.VERSION,\n+ }\n+\n+ return operations.NewInfoOK().WithPayload(info)\n+}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/api/models/info.go", "diff": "+// Code generated by go-swagger; DO NOT EDIT.\n+\n+package models\n+\n+// This file was generated by the swagger tool.\n+// Editing this file might prove futile when you re-run the swagger generate command\n+\n+import (\n+ strfmt \"github.com/go-openapi/strfmt\"\n+\n+ \"github.com/go-openapi/errors\"\n+ \"github.com/go-openapi/swag\"\n+)\n+\n+// Info info\n+// swagger:model Info\n+type Info struct {\n+\n+ // version\n+ Version string `json:\"version,omitempty\"`\n+}\n+\n+// Validate validates this info\n+func (m *Info) Validate(formats strfmt.Registry) error {\n+ var res []error\n+\n+ if len(res) > 0 {\n+ return errors.CompositeValidationError(res...)\n+ }\n+ return nil\n+}\n+\n+// MarshalBinary interface implementation\n+func (m *Info) MarshalBinary() ([]byte, error) {\n+ if m == nil {\n+ return nil, nil\n+ }\n+ return swag.WriteJSON(m)\n+}\n+\n+// UnmarshalBinary interface implementation\n+func (m *Info) UnmarshalBinary(b []byte) error {\n+ var res Info\n+ if err := swag.ReadJSON(b, &res); err != nil {\n+ return err\n+ }\n+ *m = res\n+ return nil\n+}\n" }, { "change_type": "MODIFY", "old_path": "pkg/api/rest/configure_kubernikus.go", "new_path": "pkg/api/rest/configure_kubernikus.go", "diff": "@@ -40,7 +40,6 @@ func configureAPI(api *operations.KubernikusAPI) http.Handler {\n}\napi.JSONConsumer = runtime.JSONConsumer()\n-\napi.JSONProducer = runtime.JSONProducer()\n// Applies when the \"x-auth-token\" header is set\n@@ -49,6 +48,7 @@ func configureAPI(api *operations.KubernikusAPI) http.Handler {\nrt := &apipkg.Runtime{Namespace: namespace}\nrt.Kubernikus, rt.Kubernetes = NewKubeClients()\n+ api.InfoHandler = handlers.NewInfo(rt)\napi.ListAPIVersionsHandler = handlers.NewListAPIVersions(rt)\napi.ListClustersHandler = handlers.NewListClusters(rt)\napi.CreateClusterHandler = handlers.NewCreateCluster(rt)\n" }, { "change_type": "MODIFY", "old_path": "pkg/api/rest/embedded_spec.go", "new_path": "pkg/api/rest/embedded_spec.go", "diff": "@@ -209,6 +209,20 @@ func init() {\n\"required\": true\n}\n]\n+ },\n+ \"/info\": {\n+ \"get\": {\n+ \"summary\": \"Get info about Kubernikus\",\n+ \"operationId\": \"Info\",\n+ \"responses\": {\n+ \"200\": {\n+ \"description\": \"OK\",\n+ \"schema\": {\n+ \"$ref\": \"#/definitions/Info\"\n+ }\n+ }\n+ }\n+ }\n}\n},\n\"definitions\": {\n@@ -322,6 +336,13 @@ func init() {\n}\n}\n},\n+ \"Info\": {\n+ \"properties\": {\n+ \"version\": {\n+ \"type\": \"string\"\n+ }\n+ }\n+ },\n\"Principal\": {\n\"type\": \"object\",\n\"properties\": {\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/api/rest/operations/info.go", "diff": "+// Code generated by go-swagger; DO NOT EDIT.\n+\n+package operations\n+\n+// This file was generated by the swagger tool.\n+// Editing this file might prove futile when you re-run the generate command\n+\n+import (\n+ \"net/http\"\n+\n+ middleware \"github.com/go-openapi/runtime/middleware\"\n+)\n+\n+// InfoHandlerFunc turns a function with the right signature into a info handler\n+type InfoHandlerFunc func(InfoParams) middleware.Responder\n+\n+// Handle executing the request and returning a response\n+func (fn InfoHandlerFunc) Handle(params InfoParams) middleware.Responder {\n+ return fn(params)\n+}\n+\n+// InfoHandler interface for that can handle valid info params\n+type InfoHandler interface {\n+ Handle(InfoParams) middleware.Responder\n+}\n+\n+// NewInfo creates a new http.Handler for the info operation\n+func NewInfo(ctx *middleware.Context, handler InfoHandler) *Info {\n+ return &Info{Context: ctx, Handler: handler}\n+}\n+\n+/*Info swagger:route GET /info info\n+\n+Get info about Kubernikus\n+\n+*/\n+type Info struct {\n+ Context *middleware.Context\n+ Handler InfoHandler\n+}\n+\n+func (o *Info) ServeHTTP(rw http.ResponseWriter, r *http.Request) {\n+ route, rCtx, _ := o.Context.RouteInfo(r)\n+ if rCtx != nil {\n+ r = rCtx\n+ }\n+ var Params = NewInfoParams()\n+\n+ if err := o.Context.BindValidRequest(r, route, &Params); err != nil { // bind params\n+ o.Context.Respond(rw, r, route.Produces, route, err)\n+ return\n+ }\n+\n+ res := o.Handler.Handle(Params) // actually handle the request\n+\n+ o.Context.Respond(rw, r, route.Produces, route, res)\n+\n+}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/api/rest/operations/info_parameters.go", "diff": "+// Code generated by go-swagger; DO NOT EDIT.\n+\n+package operations\n+\n+// This file was generated by the swagger tool.\n+// Editing this file might prove futile when you re-run the swagger generate command\n+\n+import (\n+ \"net/http\"\n+\n+ \"github.com/go-openapi/errors\"\n+ \"github.com/go-openapi/runtime/middleware\"\n+)\n+\n+// NewInfoParams creates a new InfoParams object\n+// with the default values initialized.\n+func NewInfoParams() InfoParams {\n+ var ()\n+ return InfoParams{}\n+}\n+\n+// InfoParams contains all the bound params for the info operation\n+// typically these are obtained from a http.Request\n+//\n+// swagger:parameters Info\n+type InfoParams struct {\n+\n+ // HTTP Request Object\n+ HTTPRequest *http.Request\n+}\n+\n+// BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface\n+// for simple values it will use straight method calls\n+func (o *InfoParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error {\n+ var res []error\n+ o.HTTPRequest = r\n+\n+ if len(res) > 0 {\n+ return errors.CompositeValidationError(res...)\n+ }\n+ return nil\n+}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/api/rest/operations/info_responses.go", "diff": "+// Code generated by go-swagger; DO NOT EDIT.\n+\n+package operations\n+\n+// This file was generated by the swagger tool.\n+// Editing this file might prove futile when you re-run the swagger generate command\n+\n+import (\n+ \"net/http\"\n+\n+ \"github.com/go-openapi/runtime\"\n+\n+ \"github.com/sapcc/kubernikus/pkg/api/models\"\n+)\n+\n+// InfoOKCode is the HTTP code returned for type InfoOK\n+const InfoOKCode int = 200\n+\n+/*InfoOK OK\n+\n+swagger:response infoOK\n+*/\n+type InfoOK struct {\n+\n+ /*\n+ In: Body\n+ */\n+ Payload *models.Info `json:\"body,omitempty\"`\n+}\n+\n+// NewInfoOK creates InfoOK with default headers values\n+func NewInfoOK() *InfoOK {\n+ return &InfoOK{}\n+}\n+\n+// WithPayload adds the payload to the info o k response\n+func (o *InfoOK) WithPayload(payload *models.Info) *InfoOK {\n+ o.Payload = payload\n+ return o\n+}\n+\n+// SetPayload sets the payload to the info o k response\n+func (o *InfoOK) SetPayload(payload *models.Info) {\n+ o.Payload = payload\n+}\n+\n+// WriteResponse to the client\n+func (o *InfoOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n+\n+ rw.WriteHeader(200)\n+ if o.Payload != nil {\n+ payload := o.Payload\n+ if err := producer.Produce(rw, payload); err != nil {\n+ panic(err) // let the recovery middleware deal with this\n+ }\n+ }\n+}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/api/rest/operations/info_urlbuilder.go", "diff": "+// Code generated by go-swagger; DO NOT EDIT.\n+\n+package operations\n+\n+// This file was generated by the swagger tool.\n+// Editing this file might prove futile when you re-run the generate command\n+\n+import (\n+ \"errors\"\n+ \"net/url\"\n+ golangswaggerpaths \"path\"\n+)\n+\n+// InfoURL generates an URL for the info operation\n+type InfoURL struct {\n+ _basePath string\n+}\n+\n+// WithBasePath sets the base path for this url builder, only required when it's different from the\n+// base path specified in the swagger spec.\n+// When the value of the base path is an empty string\n+func (o *InfoURL) WithBasePath(bp string) *InfoURL {\n+ o.SetBasePath(bp)\n+ return o\n+}\n+\n+// SetBasePath sets the base path for this url builder, only required when it's different from the\n+// base path specified in the swagger spec.\n+// When the value of the base path is an empty string\n+func (o *InfoURL) SetBasePath(bp string) {\n+ o._basePath = bp\n+}\n+\n+// Build a url path and query string\n+func (o *InfoURL) Build() (*url.URL, error) {\n+ var result url.URL\n+\n+ var _path = \"/info\"\n+\n+ _basePath := o._basePath\n+ result.Path = golangswaggerpaths.Join(_basePath, _path)\n+\n+ return &result, nil\n+}\n+\n+// Must is a helper function to panic when the url builder returns an error\n+func (o *InfoURL) Must(u *url.URL, err error) *url.URL {\n+ if err != nil {\n+ panic(err)\n+ }\n+ if u == nil {\n+ panic(\"url can't be nil\")\n+ }\n+ return u\n+}\n+\n+// String returns the string representation of the path with query string\n+func (o *InfoURL) String() string {\n+ return o.Must(o.Build()).String()\n+}\n+\n+// BuildFull builds a full url with scheme, host, path and query string\n+func (o *InfoURL) BuildFull(scheme, host string) (*url.URL, error) {\n+ if scheme == \"\" {\n+ return nil, errors.New(\"scheme is required for a full url on InfoURL\")\n+ }\n+ if host == \"\" {\n+ return nil, errors.New(\"host is required for a full url on InfoURL\")\n+ }\n+\n+ base, err := o.Build()\n+ if err != nil {\n+ return nil, err\n+ }\n+\n+ base.Scheme = scheme\n+ base.Host = host\n+ return base, nil\n+}\n+\n+// StringFull returns the string representation of a complete url\n+func (o *InfoURL) StringFull(scheme, host string) string {\n+ return o.Must(o.BuildFull(scheme, host)).String()\n+}\n" }, { "change_type": "MODIFY", "old_path": "pkg/api/rest/operations/kubernikus_api.go", "new_path": "pkg/api/rest/operations/kubernikus_api.go", "diff": "@@ -43,6 +43,9 @@ func NewKubernikusAPI(spec *loads.Document) *KubernikusAPI {\nGetClusterCredentialsHandler: GetClusterCredentialsHandlerFunc(func(params GetClusterCredentialsParams, principal *models.Principal) middleware.Responder {\nreturn middleware.NotImplemented(\"operation GetClusterCredentials has not yet been implemented\")\n}),\n+ InfoHandler: InfoHandlerFunc(func(params InfoParams) middleware.Responder {\n+ return middleware.NotImplemented(\"operation Info has not yet been implemented\")\n+ }),\nListAPIVersionsHandler: ListAPIVersionsHandlerFunc(func(params ListAPIVersionsParams) middleware.Responder {\nreturn middleware.NotImplemented(\"operation ListAPIVersions has not yet been implemented\")\n}),\n@@ -100,6 +103,8 @@ type KubernikusAPI struct {\nCreateClusterHandler CreateClusterHandler\n// GetClusterCredentialsHandler sets the operation handler for the get cluster credentials operation\nGetClusterCredentialsHandler GetClusterCredentialsHandler\n+ // InfoHandler sets the operation handler for the info operation\n+ InfoHandler InfoHandler\n// ListAPIVersionsHandler sets the operation handler for the list API versions operation\nListAPIVersionsHandler ListAPIVersionsHandler\n// ListClustersHandler sets the operation handler for the list clusters operation\n@@ -185,6 +190,10 @@ func (o *KubernikusAPI) Validate() error {\nunregistered = append(unregistered, \"GetClusterCredentialsHandler\")\n}\n+ if o.InfoHandler == nil {\n+ unregistered = append(unregistered, \"InfoHandler\")\n+ }\n+\nif o.ListAPIVersionsHandler == nil {\nunregistered = append(unregistered, \"ListAPIVersionsHandler\")\n}\n@@ -310,6 +319,11 @@ func (o *KubernikusAPI) initHandlerCache() {\n}\no.handlers[\"GET\"][\"/api/v1/clusters/{name}/credentials\"] = NewGetClusterCredentials(o.context, o.GetClusterCredentialsHandler)\n+ if o.handlers[\"GET\"] == nil {\n+ o.handlers[\"GET\"] = make(map[string]http.Handler)\n+ }\n+ o.handlers[\"GET\"][\"/info\"] = NewInfo(o.context, o.InfoHandler)\n+\nif o.handlers[\"GET\"] == nil {\no.handlers[\"GET\"] = make(map[string]http.Handler)\n}\n" }, { "change_type": "MODIFY", "old_path": "swagger.yml", "new_path": "swagger.yml", "diff": "@@ -19,6 +19,16 @@ responses:\nschema:\n$ref: '#/definitions/error'\npaths:\n+ /info:\n+ get:\n+ operationId: Info\n+ summary: Get info about Kubernikus\n+ responses:\n+ '200':\n+ description: OK\n+ schema:\n+ $ref: '#/definitions/Info'\n+ security: []\n/api/:\nget:\noperationId: ListAPIVersions\n@@ -132,6 +142,10 @@ paths:\nsecurity:\n- keystone: []\ndefinitions:\n+ Info:\n+ properties:\n+ version:\n+ type: string\nApiVersions:\nrequired:\n- versions\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds info path to expose info about this kubernikus instance
596,240
23.10.2017 18:08:03
-7,200
a2e3167b9d27b24f274be6c1ea7e40a176dbc7f2
includes download links into info structs
[ { "change_type": "MODIFY", "old_path": "pkg/api/handlers/info.go", "new_path": "pkg/api/handlers/info.go", "diff": "@@ -19,6 +19,23 @@ type info struct {\nfunc (d *info) Handle(params operations.InfoParams) middleware.Responder {\ninfo := &models.Info{\n+ Binaries: []*models.InfoBinariesItems0{\n+ {\n+ Name: \"kubernikusctl\",\n+ Links: []*models.InfoBinariesItems0LinksItems0{\n+ {\n+ Platform: \"darwin\",\n+ Arch: \"amd64\",\n+ Link: \"static/binaries/darwin/amd64/kubernikusctl\",\n+ },\n+ {\n+ Platform: \"linux\",\n+ Arch: \"x86\",\n+ Link: \"static/binaries/linux/x86/kubernikusctl\",\n+ },\n+ },\n+ },\n+ },\nVersion: version.VERSION,\n}\n" }, { "change_type": "MODIFY", "old_path": "pkg/api/models/info.go", "new_path": "pkg/api/models/info.go", "diff": "@@ -6,6 +6,8 @@ package models\n// Editing this file might prove futile when you re-run the swagger generate command\nimport (\n+ \"strconv\"\n+\nstrfmt \"github.com/go-openapi/strfmt\"\n\"github.com/go-openapi/errors\"\n@@ -16,6 +18,9 @@ import (\n// swagger:model Info\ntype Info struct {\n+ // binaries\n+ Binaries []*InfoBinariesItems0 `json:\"binaries\"`\n+\n// version\nVersion string `json:\"version,omitempty\"`\n}\n@@ -24,12 +29,44 @@ type Info struct {\nfunc (m *Info) Validate(formats strfmt.Registry) error {\nvar res []error\n+ if err := m.validateBinaries(formats); err != nil {\n+ // prop\n+ res = append(res, err)\n+ }\n+\nif len(res) > 0 {\nreturn errors.CompositeValidationError(res...)\n}\nreturn nil\n}\n+func (m *Info) validateBinaries(formats strfmt.Registry) error {\n+\n+ if swag.IsZero(m.Binaries) { // not required\n+ return nil\n+ }\n+\n+ for i := 0; i < len(m.Binaries); i++ {\n+\n+ if swag.IsZero(m.Binaries[i]) { // not required\n+ continue\n+ }\n+\n+ if m.Binaries[i] != nil {\n+\n+ if err := m.Binaries[i].Validate(formats); err != nil {\n+ if ve, ok := err.(*errors.Validation); ok {\n+ return ve.ValidateName(\"binaries\" + \".\" + strconv.Itoa(i))\n+ }\n+ return err\n+ }\n+ }\n+\n+ }\n+\n+ return nil\n+}\n+\n// MarshalBinary interface implementation\nfunc (m *Info) MarshalBinary() ([]byte, error) {\nif m == nil {\n@@ -47,3 +84,116 @@ func (m *Info) UnmarshalBinary(b []byte) error {\n*m = res\nreturn nil\n}\n+\n+// InfoBinariesItems0 info binaries items0\n+// swagger:model InfoBinariesItems0\n+type InfoBinariesItems0 struct {\n+\n+ // links\n+ Links []*InfoBinariesItems0LinksItems0 `json:\"links\"`\n+\n+ // name\n+ Name string `json:\"name,omitempty\"`\n+}\n+\n+// Validate validates this info binaries items0\n+func (m *InfoBinariesItems0) Validate(formats strfmt.Registry) error {\n+ var res []error\n+\n+ if err := m.validateLinks(formats); err != nil {\n+ // prop\n+ res = append(res, err)\n+ }\n+\n+ if len(res) > 0 {\n+ return errors.CompositeValidationError(res...)\n+ }\n+ return nil\n+}\n+\n+func (m *InfoBinariesItems0) validateLinks(formats strfmt.Registry) error {\n+\n+ if swag.IsZero(m.Links) { // not required\n+ return nil\n+ }\n+\n+ for i := 0; i < len(m.Links); i++ {\n+\n+ if swag.IsZero(m.Links[i]) { // not required\n+ continue\n+ }\n+\n+ if m.Links[i] != nil {\n+\n+ if err := m.Links[i].Validate(formats); err != nil {\n+ if ve, ok := err.(*errors.Validation); ok {\n+ return ve.ValidateName(\"links\" + \".\" + strconv.Itoa(i))\n+ }\n+ return err\n+ }\n+ }\n+\n+ }\n+\n+ return nil\n+}\n+\n+// MarshalBinary interface implementation\n+func (m *InfoBinariesItems0) MarshalBinary() ([]byte, error) {\n+ if m == nil {\n+ return nil, nil\n+ }\n+ return swag.WriteJSON(m)\n+}\n+\n+// UnmarshalBinary interface implementation\n+func (m *InfoBinariesItems0) UnmarshalBinary(b []byte) error {\n+ var res InfoBinariesItems0\n+ if err := swag.ReadJSON(b, &res); err != nil {\n+ return err\n+ }\n+ *m = res\n+ return nil\n+}\n+\n+// InfoBinariesItems0LinksItems0 info binaries items0 links items0\n+// swagger:model InfoBinariesItems0LinksItems0\n+type InfoBinariesItems0LinksItems0 struct {\n+\n+ // arch\n+ Arch string `json:\"arch,omitempty\"`\n+\n+ // link\n+ Link string `json:\"link,omitempty\"`\n+\n+ // platform\n+ Platform string `json:\"platform,omitempty\"`\n+}\n+\n+// Validate validates this info binaries items0 links items0\n+func (m *InfoBinariesItems0LinksItems0) Validate(formats strfmt.Registry) error {\n+ var res []error\n+\n+ if len(res) > 0 {\n+ return errors.CompositeValidationError(res...)\n+ }\n+ return nil\n+}\n+\n+// MarshalBinary interface implementation\n+func (m *InfoBinariesItems0LinksItems0) MarshalBinary() ([]byte, error) {\n+ if m == nil {\n+ return nil, nil\n+ }\n+ return swag.WriteJSON(m)\n+}\n+\n+// UnmarshalBinary interface implementation\n+func (m *InfoBinariesItems0LinksItems0) UnmarshalBinary(b []byte) error {\n+ var res InfoBinariesItems0LinksItems0\n+ if err := swag.ReadJSON(b, &res); err != nil {\n+ return err\n+ }\n+ *m = res\n+ return nil\n+}\n" }, { "change_type": "MODIFY", "old_path": "pkg/api/rest/embedded_spec.go", "new_path": "pkg/api/rest/embedded_spec.go", "diff": "@@ -338,6 +338,34 @@ func init() {\n},\n\"Info\": {\n\"properties\": {\n+ \"binaries\": {\n+ \"type\": \"array\",\n+ \"items\": {\n+ \"type\": \"object\",\n+ \"properties\": {\n+ \"links\": {\n+ \"type\": \"array\",\n+ \"items\": {\n+ \"type\": \"object\",\n+ \"properties\": {\n+ \"arch\": {\n+ \"type\": \"string\"\n+ },\n+ \"link\": {\n+ \"type\": \"string\"\n+ },\n+ \"platform\": {\n+ \"type\": \"string\"\n+ }\n+ }\n+ }\n+ },\n+ \"name\": {\n+ \"type\": \"string\"\n+ }\n+ }\n+ }\n+ },\n\"version\": {\n\"type\": \"string\"\n}\n" }, { "change_type": "MODIFY", "old_path": "swagger.yml", "new_path": "swagger.yml", "diff": "@@ -146,6 +146,24 @@ definitions:\nproperties:\nversion:\ntype: string\n+ binaries:\n+ type: array\n+ items:\n+ type: object\n+ properties:\n+ name:\n+ type: string\n+ links:\n+ type: array\n+ items:\n+ type: object\n+ properties:\n+ platform:\n+ type: string\n+ arch:\n+ type: string\n+ link:\n+ type: string\nApiVersions:\nrequired:\n- versions\n@@ -155,6 +173,7 @@ definitions:\ntype: array\nitems:\ntype: string\n+\nCluster:\ntype: object\nrequired:\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
includes download links into info structs
596,240
23.10.2017 18:08:47
-7,200
d5ee99d914f7038e0753e0976b0a156efa4eddef
adds middleware that serves static content
[ { "change_type": "MODIFY", "old_path": "pkg/api/rest/configure_kubernikus.go", "new_path": "pkg/api/rest/configure_kubernikus.go", "diff": "@@ -5,6 +5,7 @@ import (\n\"fmt\"\n\"net/http\"\n\"os\"\n+ \"strings\"\nerrors \"github.com/go-openapi/errors\"\nruntime \"github.com/go-openapi/runtime\"\n@@ -88,5 +89,16 @@ func setupGlobalMiddleware(handler http.Handler) http.Handler {\nAllowedMethods: []string{\"GET\", \"HEAD\", \"POST\", \"DELETE\", \"PUT\"},\nMaxAge: 600,\n})\n- return gmiddleware.LoggingHandler(os.Stdout, handlers.RootHandler(c.Handler(handler)))\n+\n+ return gmiddleware.LoggingHandler(os.Stdout, handlers.RootHandler(c.Handler(StaticFiles(handler))))\n+}\n+\n+func StaticFiles(next http.Handler) http.Handler {\n+ return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {\n+ if strings.HasPrefix(r.URL.Path, \"/static\") {\n+ http.StripPrefix(\"/static\", http.FileServer(http.Dir(\"static\"))).ServeHTTP(rw, r)\n+ return\n+ }\n+ next.ServeHTTP(rw, r)\n+ })\n}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds middleware that serves static content
596,240
23.10.2017 18:11:53
-7,200
7258f0932384262639d039d582776ff840762303
updates linux path
[ { "change_type": "MODIFY", "old_path": "pkg/api/handlers/info.go", "new_path": "pkg/api/handlers/info.go", "diff": "@@ -30,7 +30,7 @@ func (d *info) Handle(params operations.InfoParams) middleware.Responder {\n},\n{\nPlatform: \"linux\",\n- Arch: \"x86\",\n+ Arch: \"amd64\",\nLink: \"static/binaries/linux/x86/kubernikusctl\",\n},\n},\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
updates linux path
596,240
23.10.2017 18:17:43
-7,200
8843c3a66b50692290f7b1c64407cea502ac6bd2
adds authentication info
[ { "change_type": "MODIFY", "old_path": "README.md", "new_path": "README.md", "diff": "@@ -52,3 +52,33 @@ users:\ntokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\nEOF\n```\n+\n+## Authenticating at the Control Planes\n+\n+Initial kubeconfig setup:\n+```\n+kubernikusctl auth init --url https://k-staging.admin.cloud.sap --name k-staging --user-domain-name ccadmin --project-name kubernikus-staging --project-domain-name ccadmin --auth-url https://identity-3.eu-nl-1.cloud.sap --username <USER>\n+kubernikusctl auth init --url https://k-eu-nl-1.admin.cloud.sap --name k-eu-nl-1 --user-domain-name ccadmin --project-name kubernikus --project-domain-name ccadmin --auth-url https://identity-3.eu-nl-1.cloud.sap --username <USER>\n+```\n+\n+Refresh certificates with:\n+```\n+kubernikusctl auth refresh\n+```\n+\n+Automate in Fish with:\n+```\n+function _kubectl\n+ test -n \"$KUBECTL_CONTEXT\"; or set -x KUBECTL_CONTEXT (kubectl config current-context)\n+\n+ if count $argv > /dev/null\n+ kubernikusctl auth refresh --context $KUBECTL_CONTEXT\n+ end\n+\n+ if test -n \"$KUBECTL_NAMESPACE\"\n+ eval kubectl --context $KUBECTL_CONTEXT --namespace $KUBECTL_NAMESPACE $argv\n+ else\n+ eval kubectl --context $KUBECTL_CONTEXT $argv\n+ end\n+end\n+```\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds authentication info
596,240
23.10.2017 18:25:37
-7,200
b104487e883da97a92fe099734c85e70fb09448d
fixes wrong platform for linux download link
[ { "change_type": "MODIFY", "old_path": "pkg/api/handlers/info.go", "new_path": "pkg/api/handlers/info.go", "diff": "@@ -31,7 +31,7 @@ func (d *info) Handle(params operations.InfoParams) middleware.Responder {\n{\nPlatform: \"linux\",\nArch: \"amd64\",\n- Link: \"static/binaries/linux/x86/kubernikusctl\",\n+ Link: \"static/binaries/linux/amd64/kubernikusctl\",\n},\n},\n},\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes wrong platform for linux download link
596,240
24.10.2017 14:26:46
-7,200
c03d005eb15256d63f1737f7490e803975cba6a2
renames /version to /info
[ { "change_type": "MODIFY", "old_path": "pkg/api/handlers/get_cluster_info.go", "new_path": "pkg/api/handlers/get_cluster_info.go", "diff": "@@ -42,7 +42,7 @@ func (d *getClusterInfo) Handle(params operations.GetClusterInfoParams, principa\nfunc createSetupCommand(principal *models.Principal) string {\nuserName := principal.Name\nuserDomainName := principal.Domain\n- projectId := principal.ID\n+ projectId := principal.Account\nauthUrl := principal.AuthURL\nreturn fmt.Sprintf(\"kubernikusctl auth init --username %v --user-domain-name %v --project-id %v --auth-url %v\", userName, userDomainName, projectId, authUrl)\n" }, { "change_type": "MODIFY", "old_path": "pkg/api/rest/embedded_spec.go", "new_path": "pkg/api/rest/embedded_spec.go", "diff": "@@ -241,7 +241,7 @@ func init() {\n}\n]\n},\n- \"/version\": {\n+ \"/info\": {\n\"get\": {\n\"summary\": \"Get info about Kubernikus\",\n\"operationId\": \"Info\",\n" }, { "change_type": "MODIFY", "old_path": "pkg/api/rest/operations/info.go", "new_path": "pkg/api/rest/operations/info.go", "diff": "@@ -29,7 +29,7 @@ func NewInfo(ctx *middleware.Context, handler InfoHandler) *Info {\nreturn &Info{Context: ctx, Handler: handler}\n}\n-/*Info swagger:route GET /version info\n+/*Info swagger:route GET /info info\nGet info about Kubernikus\n" }, { "change_type": "MODIFY", "old_path": "pkg/api/rest/operations/info_urlbuilder.go", "new_path": "pkg/api/rest/operations/info_urlbuilder.go", "diff": "@@ -35,7 +35,7 @@ func (o *InfoURL) SetBasePath(bp string) {\nfunc (o *InfoURL) Build() (*url.URL, error) {\nvar result url.URL\n- var _path = \"/version\"\n+ var _path = \"/info\"\n_basePath := o._basePath\nresult.Path = golangswaggerpaths.Join(_basePath, _path)\n" }, { "change_type": "MODIFY", "old_path": "pkg/api/rest/operations/kubernikus_api.go", "new_path": "pkg/api/rest/operations/kubernikus_api.go", "diff": "@@ -336,7 +336,7 @@ func (o *KubernikusAPI) initHandlerCache() {\nif o.handlers[\"GET\"] == nil {\no.handlers[\"GET\"] = make(map[string]http.Handler)\n}\n- o.handlers[\"GET\"][\"/version\"] = NewInfo(o.context, o.InfoHandler)\n+ o.handlers[\"GET\"][\"/info\"] = NewInfo(o.context, o.InfoHandler)\nif o.handlers[\"GET\"] == nil {\no.handlers[\"GET\"] = make(map[string]http.Handler)\n" }, { "change_type": "MODIFY", "old_path": "swagger.yml", "new_path": "swagger.yml", "diff": "@@ -19,7 +19,7 @@ responses:\nschema:\n$ref: '#/definitions/error'\npaths:\n- /version:\n+ /info:\nget:\noperationId: Info\nsummary: Get info about Kubernikus\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
renames /version to /info
596,240
25.10.2017 17:52:34
-7,200
9483a03a01aa46a6ece6f988bc4b94efe2b881aa
fixes missing variable
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/Dockerfile", "new_path": "contrib/kubernikus-docs-builder/Dockerfile", "diff": "FROM alpine:3.6\n-ARG HUGO_VERSION\n+ARG HUGO_VERSION=0.30.2\nRUN apk add --no-cache curl\nRUN curl -Lo hugo.tar.gz https://github.com/gohugoio/hugo/releases/download/v${HUGO_VERSION}/hugo_${HUGO_VERSION}_Linux-64bit.tar.gz\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes missing variable
596,240
25.10.2017 17:52:46
-7,200
ff1bc5b7a4ed17db8c132185fa1f96337b409cd3
adds more styling
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "diff": "<div class=\"sapbanner\"></div>\n<div class=\"saplogo\"></div>\n<div class=\"saplinks\">\n- <div><a href=\"/docs\">/user</a></div>\n+ <div><a href=\"/user\">docs</a></div>\n{{ with .Site.Social.github }}\n<div class=\"button button-github\" role=\"button\" aria-label=\"GitHub\">\n<a href=\"https://github.com/{{ . }}\" title=\"@{{ . }} on GitHub\" target=\"_blank\" class=\"toggle-button icon icon-github\"></a>\n</div>\n{{ end }}\n</div>\n- <article class=\"article\">\n<div class=\"promobanner\">\n<div id='stars'></div>\n<div id='stars2'></div>\n</div>\n</div>\n<img src=\"images/logo.png\" class=\"promologo\" />\n+ <article class=\"article\">\n<div class=\"wrapper\">\n{{ .Content }}\n</div>\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/homepage.css", "new_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/homepage.css", "diff": ".promologo {\nposition: relative;\n- top: 120px;\n+ top: 70px;\nwidth: 365px;\n- left: 155px;\n+ left: 413px;\n}\n#stars {\n#title {\nposition: relative;\n- top: 57px;\n+ top: 20px;\nleft: 0;\nright: 0;\ncolor: #FFF;\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds more styling
596,240
25.10.2017 20:54:49
-7,200
8a1783ddf8d193e3b0ee91e57426b197d4076e7f
adds helper task for converting image properties to json for usage as docker build args
[ { "change_type": "ADD", "old_path": null, "new_path": "ci/task_image_properties.yaml", "diff": "+---\n+platform: 'linux'\n+\n+image_resource:\n+ type: docker-image\n+ source:\n+ repository: sapcc/kubernikus-kubectl\n+ tag: 'latest'\n+\n+inputs:\n+ - name: image\n+\n+run:\n+ path: /bin/sh\n+ args:\n+ - -c\n+ - |\n+ set -exo pipefail\n+ DIGEST=$(cat image/digest)\n+ REPOSITORY=$(cat image/repository)\n+ TAG=$(cat image/tag)\n+ cat >\"properties.json\" <<EOF\n+ {\n+ \"DIGEST\": \"$DIGEST\",\n+ \"REPOSITORY\": \"$REPOSITORY\",\n+ \"TAG\": \"$TAG\"\n+ }\n+ EOF\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds helper task for converting image properties to json for usage as docker build args
596,240
25.10.2017 21:10:07
-7,200
8cc8a78dff8bdf9ef2b6c42b60116a7235b8faaa
adds more complexity because concourse
[ { "change_type": "MODIFY", "old_path": "ci/task_image_properties.yaml", "new_path": "ci/task_image_properties.yaml", "diff": "@@ -4,12 +4,15 @@ platform: 'linux'\nimage_resource:\ntype: docker-image\nsource:\n- repository: sapcc/kubernikus-kubectl\n- tag: 'latest'\n+ repository: alpine\n+ tag: '3.6'\ninputs:\n- name: image\n+outputs:\n+ - name: image.properties\n+\nrun:\npath: /bin/sh\nargs:\n@@ -19,7 +22,7 @@ run:\nDIGEST=$(cat image/digest)\nREPOSITORY=$(cat image/repository)\nTAG=$(cat image/tag)\n- cat >\"properties.json\" <<EOF\n+ cat >\"image.properties/properties.json\" <<EOF\n{\n\"DIGEST\": \"$DIGEST\",\n\"REPOSITORY\": \"$REPOSITORY\",\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds more complexity because concourse
596,240
25.10.2017 21:39:42
-7,200
c81275542fa6175cf540684c3a4330c0b8a1f7d3
fallback and prefixing logic for version and digest
[ { "change_type": "MODIFY", "old_path": "Dockerfile.docs", "new_path": "Dockerfile.docs", "diff": "-ARG DIGEST=latest\n-ARG VERSION=${DIGEST}\n-FROM sapcc/kubernikus-docs-builder:${VERSION}\n+ARG DIGEST\n+ARG VERSION=latest # default to latest\n+ARG PDIGEST=${DIGEST:+@}$DIGEST # Prefix wuth @ if set\n+ARG PVERSION=${VERSION:+:}$VERSION # Prefix wuth : if set\n+ARG TAG=${PDIGEST:-$PVERSION} # Use digest if set. Version otherwise.\n+\n+FROM sapcc/kubernikus-docs-builder${TAG}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fallback and prefixing logic for version and digest
596,240
25.10.2017 21:44:47
-7,200
0f73542a7f62fa2855154abc1ff22395a65a4710
moves comments to individual lines
[ { "change_type": "MODIFY", "old_path": "Dockerfile.docs", "new_path": "Dockerfile.docs", "diff": "ARG DIGEST\n-ARG VERSION=latest # default to latest\n-ARG PDIGEST=${DIGEST:+@}$DIGEST # Prefix wuth @ if set\n-ARG PVERSION=${VERSION:+:}$VERSION # Prefix wuth : if set\n-ARG TAG=${PDIGEST:-$PVERSION} # Use digest if set. Version otherwise.\n+# default to latest\n+ARG VERSION=latest\n+\n+# Prefix wuth @ if set\n+ARG PDIGEST=${DIGEST:+@}$DIGEST\n+\n+# Prefix wuth : if set\n+ARG PVERSION=${VERSION:+:}$VERSION\n+\n+# Use digest if set. Version otherwise.\n+ARG TAG=${PDIGEST:-$PVERSION}\nFROM sapcc/kubernikus-docs-builder${TAG}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
moves comments to individual lines
596,240
25.10.2017 21:52:54
-7,200
2f613e3a89bc0b116fba0f63fb54c0309a8ce4ac
uses a less obvious variable name to avoid clashes
[ { "change_type": "MODIFY", "old_path": "Dockerfile.docs", "new_path": "Dockerfile.docs", "diff": "@@ -9,6 +9,6 @@ ARG PDIGEST=${DIGEST:+@}$DIGEST\nARG PVERSION=${VERSION:+:}$VERSION\n# Use digest if set. Version otherwise.\n-ARG TAG=${PDIGEST:-$PVERSION}\n+ARG COMBINED=${PDIGEST:-$PVERSION}\n-FROM sapcc/kubernikus-docs-builder${TAG}\n+FROM sapcc/kubernikus-docs-builder${COMBINED}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
uses a less obvious variable name to avoid clashes
596,240
25.10.2017 23:23:49
-7,200
0d3e300294ec336620c55e876d502ed02a107692
combines multiple images into image properties
[ { "change_type": "MODIFY", "old_path": "Dockerfile.kubernikus", "new_path": "Dockerfile.kubernikus", "diff": "-ARG VERSION=latest\n-FROM sapcc/kubernikus-binaries:$VERSION as kubernikus-binaries\n+ARG KUBERNIKUS_BINARIES_VERSION=:latest\n+FROM sapcc/kubernikus-binaries$KUBERNIKUS_BINARIES_VERSION as kubernikus-binaries\n+\n+ARG KUBERNIKUS_DOCS_VERSION=:latest\n+FROM sapcc/kubernikus-docs$KUBERNIKUS_DOCS_VERSION as kubernikus-docs\nFROM alpine:3.6 as kubernikus\nMAINTAINER \"Fabian Ruff <fabian.ruff@sap.com>\"\n" }, { "change_type": "MODIFY", "old_path": "Dockerfile.kubernikus-docs", "new_path": "Dockerfile.kubernikus-docs", "diff": "-ARG DIGEST\n-# default to latest\n-ARG VERSION=latest\n-\n-# Prefix wuth @ if set\n-ARG PDIGEST=${DIGEST:+@}$DIGEST\n-\n-# Prefix wuth : if set\n-ARG PVERSION=${VERSION:+:}$VERSION\n-\n-# Use digest if set. Version otherwise.\n-ARG COMBINED=${PDIGEST:-$PVERSION}\n-\n-FROM sapcc/kubernikus-docs-builder${COMBINED}\n+ARG KUBERNIKUS_DOCS_BUILDER_VERSION=:latest\n+FROM sapcc/kubernikus-docs-builder${KUBERNIKUS_DOCS_BUILDER_VERSION}\n" }, { "change_type": "MODIFY", "old_path": "Dockerfile.kubernikusctl", "new_path": "Dockerfile.kubernikusctl", "diff": "-ARG VERSION=latest\n-FROM sapcc/kubernikus-binaries:$VERSION as kubernikus-binaries\n+ARG KUBERNIKUS_BINARIED_VERSION=:latest\n+FROM sapcc/kubernikus-binaries:$KUBERNIKUS_BINARIED_VERSION as kubernikus-binaries\nFROM alpine:3.6 as kubernikusctl\nCOPY --from=kubernikus-binaries /kubernikusctl /usr/local/bin/\n" }, { "change_type": "MODIFY", "old_path": "ci/pipeline.yaml", "new_path": "ci/pipeline.yaml", "diff": "@@ -17,6 +17,8 @@ resources:\nuri: https://github.com/sapcc/kubernikus.git\nbranch: master\ndepth: 1\n+ params:\n+ ignore_paths: [\"contrib/**\", \"docs/**\", \"ci/**\"]\n- name: charts.git\ntype: git\n@@ -28,6 +30,31 @@ resources:\ndepth: 1\nparams:\npaths: [\"charts/**\"]\n+ ignore_paths: [\"*\"]\n+\n+ - name: contrib.git\n+ type: git\n+ source:\n+ username: sapcc-bot\n+ password: ((github-com-access-token))\n+ uri: https://github.com/sapcc/kubernikus.git\n+ branch: master\n+ depth: 1\n+ params:\n+ paths: [\"contrib/**\"]\n+ ignore_paths: [\"*\"]\n+\n+ - name: docs.git\n+ type: git\n+ source:\n+ username: sapcc-bot\n+ password: ((github-com-access-token))\n+ uri: https://github.com/sapcc/kubernikus.git\n+ branch: master\n+ depth: 1\n+ params:\n+ paths: [\"docs/**\"]\n+ ignore_paths: [\"*\"]\n- name: pipeline.git\ntype: git\n@@ -83,6 +110,20 @@ resources:\nusername: ((docker-hub-username))\npassword: ((docker-hub-password))\n+ - name: kubernikus-docs.image\n+ type: docker-image\n+ source:\n+ repository: sapcc/kubernikus-docs\n+ username: ((docker-hub-username))\n+ password: ((docker-hub-password))\n+\n+ - name: kubernikus-docs-builder.image\n+ type: docker-image\n+ source:\n+ repository: sapcc/kubernikus-docs-builder\n+ username: ((docker-hub-username))\n+ password: ((docker-hub-password))\n+\n- name: slack-alert\ntype: slack-notification\nsource:\n@@ -103,7 +144,9 @@ resource_types:\ngroups:\n- name: kubernikus\njobs:\n- - build\n+ - docs\n+ - binaries\n+ - package\n- staging\n- e2e\n- rollout\n@@ -118,31 +161,144 @@ groups:\n- staging_kubernikus-system\n- rollout_kubernikus-system\n- eu-nl-1_kubernikus-system\n+ - name: contrib\n+ jobs:\n+ - kubernikus-docs-builder\n+ - kubernikus-kubectl\n+ - name: docs\n+ jobs:\n+ - docs\n+ - binaries\n+ - package\n+\njobs:\n+####################################################################################\n+#\n+# contrib\n+#\n+####################################################################################\n+\n+ - name: kubernikus-docs-builder\n+ on_failure:\n+ <<: *post_failure_to_slack\n+ plan:\n+ - aggregate:\n+ - get: kubernetes.git\n+ resource: contrib.git\n+ trigger: true\n+\n+ - put: kubernikus-docs-builder.image\n+ params:\n+ build: kubernetes.git/contrib/kubernikus-docs-builder\n+ tag: kubernetes.git/.git/HEAD\n+ tag_as_latest: true\n+ build_args:\n+ http_proxy: http://proxy.phl.sap.corp:8080\n+ https_proxy: http://proxy.phl.sap.corp:8080\n+ no_proxy: sap.corp,cloud.sap,127.0.0.1,localhost\n+ get_params:\n+ skip_download: true\n+\n+ - name: kubernikus-kubectl\n+ on_failure:\n+ <<: *post_failure_to_slack\n+ plan:\n+ - aggregate:\n+ - get: kubernetes.git\n+ resource: contrib.git\n+ trigger: true\n+ - get: kubernikus-binaries.image\n+ passed: [binaries]\n+ trigger: true\n+\n+ - task: kubernikus-binaries.properties\n+ file: kubernetes.git/ci/task_image_properties.yaml\n+ input_mapping:\n+ image0: kubernikus-binaries.image\n+ output_mapping:\n+ image.properties: kubernikus-binaries.properties\n+ params:\n+ image0: KUBERNIKUS_BINARIES\n+\n+ - put: kubernikus-docs-builder.image\n+ params:\n+ build: kubernetes.git/contrib/kubernikus-kubectl\n+ tag: kubernetes.git/.git/HEAD\n+ tag_as_latest: true\n+ build_args_file: kubernikus-binaries.properties/properties.json\n+ build_args:\n+ http_proxy: http://proxy.phl.sap.corp:8080\n+ https_proxy: http://proxy.phl.sap.corp:8080\n+ no_proxy: sap.corp,cloud.sap,127.0.0.1,localhost\n+ get_params:\n+ skip_download: true\n+\n+\n+####################################################################################\n+#\n+# docs\n+#\n+####################################################################################\n+\n+ - name: docs\n+ on_failure:\n+ <<: *post_failure_to_slack\n+ plan:\n+ - aggregate:\n+ - get: kubernetes.git\n+ resource: docs.git\n+ trigger: true\n+ - get: kubernikus-docs-builder.image\n+ trigger: true\n+ passed: [kubernikus-docs-builder]\n+ params:\n+ skip_download: true\n+\n+ - task: kubernikus-docs-builder.properties\n+ file: kubernetes.git/ci/task_image_properties.yaml\n+ input_mapping:\n+ image0: kubernikus-docs-builder.image\n+ output_mapping:\n+ image.properties: kubernikus-docs-builder.properties\n+ params:\n+ image0: KUBERNIKUS_DOCS\n+\n+ - put: kubernikus-docs.image\n+ params:\n+ build: kubernetes.git\n+ dockerfile: kubernetes.git/Dockerfile.kubernikus-docs\n+ tag: kubernetes.git/.git/HEAD\n+ tag_as_latest: true\n+ build_args_file: kubernikus-docs-builder.properties/properties.json\n+ build_args:\n+ http_proxy: http://proxy.phl.sap.corp:8080\n+ https_proxy: http://proxy.phl.sap.corp:8080\n+ no_proxy: sap.corp,cloud.sap,127.0.0.1,localhost\n+ get_params:\n+ skip_download: true\n+\n+\n####################################################################################\n#\n# kubernikus\n#\n####################################################################################\n- - name: build\n+ - name: binaries\nserial: true\non_failure:\n<<: *post_failure_to_slack\nplan:\n- - aggregate:\n- get: kubernikus.git\ntrigger: true\n- - put: version\n- put: kubernikus-binaries.image\nparams:\nbuild: kubernikus.git\ndockerfile: kubernikus.git/Dockerfile.kubernikus-binaries\n- tag: version/version\n- build_args_file: version/properties.json\n+ tag: kubernetes.git/.git/HEAD\ntag_as_latest: true\nbuild_args:\nhttp_proxy: http://proxy.phl.sap.corp:8080\n@@ -151,13 +307,44 @@ jobs:\nget_params:\nskip_download: true\n+\n+ - name: package\n+ serial: true\n+ plan:\n+ - aggregate:\n+ - get: kubernikus.git\n+ passed: [binaries]\n+ - get: kubernikus-binaries.image\n+ trigger: true\n+ passed: [binaries]\n+ params:\n+ skip_download: true\n+ - get: kubernikus-docs.image\n+ passed: [docs]\n+ trigger: true\n+ params:\n+ skip_download: true\n+ - put: version\n+\n+ - aggregate:\n+ - task: image.properties\n+ file: kubernetes.git/ci/task_image_properties.yaml\n+ input_mapping:\n+ image0: kubernikus-docs.image\n+ image1: kubernikus-binaries.image\n+ output_mapping:\n+ image.properties: kubernikus-docs.properties\n+ params:\n+ image0: KUBERNIKUS_DOCS\n+ image1: KUBERNIKUS_BINARIES\n+\n- aggregate:\n- put: kubernikus.image\nparams:\nbuild: kubernikus.git\ndockerfile: kubernikus.git/Dockerfile.kubernikus\ntag: version/version\n- build_args_file: version/properties.json\n+ build_args_file: images.properties/properties.json\nbuild_args:\nhttp_proxy: http://proxy.phl.sap.corp:8080\nhttps_proxy: http://proxy.phl.sap.corp:8080\n@@ -169,8 +356,8 @@ jobs:\nbuild: kubernikus.git\ndockerfile: kubernikus.git/Dockerfile.kubernikusctl\ntag: version/version\n- build_args_file: version/properties.json\ntag_as_latest: true\n+ build_args_file: images.properties/properties.json\nbuild_args:\nhttp_proxy: http://proxy.phl.sap.corp:8080\nhttps_proxy: http://proxy.phl.sap.corp:8080\n@@ -181,10 +368,10 @@ jobs:\nparams:\nbuild: kubernikus.git/contrib/kubernikus-kubectl\ntag: version/version\n- build_args_file: version/properties.json\ntag_as_latest: true\ncache: true\ncache_tag: latest\n+ build_args_file: images.properties/properties.json\nbuild_args:\nhttp_proxy: http://proxy.phl.sap.corp:8080\nhttps_proxy: http://proxy.phl.sap.corp:8080\n@@ -197,14 +384,12 @@ jobs:\nplan:\n- aggregate:\n- get: kubernikus.git\n- passed: [build]\n- get: version\n- passed: [build]\n+ passed: [package]\ntrigger: true\n- get: secrets.git\n- - get: pipeline.git\n- task: deploy\n- file: pipeline.git/ci/task_helm_kubernikus.yaml\n+ file: kubernikus.git/ci/task_helm_kubernikus.yaml\nparams:\nOS_AUTH_URL: https://identity-3.eu-nl-1.cloud.sap/v3\nOS_USERNAME: {{kubernikus-eu-nl-1-username}}\n@@ -274,14 +459,12 @@ jobs:\nplan:\n- aggregate:\n- get: kubernikus.git\n- passed: [build]\n+ - get: secrets.git\n- get: version\n- passed: [build]\n+ passed: [package]\ntrigger: true\n- - get: secrets.git\n- - get: pipeline.git\n- task: deploy\n- file: pipeline.git/ci/task_helm-admin_kubernikus.yaml\n+ file: kubernikus.git/ci/task_helm-admin_kubernikus.yaml\nparams:\nREGION: admin\nKUBERNIKUS_NAME: k-staging\n@@ -304,14 +487,12 @@ jobs:\nplan:\n- aggregate:\n- get: kubernikus.git\n- passed: [rollout_admin]\n+ - get: secrets.git\n- get: version\npassed: [rollout_admin]\ntrigger: true\n- - get: secrets.git\n- - get: pipeline.git\n- task: deploy\n- file: pipeline.git/ci/task_helm-admin_kubernikus.yaml\n+ file: kubernikus.git/ci/task_helm-admin_kubernikus.yaml\nparams:\nREGION: admin\nKUBERNIKUS_NAME: k-eu-nl-1\n" }, { "change_type": "MODIFY", "old_path": "ci/task_image_properties.yaml", "new_path": "ci/task_image_properties.yaml", "diff": "@@ -8,10 +8,17 @@ image_resource:\ntag: '3.6'\ninputs:\n- - name: image\n+ - name: image0\n+ - name: image1\n+ - name: image2\noutputs:\n- - name: image.properties\n+ - name: properties\n+\n+params:\n+ image0: IMAGE0\n+ image1: IMAGE1\n+ image2: IMAGE2\nrun:\npath: /bin/sh\n@@ -19,13 +26,16 @@ run:\n- -c\n- |\nset -exo pipefail\n- DIGEST=$(cat image/digest)\n- REPOSITORY=$(cat image/repository)\n- TAG=$(cat image/tag)\n- cat >\"image.properties/properties.json\" <<EOF\n+ cat >\"properties/properties.json\" <<EOF\n{\n- \"DIGEST\": \"$DIGEST\",\n- \"REPOSITORY\": \"$REPOSITORY\",\n- \"TAG\": \"$TAG\"\n+ \"${image0}_REPOSITORY\": \"$(cat image0/repository 2>/dev/null|| true)\",\n+ \"${image1}_REPOSITORY\": \"$(cat image1/repository 2>/dev/null|| true)\",\n+ \"${image2}_REPOSITORY\": \"$(cat image2/repository 2>/dev/null|| true)\",\n+ \"${image0}_TAG\": \"$(cat image0/tag 2>/dev/null|| true)\",\n+ \"${image1}_TAG\": \"$(cat image1/tag 2>/dev/null|| true)\",\n+ \"${image2}_TAG\": \"$(cat image2/tag 2>/dev/null|| true)\",\n+ \"${image0}_DIGEST\": \"$(cat image0/digest 2>/dev/null|| true)\",\n+ \"${image1}_DIGEST\": \"$(cat image1/digest 2>/dev/null|| true)\",\n+ \"${image2}_DIGEST\": \"$(cat image2/digest 2>/dev/null|| true)\"\n}\nEOF\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-kubectl/Dockerfile", "new_path": "contrib/kubernikus-kubectl/Dockerfile", "diff": "-ARG VERSION=latest\n-FROM sapcc/kubernikus-binaries:$VERSION as kubernikus-binaries\n+ARG KUBERNIKUS_BINARIES_VERSION=:latest\n+FROM sapcc/kubernikus-binaries$KUBERNIKUS_BINARIES_VERSION as kubernikus-binaries\nFROM alpine:3.6\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
combines multiple images into image properties
596,240
25.10.2017 23:29:04
-7,200
7563767dbf67e7ea809ce81a42811b2270219bfd
adds missing inputs even if it makes no sense
[ { "change_type": "MODIFY", "old_path": "ci/pipeline.yaml", "new_path": "ci/pipeline.yaml", "diff": "@@ -217,6 +217,7 @@ jobs:\nfile: kubernetes.git/ci/task_image_properties.yaml\ninput_mapping:\nimage0: kubernikus-binaries.image\n+ image1: kubernikus-binaries.image\noutput_mapping:\nimage.properties: kubernikus-binaries.properties\nparams:\n@@ -260,6 +261,7 @@ jobs:\nfile: kubernetes.git/ci/task_image_properties.yaml\ninput_mapping:\nimage0: kubernikus-docs-builder.image\n+ image1: kubernikus-docs-builder.image\noutput_mapping:\nimage.properties: kubernikus-docs-builder.properties\nparams:\n@@ -328,7 +330,7 @@ jobs:\n- aggregate:\n- task: image.properties\n- file: kubernetes.git/ci/task_image_properties.yaml\n+ file: kubernikus.git/ci/task_image_properties.yaml\ninput_mapping:\nimage0: kubernikus-docs.image\nimage1: kubernikus-binaries.image\n" }, { "change_type": "MODIFY", "old_path": "ci/task_image_properties.yaml", "new_path": "ci/task_image_properties.yaml", "diff": "@@ -10,7 +10,6 @@ image_resource:\ninputs:\n- name: image0\n- name: image1\n- - name: image2\noutputs:\n- name: properties\n@@ -18,7 +17,6 @@ outputs:\nparams:\nimage0: IMAGE0\nimage1: IMAGE1\n- image2: IMAGE2\nrun:\npath: /bin/sh\n@@ -30,12 +28,9 @@ run:\n{\n\"${image0}_REPOSITORY\": \"$(cat image0/repository 2>/dev/null|| true)\",\n\"${image1}_REPOSITORY\": \"$(cat image1/repository 2>/dev/null|| true)\",\n- \"${image2}_REPOSITORY\": \"$(cat image2/repository 2>/dev/null|| true)\",\n\"${image0}_TAG\": \"$(cat image0/tag 2>/dev/null|| true)\",\n\"${image1}_TAG\": \"$(cat image1/tag 2>/dev/null|| true)\",\n- \"${image2}_TAG\": \"$(cat image2/tag 2>/dev/null|| true)\",\n\"${image0}_DIGEST\": \"$(cat image0/digest 2>/dev/null|| true)\",\n\"${image1}_DIGEST\": \"$(cat image1/digest 2>/dev/null|| true)\",\n- \"${image2}_DIGEST\": \"$(cat image2/digest 2>/dev/null|| true)\"\n}\nEOF\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds missing inputs even if it makes no sense
596,240
25.10.2017 23:47:53
-7,200
166547f029ae4f7ea99712b83224b3a39e2f6f53
fixes trailing comma
[ { "change_type": "MODIFY", "old_path": "ci/task_image_properties.yaml", "new_path": "ci/task_image_properties.yaml", "diff": "@@ -31,6 +31,6 @@ run:\n\"${image0}_TAG\": \"$(cat image0/tag 2>/dev/null|| true)\",\n\"${image1}_TAG\": \"$(cat image1/tag 2>/dev/null|| true)\",\n\"${image0}_DIGEST\": \"$(cat image0/digest 2>/dev/null|| true)\",\n- \"${image1}_DIGEST\": \"$(cat image1/digest 2>/dev/null|| true)\",\n+ \"${image1}_DIGEST\": \"$(cat image1/digest 2>/dev/null|| true)\"\n}\nEOF\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes trailing comma
596,240
26.10.2017 09:30:34
-7,200
baf89f0d669e7a7d8a41cbb0d72ad32edbfc06c7
publishes docs under /docs. moves swagger to /swagger
[ { "change_type": "MODIFY", "old_path": "pkg/api/handlers/root.go", "new_path": "pkg/api/handlers/root.go", "diff": "@@ -8,7 +8,8 @@ var RootContent = `{\n\"/api/v1\",\n\"/docs\",\n\"/info\",\n- \"/static\"\n+ \"/static\",\n+ \"/swagger\"\n]\n}`\n" }, { "change_type": "MODIFY", "old_path": "pkg/api/rest/configure_kubernikus.go", "new_path": "pkg/api/rest/configure_kubernikus.go", "diff": "@@ -79,7 +79,7 @@ func configureServer(s *graceful.Server, scheme, addr string) {\n// The middleware configuration is for the handler executors. These do not apply to the swagger.json document.\n// The middleware executes after routing but before authentication, binding and validation\nfunc setupMiddlewares(handler http.Handler) http.Handler {\n- return middleware.Redoc(middleware.RedocOpts{}, handler)\n+ return middleware.Redoc(middleware.RedocOpts{Path: \"swagger\"}, handler)\n}\n// The middleware configuration happens before anything, this middleware also applies to serving the swagger.json document.\n@@ -96,6 +96,10 @@ func setupGlobalMiddleware(handler http.Handler) http.Handler {\nfunc StaticFiles(next http.Handler) http.Handler {\nreturn http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {\n+ if strings.HasPrefix(r.URL.Path, \"/docs\") {\n+ http.StripPrefix(\"/static\", http.FileServer(http.Dir(\"static/docs\"))).ServeHTTP(rw, r)\n+ return\n+ }\nif strings.HasPrefix(r.URL.Path, \"/static\") {\nhttp.StripPrefix(\"/static\", http.FileServer(http.Dir(\"static\"))).ServeHTTP(rw, r)\nreturn\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
publishes docs under /docs. moves swagger to /swagger
596,240
26.10.2017 10:31:21
-7,200
fe11e5ab719e2ec686f148706a66d8f39d50d216
adds .travis build
[ { "change_type": "ADD", "old_path": null, "new_path": ".travis.yml", "diff": "+dist: trusty\n+sudo: required\n+\n+before_script:\n+ - curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add -\n+ - sudo apt-key fingerprint 0EBFCD88\n+ - sudo add-apt-repository \"deb [arch=amd64] https://download.docker.com/linux/ubuntu $(lsb_release -cs) stable\"\n+ - sudo apt-get update\n+ - sudo apt-get install docker-ce=17.06.0~ce-0~ubuntu\n+ - docker login -u=\"$DOCKER_USERNAME\" -p=\"$DOCKER_PASSWORD\"\n+\n+script:\n+ - make build\n+\n+after_success:\n+ - make push\n" }, { "change_type": "MODIFY", "old_path": "Makefile", "new_path": "Makefile", "diff": "@@ -27,17 +27,18 @@ all: $(BINARIES:%=bin/$(GOOS)/%)\nbin/%: $(GOFILES) Makefile\nGOOS=$(*D) GOARCH=amd64 go build $(GOFLAGS) -v -i -o $(@D)/$(@F) ./cmd/$(@F)\n+\nbuild:\n- docker build $(BUILD_ARGS) -t sapcc/kubernikus-binaries:$(VERSION) -t sapcc/kubernikus-binaries:latest --target kubernikus-binaries .\n+ docker build $(BUILD_ARGS) -t sapcc/kubernikus-binaries:$(VERSION) -t sapcc/kubernikus-binaries:latest --cache-from my/image:latest --target kubernikus-binaries .\ndocker build $(BUILD_ARGS) -t sapcc/kubernikus-docs:$(VERSION) -t sapcc/kubernikus-docs:latest --target kubernikus-docs .\ndocker build $(BUILD_ARGS) -t sapcc/kubernikus:$(VERSION) -t sapcc/kubernikus:latest --target kubernikus .\ndocker build $(BUILD_ARGS) -t sapcc/kubernikusctl:$(VERSION) -t sapcc/kubernikusctl:latest --target kubernikusctl .\npush:\n- docker push sapcc/kubernikus:$(VERSION)\n- docker push sapcc/kubernikus:latest\n- docker push sapcc/kubernikusctl:$(VERSION)\n- docker push sapcc/kubernikusctl:latest\n+ echo docker push sapcc/kubernikus:$(VERSION)\n+ echo docker push sapcc/kubernikus:latest\n+ echo docker push sapcc/kubernikusctl:$(VERSION)\n+ echo docker push sapcc/kubernikusctl:latest\npkg/api/rest/operations/kubernikus_api.go: swagger.yml\nifndef HAS_SWAGGER\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds .travis build
596,240
26.10.2017 10:32:01
-7,200
e7464f2086ef7dfb1a8ff341cb9355c66e382a01
adds correct docs base-url
[ { "change_type": "MODIFY", "old_path": "pkg/api/rest/configure_kubernikus.go", "new_path": "pkg/api/rest/configure_kubernikus.go", "diff": "@@ -97,7 +97,7 @@ func setupGlobalMiddleware(handler http.Handler) http.Handler {\nfunc StaticFiles(next http.Handler) http.Handler {\nreturn http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {\nif strings.HasPrefix(r.URL.Path, \"/docs\") {\n- http.StripPrefix(\"/static\", http.FileServer(http.Dir(\"static/docs\"))).ServeHTTP(rw, r)\n+ http.StripPrefix(\"/docs\", http.FileServer(http.Dir(\"static/docs\"))).ServeHTTP(rw, r)\nreturn\n}\nif strings.HasPrefix(r.URL.Path, \"/static\") {\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds correct docs base-url
596,240
26.10.2017 11:04:22
-7,200
4295490a59a00f00dff6398e6235d0cdf8750f06
optimizes image build
[ { "change_type": "MODIFY", "old_path": ".travis.yml", "new_path": ".travis.yml", "diff": "@@ -10,6 +10,7 @@ before_script:\n- docker login -u=\"$DOCKER_USERNAME\" -p=\"$DOCKER_PASSWORD\"\nscript:\n+ - make pull\n- make build\nafter_success:\n" }, { "change_type": "MODIFY", "old_path": "Dockerfile", "new_path": "Dockerfile", "diff": "-FROM golang:1.9.0-alpine3.6 as builder\n-WORKDIR /go/src/github.com/sapcc/kubernikus/\n-RUN apk add --no-cache make\n-COPY . .\n-ARG VERSION\n-RUN make all\n+ARG VERSION=latest\n-FROM scratch as kubernikus-binaries\n-COPY --from=builder /go/src/github.com/sapcc/kubernikus/bin/linux/* /\n-\n-FROM alpine:3.6 as kubernikusctl\n-COPY --from=kubernikus-binaries /kubernikusctl /usr/local/bin/\n-CMD [\"kubernikusctl\"]\n-\n-FROM sapcc/kubernikus-docs-builder as kubernikus-docs\n+FROM sapcc/kubernikus-binaries:$VERSION as kubernikus-binaries\n+FROM sapcc/kubernikus-docs:$VERSION as kubernikus-docs\nFROM alpine:3.6 as kubernikus\nMAINTAINER \"Fabian Ruff <fabian.ruff@sap.com>\"\n" }, { "change_type": "MODIFY", "old_path": "Dockerfile.kubernikus-docs", "new_path": "Dockerfile.kubernikus-docs", "diff": "-ARG KUBERNIKUS_DOCS_BUILDER_VERSION=:latest\n-FROM sapcc/kubernikus-docs-builder${KUBERNIKUS_DOCS_BUILDER_VERSION}\n+ARG VERSION=latest\n+FROM sapcc/kubernikus-docs-builder:$VERSION\n" }, { "change_type": "MODIFY", "old_path": "Dockerfile.kubernikusctl", "new_path": "Dockerfile.kubernikusctl", "diff": "-ARG KUBERNIKUS_BINARIES_VERSION=:latest\n-FROM sapcc/kubernikus-binaries$KUBERNIKUS_BINARIES_VERSION as kubernikus-binaries\n+ARG VERSION=latest\n+FROM sapcc/kubernikus-binaries:$VERSION as kubernikus-binaries\n-FROM alpine:3.6 as kubernikusctl\n+FROM alpine:3.6\nCOPY --from=kubernikus-binaries /kubernikusctl /usr/local/bin/\nCMD [\"kubernikusctl\"]\n" }, { "change_type": "MODIFY", "old_path": "Makefile", "new_path": "Makefile", "diff": "@@ -27,12 +27,15 @@ all: $(BINARIES:%=bin/$(GOOS)/%)\nbin/%: $(GOFILES) Makefile\nGOOS=$(*D) GOARCH=amd64 go build $(GOFLAGS) -v -i -o $(@D)/$(@F) ./cmd/$(@F)\n-\nbuild:\n- docker build $(BUILD_ARGS) -t sapcc/kubernikus-binaries:$(VERSION) -t sapcc/kubernikus-binaries:latest --cache-from my/image:latest --target kubernikus-binaries .\n- docker build $(BUILD_ARGS) -t sapcc/kubernikus-docs:$(VERSION) -t sapcc/kubernikus-docs:latest --target kubernikus-docs .\n- docker build $(BUILD_ARGS) -t sapcc/kubernikus:$(VERSION) -t sapcc/kubernikus:latest --target kubernikus .\n- docker build $(BUILD_ARGS) -t sapcc/kubernikusctl:$(VERSION) -t sapcc/kubernikusctl:latest --target kubernikusctl .\n+ docker build $(BUILD_ARGS) -t sapcc/kubernikus-docs-builder:$(VERSION) -t sapcc/kubernikus-docs-builder:latest --cache-from=sapcc/kubernikus-docs-builder:latest ./contrib/kubernikus-docs-builder\n+ docker build $(BUILD_ARGS) -t sapcc/kubernikus-binaries:$(VERSION) -f Dockerfile.kubernikus-binaries .\n+ docker build $(BUILD_ARGS) -t sapcc/kubernikus-docs:$(VERSION) -f Dockerfile.kubernikus-docs .\n+ docker build $(BUILD_ARGS) -t sapcc/kubernikusctl:$(VERSION) -f Dockerfile.kubernikusctl .\n+ docker build $(BUILD_ARGS) -t sapcc/kubernikus:$(VERSION) -f Dockerfile .\n+\n+pull:\n+ docker pull sapcc/kubernikus-docs-builder:latest\npush:\necho docker push sapcc/kubernikus:$(VERSION)\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
optimizes image build
596,240
26.10.2017 11:20:49
-7,200
0307a5b403d87f962d2b84af6788824ef02c8448
replaces date version with git commit
[ { "change_type": "MODIFY", "old_path": ".travis.yml", "new_path": ".travis.yml", "diff": "dist: trusty\nsudo: required\n+env:\n+ - VERSION=$TRAVIS_COMMIT\n+\nbefore_script:\n- curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add -\n- sudo apt-key fingerprint 0EBFCD88\n- sudo add-apt-repository \"deb [arch=amd64] https://download.docker.com/linux/ubuntu $(lsb_release -cs) stable\"\n- sudo apt-get update\n- sudo apt-get install docker-ce=17.06.0~ce-0~ubuntu\n- - docker login -u=\"$DOCKER_USERNAME\" -p=\"$DOCKER_PASSWORD\"\nscript:\n- make pull\n- make build\nafter_success:\n- - make push\n+ - if [ \"$TRAVIS_BRANCH\" == \"master\" ]; then\n+ docker login -u=\"$DOCKER_USERNAME\" -p=\"$DOCKER_PASSWORD\";\n+ make tag\n+ make push\n+ fi\n" }, { "change_type": "MODIFY", "old_path": "Makefile", "new_path": "Makefile", "diff": "-DATE := $(shell date +%Y%m%d%H%M%S)\n-VERSION ?= v$(DATE)\n+VERSION ?= $(shell git rev-parse --verify HEAD)\nGOOS ?= $(shell go env | grep GOOS | cut -d'\"' -f2)\nBINARIES := apiserver kubernikus kubernikusctl wormhole\n@@ -28,7 +27,7 @@ bin/%: $(GOFILES) Makefile\nGOOS=$(*D) GOARCH=amd64 go build $(GOFLAGS) -v -i -o $(@D)/$(@F) ./cmd/$(@F)\nbuild:\n- docker build $(BUILD_ARGS) -t sapcc/kubernikus-docs-builder:$(VERSION) -t sapcc/kubernikus-docs-builder:latest --cache-from=sapcc/kubernikus-docs-builder:latest ./contrib/kubernikus-docs-builder\n+ docker build $(BUILD_ARGS) -t sapcc/kubernikus-docs-builder:$(VERSION) --cache-from=sapcc/kubernikus-docs-builder:latest ./contrib/kubernikus-docs-builder\ndocker build $(BUILD_ARGS) -t sapcc/kubernikus-binaries:$(VERSION) -f Dockerfile.kubernikus-binaries .\ndocker build $(BUILD_ARGS) -t sapcc/kubernikus-docs:$(VERSION) -f Dockerfile.kubernikus-docs .\ndocker build $(BUILD_ARGS) -t sapcc/kubernikusctl:$(VERSION) -f Dockerfile.kubernikusctl .\n@@ -37,6 +36,10 @@ build:\npull:\ndocker pull sapcc/kubernikus-docs-builder:latest\n+tag:\n+ docker tag sapcc/kubernikus:$(VERSION) sapcc/kubernikus:latest\n+ docker tag sapcc/kubernikusctl:$(VERSION) sapcc/kubernikusctl:latest\n+\npush:\necho docker push sapcc/kubernikus:$(VERSION)\necho docker push sapcc/kubernikus:latest\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
replaces date version with git commit
596,240
26.10.2017 11:47:48
-7,200
a806d328ce5bbb66afbf19e9677d851cb9b2b6ad
shuffles Dockerfiles around
[ { "change_type": "MODIFY", "old_path": ".travis.yml", "new_path": ".travis.yml", "diff": "@@ -18,6 +18,5 @@ script:\nafter_success:\n- if [ \"$TRAVIS_BRANCH\" == \"master\" ]; then\ndocker login -u=\"$DOCKER_USERNAME\" -p=\"$DOCKER_PASSWORD\";\n- make tag\n- make push\n+ make tag push;\nfi\n" }, { "change_type": "DELETE", "old_path": "Dockerfile.kubernikus", "new_path": null, "diff": "-ARG KUBERNIKUS_BINARIES_VERSION=:latest\n-FROM sapcc/kubernikus-binaries$KUBERNIKUS_BINARIES_VERSION as kubernikus-binaries\n-\n-ARG KUBERNIKUS_DOCS_VERSION=:latest\n-FROM sapcc/kubernikus-docs$KUBERNIKUS_DOCS_VERSION as kubernikus-docs\n-\n-FROM alpine:3.6 as kubernikus\n-MAINTAINER \"Fabian Ruff <fabian.ruff@sap.com>\"\n-RUN apk add --no-cache curl iptables\n-RUN curl -Lo /bin/dumb-init https://github.com/Yelp/dumb-init/releases/download/v1.2.0/dumb-init_1.2.0_amd64 \\\n- && chmod +x /bin/dumb-init \\\n- && dumb-init -V\n-COPY charts/ /etc/kubernikus/charts\n-COPY --from=kubernikus-binaries /apiserver /kubernikus /wormhole /usr/local/bin/\n-COPY --from=kubernikus-binaries /kubernikusctl /static/binaries/linux/amd64/kubernikusctl\n-COPY --from=kubernikus-docs /public /static/docs\n-ENTRYPOINT [\"dumb-init\", \"--\"]\n-CMD [\"apiserver\"]\n" }, { "change_type": "MODIFY", "old_path": "Makefile", "new_path": "Makefile", "diff": "@@ -27,24 +27,29 @@ bin/%: $(GOFILES) Makefile\nGOOS=$(*D) GOARCH=amd64 go build $(GOFLAGS) -v -i -o $(@D)/$(@F) ./cmd/$(@F)\nbuild:\n- docker build $(BUILD_ARGS) -t sapcc/kubernikus-docs-builder:$(VERSION) --cache-from=sapcc/kubernikus-docs-builder:latest ./contrib/kubernikus-docs-builder\ndocker build $(BUILD_ARGS) -t sapcc/kubernikus-binaries:$(VERSION) -f Dockerfile.kubernikus-binaries .\n+ docker build $(BUILD_ARGS) -t sapcc/kubernikus-docs-builder:$(VERSION) --cache-from=sapcc/kubernikus-docs-builder:latest ./contrib/kubernikus-docs-builder\n+ docker build $(BUILD_ARGS) -t sapcc/kubernikus-kubectl$(VERSION) --cache-from=sapcc/kubernikus-kubectl:latest ./contrib/kubernikus-kubectl\n+ docker build $(BUILD_ARGS) -t sapcc/kubernikusctl:$(VERSION) ./contrib/kubernikusctl\ndocker build $(BUILD_ARGS) -t sapcc/kubernikus-docs:$(VERSION) -f Dockerfile.kubernikus-docs .\n- docker build $(BUILD_ARGS) -t sapcc/kubernikusctl:$(VERSION) -f Dockerfile.kubernikusctl .\ndocker build $(BUILD_ARGS) -t sapcc/kubernikus:$(VERSION) -f Dockerfile .\npull:\ndocker pull sapcc/kubernikus-docs-builder:latest\n+ docker pull sapcc/kubernikus-kubectl:latest\ntag:\ndocker tag sapcc/kubernikus:$(VERSION) sapcc/kubernikus:latest\ndocker tag sapcc/kubernikusctl:$(VERSION) sapcc/kubernikusctl:latest\n+ docker tag sapcc/kubernikus-kubectl:$(VERSION) sapcc/kubernikus-kubectl:latest\npush:\necho docker push sapcc/kubernikus:$(VERSION)\necho docker push sapcc/kubernikus:latest\necho docker push sapcc/kubernikusctl:$(VERSION)\necho docker push sapcc/kubernikusctl:latest\n+ echo docker push sapcc/kubernikus-kubectl:$(VERSION)\n+ echo docker push sapcc/kubernikus-kubectl:latest\npkg/api/rest/operations/kubernikus_api.go: swagger.yml\nifndef HAS_SWAGGER\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-kubectl/Dockerfile", "new_path": "contrib/kubernikus-kubectl/Dockerfile", "diff": "-ARG KUBERNIKUS_BINARIES_VERSION=:latest\n-FROM sapcc/kubernikus-binaries$KUBERNIKUS_BINARIES_VERSION as kubernikus-binaries\n+ARG VERSION=latest\n+FROM sapcc/kubernikus-binaries:$VERSION as kubernikus-binaries\nFROM alpine:3.6\n" }, { "change_type": "RENAME", "old_path": "Dockerfile.kubernikusctl", "new_path": "contrib/kubernikusctl/Dockerfile", "diff": "" } ]
Go
Apache License 2.0
sapcc/kubernikus
shuffles Dockerfiles around
596,240
26.10.2017 11:50:33
-7,200
4dff1c6cf23fd2e42017359a3c63f056c241d85a
simplifies docker installation
[ { "change_type": "MODIFY", "old_path": ".travis.yml", "new_path": ".travis.yml", "diff": "@@ -5,11 +5,8 @@ env:\n- VERSION=$TRAVIS_COMMIT\nbefore_script:\n- - curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add -\n- - sudo apt-key fingerprint 0EBFCD88\n- - sudo add-apt-repository \"deb [arch=amd64] https://download.docker.com/linux/ubuntu $(lsb_release -cs) stable\"\n- sudo apt-get update\n- - sudo apt-get install docker-ce=17.06.0~ce-0~ubuntu\n+ - sudo apt-get -y -o Dpkg::Options::=\"--force-confnew\" install docker-ce\nscript:\n- make pull\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
simplifies docker installation
596,240
26.10.2017 12:47:10
-7,200
aa2a07b1097334e1d2279765bc099286e4a41cbc
activates image push
[ { "change_type": "MODIFY", "old_path": ".travis.yml", "new_path": ".travis.yml", "diff": "@@ -9,11 +9,10 @@ before_script:\n- sudo apt-get -y -o Dpkg::Options::=\"--force-confnew\" install docker-ce\nscript:\n- - make pull\n- - make build\n+ - make pull build\nafter_success:\n- if [ \"$TRAVIS_BRANCH\" == \"master\" ]; then\n- docker login -u=\"$DOCKER_USERNAME\" -p=\"$DOCKER_PASSWORD\";\n+ echo $DOCKER_PASSWORD | docker login -u=\"$DOCKER_USERNAME\" --password-stdin;\nmake tag push;\nfi\n" }, { "change_type": "MODIFY", "old_path": "Makefile", "new_path": "Makefile", "diff": "@@ -29,7 +29,7 @@ bin/%: $(GOFILES) Makefile\nbuild:\ndocker build $(BUILD_ARGS) -t sapcc/kubernikus-binaries:$(VERSION) -f Dockerfile.kubernikus-binaries .\ndocker build $(BUILD_ARGS) -t sapcc/kubernikus-docs-builder:$(VERSION) --cache-from=sapcc/kubernikus-docs-builder:latest ./contrib/kubernikus-docs-builder\n- docker build $(BUILD_ARGS) -t sapcc/kubernikus-kubectl$(VERSION) --cache-from=sapcc/kubernikus-kubectl:latest ./contrib/kubernikus-kubectl\n+ docker build $(BUILD_ARGS) -t sapcc/kubernikus-kubectl:$(VERSION) --cache-from=sapcc/kubernikus-kubectl:latest ./contrib/kubernikus-kubectl\ndocker build $(BUILD_ARGS) -t sapcc/kubernikusctl:$(VERSION) ./contrib/kubernikusctl\ndocker build $(BUILD_ARGS) -t sapcc/kubernikus-docs:$(VERSION) -f Dockerfile.kubernikus-docs .\ndocker build $(BUILD_ARGS) -t sapcc/kubernikus:$(VERSION) -f Dockerfile .\n@@ -44,12 +44,12 @@ tag:\ndocker tag sapcc/kubernikus-kubectl:$(VERSION) sapcc/kubernikus-kubectl:latest\npush:\n- echo docker push sapcc/kubernikus:$(VERSION)\n- echo docker push sapcc/kubernikus:latest\n- echo docker push sapcc/kubernikusctl:$(VERSION)\n- echo docker push sapcc/kubernikusctl:latest\n- echo docker push sapcc/kubernikus-kubectl:$(VERSION)\n- echo docker push sapcc/kubernikus-kubectl:latest\n+ docker push sapcc/kubernikus:$(VERSION)\n+ docker push sapcc/kubernikus:latest\n+ docker push sapcc/kubernikusctl:$(VERSION)\n+ docker push sapcc/kubernikusctl:latest\n+ docker push sapcc/kubernikus-kubectl:$(VERSION)\n+ docker push sapcc/kubernikus-kubectl:latest\npkg/api/rest/operations/kubernikus_api.go: swagger.yml\nifndef HAS_SWAGGER\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
activates image push
596,240
26.10.2017 13:49:53
-7,200
98600597b066e950d257df8adace343ac1f1b918
enables debugging to track down text/html responder
[ { "change_type": "MODIFY", "old_path": "pkg/client/kubernikus_generated/kubernikus_client.go", "new_path": "pkg/client/kubernikus_generated/kubernikus_client.go", "diff": "@@ -47,6 +47,7 @@ func NewHTTPClientWithConfig(formats strfmt.Registry, cfg *TransportConfig) *Kub\n// create transport and client\ntransport := httptransport.New(cfg.Host, cfg.BasePath, cfg.Schemes)\n+ transport.Debug = true\nreturn New(transport, formats)\n}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
enables debugging to track down text/html responder
596,240
26.10.2017 13:50:16
-7,200
915231f2a403be06d84bdf5f895a5124533683e7
simplifies pipeline by moving build out of concourse
[ { "change_type": "MODIFY", "old_path": "ci/pipeline.yaml", "new_path": "ci/pipeline.yaml", "diff": "@@ -31,28 +31,6 @@ resources:\nparams:\npaths: [\"charts\"]\n- - name: contrib.git\n- type: git\n- source:\n- username: sapcc-bot\n- password: ((github-com-access-token))\n- uri: https://github.com/sapcc/kubernikus.git\n- branch: master\n- depth: 1\n- params:\n- paths: [\"contrib\"]\n-\n- - name: docs.git\n- type: git\n- source:\n- username: sapcc-bot\n- password: ((github-com-access-token))\n- uri: https://github.com/sapcc/kubernikus.git\n- branch: master\n- depth: 1\n- params:\n- paths: [\"docs\"]\n-\n- name: pipeline.git\ntype: git\nsource:\n@@ -72,55 +50,6 @@ resources:\nbranch: master\ndepth: 1\n- - name: version\n- type: time-version-resource\n- source:\n- prefix: v\n- property_name: VERSION\n- check_every: 525600h\n-\n- - name: kubernikus-binaries.image\n- type: docker-image\n- source:\n- repository: sapcc/kubernikus-binaries\n- username: ((docker-hub-username))\n- password: ((docker-hub-password))\n-\n- - name: kubernikus.image\n- type: docker-image\n- source:\n- repository: sapcc/kubernikus\n- username: ((docker-hub-username))\n- password: ((docker-hub-password))\n-\n- - name: kubernikusctl.image\n- type: docker-image\n- source:\n- repository: sapcc/kubernikusctl\n- username: ((docker-hub-username))\n- password: ((docker-hub-password))\n-\n- - name: kubernikus-kubectl.image\n- type: docker-image\n- source:\n- repository: sapcc/kubernikus-kubectl\n- username: ((docker-hub-username))\n- password: ((docker-hub-password))\n-\n- - name: kubernikus-docs.image\n- type: docker-image\n- source:\n- repository: sapcc/kubernikus-docs\n- username: ((docker-hub-username))\n- password: ((docker-hub-password))\n-\n- - name: kubernikus-docs-builder.image\n- type: docker-image\n- source:\n- repository: sapcc/kubernikus-docs-builder\n- username: ((docker-hub-username))\n- password: ((docker-hub-password))\n-\n- name: slack-alert\ntype: slack-notification\nsource:\n@@ -141,9 +70,6 @@ resource_types:\ngroups:\n- name: kubernikus\njobs:\n- - docs\n- - binaries\n- - package\n- staging\n- e2e\n- rollout\n@@ -158,237 +84,23 @@ groups:\n- staging_kubernikus-system\n- rollout_kubernikus-system\n- eu-nl-1_kubernikus-system\n- - name: contrib\n- jobs:\n- - kubernikus-docs-builder\n- - kubernikus-kubectl\n- - name: docs\n- jobs:\n- - docs\n- - binaries\n- - package\n-\njobs:\n-\n-####################################################################################\n-#\n-# contrib\n-#\n-####################################################################################\n-\n- - name: kubernikus-docs-builder\n- on_failure:\n- <<: *post_failure_to_slack\n- plan:\n- - aggregate:\n- - get: kubernikus.git\n- resource: contrib.git\n- trigger: true\n-\n- - put: kubernikus-docs-builder.image\n- params:\n- build: kubernikus.git/contrib/kubernikus-docs-builder\n- tag: kubernikus.git/.git/HEAD\n- tag_as_latest: true\n- build_args:\n- http_proxy: http://proxy.phl.sap.corp:8080\n- https_proxy: http://proxy.phl.sap.corp:8080\n- no_proxy: sap.corp,cloud.sap,127.0.0.1,localhost\n- get_params:\n- skip_download: true\n-\n- - name: kubernikus-kubectl\n- on_failure:\n- <<: *post_failure_to_slack\n- plan:\n- - aggregate:\n- - get: kubernikus.git\n- resource: contrib.git\n- trigger: true\n- - get: kubernikus-binaries.image\n- passed: [binaries]\n- trigger: true\n-\n- - task: kubernikus-binaries.properties\n- file: kubernikus.git/ci/task_image_properties.yaml\n- input_mapping:\n- image0: kubernikus-binaries.image\n- image1: kubernikus-binaries.image\n- output_mapping:\n- properties: kubernikus-binaries.properties\n- params:\n- image0: KUBERNIKUS_BINARIES\n-\n- - put: kubernikus-docs-builder.image\n- params:\n- build: kubernikus.git/contrib/kubernikus-kubectl\n- tag: kubernikus.git/.git/HEAD\n- tag_as_latest: true\n- build_args_file: kubernikus-binaries.properties/properties.json\n- build_args:\n- http_proxy: http://proxy.phl.sap.corp:8080\n- https_proxy: http://proxy.phl.sap.corp:8080\n- no_proxy: sap.corp,cloud.sap,127.0.0.1,localhost\n- get_params:\n- skip_download: true\n-\n-\n-####################################################################################\n-#\n-# docs\n-#\n-####################################################################################\n-\n- - name: docs\n- on_failure:\n- <<: *post_failure_to_slack\n- plan:\n- - aggregate:\n- - get: kubernikus.git\n- resource: docs.git\n- trigger: true\n- - get: kubernikus-docs-builder.image\n- trigger: true\n- passed: [kubernikus-docs-builder]\n- params:\n- skip_download: true\n-\n- - task: kubernikus-docs-builder.properties\n- file: kubernikus.git/ci/task_image_properties.yaml\n- input_mapping:\n- image0: kubernikus-docs-builder.image\n- image1: kubernikus-docs-builder.image\n- output_mapping:\n- properties: kubernikus-docs-builder.properties\n- params:\n- image0: KUBERNIKUS_DOCS\n-\n- - put: kubernikus-docs.image\n- params:\n- build: kubernikus.git\n- dockerfile: kubernikus.git/Dockerfile.kubernikus-docs\n- tag: kubernikus.git/.git/HEAD\n- tag_as_latest: true\n- build_args_file: kubernikus-docs-builder.properties/properties.json\n- build_args:\n- http_proxy: http://proxy.phl.sap.corp:8080\n- https_proxy: http://proxy.phl.sap.corp:8080\n- no_proxy: sap.corp,cloud.sap,127.0.0.1,localhost\n- get_params:\n- skip_download: true\n-\n-\n####################################################################################\n#\n# kubernikus\n#\n####################################################################################\n- - name: binaries\n- serial: true\n- on_failure:\n- <<: *post_failure_to_slack\n- plan:\n- - get: kubernikus.git\n- trigger: true\n-\n- - put: kubernikus-binaries.image\n- params:\n- build: kubernikus.git\n- dockerfile: kubernikus.git/Dockerfile.kubernikus-binaries\n- tag: kubernikus.git/.git/HEAD\n- tag_as_latest: true\n- build_args:\n- http_proxy: http://proxy.phl.sap.corp:8080\n- https_proxy: http://proxy.phl.sap.corp:8080\n- no_proxy: sap.corp,cloud.sap,127.0.0.1,localhost\n- get_params:\n- skip_download: true\n-\n- - name: package\n- serial: true\n- plan:\n- - aggregate:\n- - get: kubernikus.git\n- - get: kubernikus-binaries.image\n- trigger: true\n- passed: [binaries]\n- params:\n- skip_download: true\n- - get: kubernikus-docs.image\n- passed: [docs]\n- trigger: true\n- params:\n- skip_download: true\n- - put: version\n-\n- - aggregate:\n- - task: images.properties\n- file: kubernikus.git/ci/task_image_properties.yaml\n- input_mapping:\n- image0: kubernikus-docs.image\n- image1: kubernikus-binaries.image\n- output_mapping:\n- properties: images.properties\n- params:\n- image0: KUBERNIKUS_DOCS\n- image1: KUBERNIKUS_BINARIES\n-\n- - aggregate:\n- - put: kubernikus.image\n- params:\n- build: kubernikus.git\n- dockerfile: kubernikus.git/Dockerfile.kubernikus\n- tag: version/version\n- build_args_file: images.properties/properties.json\n- build_args:\n- http_proxy: http://proxy.phl.sap.corp:8080\n- https_proxy: http://proxy.phl.sap.corp:8080\n- no_proxy: sap.corp,cloud.sap,127.0.0.1,localhost\n- get_params:\n- skip_download: true\n- - put: kubernikusctl.image\n- params:\n- build: kubernikus.git\n- dockerfile: kubernikus.git/Dockerfile.kubernikusctl\n- tag: version/version\n- tag_as_latest: true\n- build_args_file: images.properties/properties.json\n- build_args:\n- http_proxy: http://proxy.phl.sap.corp:8080\n- https_proxy: http://proxy.phl.sap.corp:8080\n- no_proxy: sap.corp,cloud.sap,127.0.0.1,localhost\n- get_params:\n- skip_download: true\n- - put: kubernikus-kubectl.image\n- params:\n- build: kubernikus.git/contrib/kubernikus-kubectl\n- tag: version/version\n- tag_as_latest: true\n- cache: true\n- cache_tag: latest\n- build_args_file: images.properties/properties.json\n- build_args:\n- http_proxy: http://proxy.phl.sap.corp:8080\n- https_proxy: http://proxy.phl.sap.corp:8080\n- no_proxy: sap.corp,cloud.sap,127.0.0.1,localhost\n- get_params:\n- skip_download: true\n- on_failure:\n- <<: *post_failure_to_slack\n-\n- name: staging\nserial: true\nplan:\n- aggregate:\n- - get: kubernikus.git\n- - get: version\n- passed: [package]\n- trigger: true\n- get: secrets.git\n+ - get: pipeline.git\n+ - get: kubernikus.git\n- task: deploy\n- file: kubernikus.git/ci/task_helm_kubernikus.yaml\n+ file: pipeline.git/ci/task_helm_kubernikus.yaml\nparams:\nOS_AUTH_URL: https://identity-3.eu-nl-1.cloud.sap/v3\nOS_USERNAME: {{kubernikus-eu-nl-1-username}}\n@@ -404,27 +116,28 @@ jobs:\n- name: e2e\nserial: true\nplan:\n- - get: version\n+ - get: kubernikus.git\npassed: [staging]\ntrigger: true\n- name: rollout\nserial: true\nplan:\n- - get: version\n+ - get: kubernikus.git\n+ passed: [staging]\npassed: [e2e]\n- name: eu-nl-1\nserial: true\nplan:\n- aggregate:\n+ - get: secrets.git\n+ - get: pipeline.git\n- get: kubernikus.git\n- - get: version\npassed: [rollout]\ntrigger: true\n- - get: secrets.git\n- task: deploy\n- file: kubernikus.git/ci/task_helm_kubernikus.yaml\n+ file: pipeline.git/ci/task_helm_kubernikus.yaml\nparams:\nOS_AUTH_URL: https://identity-3.eu-nl-1.cloud.sap/v3\nOS_USERNAME: {{kubernikus-eu-nl-1-username}}\n@@ -447,10 +160,9 @@ jobs:\nserial: true\nplan:\n- aggregate:\n- - get: kubernikus.git\n- get: secrets.git\n- - get: version\n- passed: [package]\n+ - get: pipeline.git\n+ - get: kubernikus.git\ntrigger: true\n- task: deploy\nfile: kubernikus.git/ci/task_helm-admin_kubernikus.yaml\n@@ -462,22 +174,17 @@ jobs:\n- name: rollout_admin\nserial: true\nplan:\n- - aggregate:\n- get: kubernikus.git\npassed: [admin_staging]\n- params:\n- depth: 0\n- - get: version\n- passed: [admin_staging]\n- trigger: true # remove for manual gate\n+ trigger: true\n- name: admin_eu-nl-1\nserial: true\nplan:\n- aggregate:\n- - get: kubernikus.git\n- get: secrets.git\n- - get: version\n+ - get: pipeline.git\n+ - get: kubernikus.git\npassed: [rollout_admin]\ntrigger: true\n- task: deploy\n@@ -517,21 +224,18 @@ jobs:\n- name: rollout_kubernikus-system\nserial: true\nplan:\n- - aggregate:\n- get: charts.git\npassed: [staging_kubernikus-system]\n- params:\n- depth: 0\n- name: eu-nl-1_kubernikus-system\nserial: true\nplan:\n- aggregate:\n+ - get: secrets.git\n+ - get: pipeline.git\n- get: charts.git\npassed: [rollout_kubernikus-system]\ntrigger: true\n- - get: secrets.git\n- - get: pipeline.git\n- task: deploy\nfile: pipeline.git/ci/task_helm_kubernikus-system.yaml\nparams:\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
simplifies pipeline by moving build out of concourse
596,230
18.10.2017 17:46:18
-7,200
059635c04b69a9a0ee1aef3a88b52a3e049d7925
implements list and get cluster
[ { "change_type": "MODIFY", "old_path": ".gitignore", "new_path": ".gitignore", "diff": "bin/\n_scratch\n_output\n+*.swp\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/client/models/cluster_print.go", "diff": "+package models\n+\n+import (\n+ \"fmt\"\n+ \"github.com/pkg/errors\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd/printers\"\n+)\n+\n+func (c *Cluster) GetFormats() map[printers.PrintFormat]struct{} {\n+ ret := map[printers.PrintFormat]struct{}{\n+ printers.Table: struct{}{},\n+ printers.Human: struct{}{},\n+ }\n+ return ret\n+}\n+\n+func (c *Cluster) Print(format printers.PrintFormat, options printers.PrintOptions) error {\n+ switch format {\n+ case printers.Table:\n+ c.printTable(options)\n+ case printers.Human:\n+ c.printHuman(options)\n+ default:\n+ return errors.Errorf(\"Unknown printformat models.Cluster is unable to print in format: %v\", format)\n+ }\n+ return nil\n+}\n+\n+func (c *Cluster) printHuman(options printers.PrintOptions) {\n+ fmt.Println(\"Cluster name: \", *c.Name)\n+ fmt.Println(\"Cluster state: \", (*c).Status.Kluster.State)\n+ if (*c).Spec != nil {\n+ fmt.Println(\"Cluster node pools: \", len((*c).Spec.NodePools))\n+ for _, pool := range (*c).Spec.NodePools {\n+ pool.print()\n+ }\n+ }\n+}\n+\n+func (p *ClusterSpecNodePoolsItems0) print() {\n+ fmt.Print(\"Name: \")\n+ fmt.Println(*p.Name)\n+ fmt.Print(\" Flavor: \\t\")\n+ fmt.Println(*p.Flavor)\n+ fmt.Print(\" Image: \\t\")\n+ fmt.Println(p.Image)\n+ fmt.Print(\" Size: \\t\")\n+ fmt.Println(*p.Size)\n+}\n+\n+func (c *Cluster) printTable(options printers.PrintOptions) {\n+ if options.WithHeaders {\n+ fmt.Print(\"NAME\")\n+ fmt.Print(\"\\t\")\n+ fmt.Print(\"STATUS\")\n+ fmt.Print(\"\\t\")\n+ fmt.Println(\"MESSAGE\")\n+ }\n+ fmt.Print(*c.Name)\n+ fmt.Print(\"\\t\")\n+ fmt.Print((*c).Status.Kluster.State)\n+ fmt.Print(\"\\t\")\n+ fmt.Println((*c).Status.Kluster.Message)\n+}\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/common/kubernikus.go", "new_path": "pkg/cmd/kubernikusctl/common/kubernikus.go", "diff": "@@ -56,6 +56,38 @@ func (k *KubernikusClient) GetCredentials(name string) (string, error) {\nreturn ok.Payload.Kubeconfig, nil\n}\n+func (k *KubernikusClient) ShowCluster(name string) (*models.Cluster, error) {\n+ params := operations.NewShowClusterParams()\n+ params.Name = name\n+ ok, err := k.client.Operations.ShowCluster(params, k.authFunc())\n+ switch err.(type) {\n+ case *operations.ShowClusterDefault:\n+ result := err.(*operations.ShowClusterDefault)\n+ return nil, errors.Errorf(*result.Payload.Message)\n+ case error:\n+ return nil, errors.Wrap(err, \"Getting cluster failed\")\n+ }\n+ return ok.Payload, nil\n+}\n+\n+func (k *KubernikusClient) ListAllClusters() ([]*models.Cluster, error) {\n+ ok, err := k.client.Operations.ListClusters(operations.NewListClustersParams(), k.authFunc())\n+ switch err.(type) {\n+ case *operations.ListClustersDefault:\n+ result := err.(*operations.ListClustersDefault)\n+ return nil, errors.Errorf(*result.Payload.Message)\n+ case error:\n+ return nil, errors.Wrapf(err, \"Listing clusters failed\")\n+ }\n+ if err != nil {\n+ return nil, errors.Wrap(err, \"Couldn't fetch cluster list from Kubernikus API\")\n+ }\n+ if len(ok.Payload) == 0 {\n+ return nil, errors.Errorf(\"There's no cluster in this project\")\n+ }\n+ return ok.Payload, nil\n+}\n+\nfunc (k *KubernikusClient) GetDefaultCluster() (*models.Cluster, error) {\nok, err := k.client.Operations.ListClusters(operations.NewListClustersParams(), k.authFunc())\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/cmd/kubernikusctl/get.go", "diff": "+package kubernikusctl\n+\n+import (\n+ \"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/common\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/get\"\n+ \"github.com/spf13/cobra\"\n+)\n+\n+func getRun(c *cobra.Command, args []string) {\n+ c.Help()\n+}\n+\n+func NewGetCommand() *cobra.Command {\n+ o := get.GetOptions{\n+ Openstack: common.NewOpenstackClient(),\n+ }\n+\n+ c := &cobra.Command{\n+ Use: \"get [object]\",\n+ Short: \"Retrieves Information about object from the server\",\n+ PersistentPreRun: o.PersistentPreRun,\n+ Run: getRun,\n+ }\n+\n+ o.Openstack.BindFlags(c.PersistentFlags())\n+ cluster := get.NewClusterCommand(o)\n+ c.AddCommand(cluster)\n+ return c\n+}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/cmd/kubernikusctl/get/cluster.go", "diff": "+package get\n+\n+import (\n+ \"github.com/golang/glog\"\n+ \"github.com/pkg/errors\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd/printers\"\n+ \"github.com/spf13/cobra\"\n+)\n+\n+func NewClusterCommand(o GetOptions) *cobra.Command {\n+ c := &cobra.Command{\n+ Use: \"cluster [name]\",\n+ Short: \"Gets info about clusters\",\n+ Long: `Retrieves information regarding a cluster or all clusters from the server.`,\n+ Aliases: []string{\"clusters\"},\n+ PreRun: o.clusterPreRun,\n+ Run: o.clusterRun,\n+ }\n+ return c\n+}\n+\n+func (o *GetOptions) clusterPreRun(c *cobra.Command, args []string) {\n+ cmd.CheckError(validateClusterCommandArgs(args))\n+ cmd.CheckError(o.SetupKubernikusClient())\n+}\n+\n+func (o *GetOptions) clusterRun(c *cobra.Command, args []string) {\n+ glog.V(2).Infof(\"Run args: %v\", args)\n+ if len(args) == 1 {\n+ cmd.CheckError(o.clusterShow(args[0]))\n+ } else {\n+ cmd.CheckError(o.clusterList())\n+ }\n+}\n+\n+func (o *GetOptions) clusterList() error {\n+ clusters, err := o.Kubernikus.ListAllClusters()\n+ if err != nil {\n+ glog.V(2).Infof(\"Error listing clusters: %v\", err)\n+ return errors.Wrap(err, \"Error listing clusters\")\n+ }\n+ printme := make([]printers.Printable, len(clusters))\n+ for i, cluster := range clusters {\n+ tmp := cluster\n+ printme[i] = tmp\n+ }\n+ return printers.PrintTable(printme)\n+}\n+\n+func (o *GetOptions) clusterShow(name string) error {\n+ cluster, err := o.Kubernikus.ShowCluster(name)\n+ if err != nil {\n+ glog.V(2).Infof(\"Error getting cluster %v: %v\", name, err)\n+ return errors.Wrap(err, \"Error getting cluster\")\n+ }\n+ return cluster.Print(printers.Human, printers.PrintOptions{})\n+}\n+\n+func validateClusterCommandArgs(args []string) error {\n+ if len(args) > 1 {\n+ return errors.Errorf(\"Surplus arguments to cluster, %v\", args)\n+ }\n+ return nil\n+}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/cmd/kubernikusctl/get/common.go", "diff": "+package get\n+\n+import (\n+ \"fmt\"\n+ \"net/url\"\n+\n+ \"github.com/golang/glog\"\n+ \"github.com/pkg/errors\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/common\"\n+ \"github.com/spf13/cobra\"\n+)\n+\n+type GetOptions struct {\n+ _url string\n+ url *url.URL\n+ Openstack *common.OpenstackClient\n+ Kubernikus *common.KubernikusClient\n+}\n+\n+func (o *GetOptions) PersistentPreRun(c *cobra.Command, args []string) {\n+ cmd.CheckError(o.Openstack.Validate(c, args))\n+ cmd.CheckError(o.Openstack.Setup())\n+ cmd.CheckError(o.Openstack.Authenticate())\n+}\n+\n+func (o *GetOptions) SetupKubernikusClient() error {\n+ var err error\n+ if o._url == \"\" {\n+ fmt.Println(\"Auto-Detecting Kubernikus Host ...\")\n+ if o.url, err = o.Openstack.DefaultKubernikusURL(); err != nil {\n+ glog.V(2).Infof(\"Error detecting kubernikust host: %+v\", err)\n+ return errors.Errorf(\"You need to provide --url. Auto-Detection failed.\")\n+ }\n+ }\n+ glog.V(2).Infof(\"Setting up kubernikus client at %v.\", o.url)\n+ o.Kubernikus = common.NewKubernikusClient(o.url, o.Openstack.Provider.TokenID)\n+ return nil\n+}\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/kubernikusctl.go", "new_path": "pkg/cmd/kubernikusctl/kubernikusctl.go", "diff": "@@ -15,6 +15,7 @@ func NewCommand(name string) *cobra.Command {\nc.AddCommand(\nNewAuthCommand(),\n+ NewGetCommand(),\n)\nc.PersistentFlags().AddGoFlagSet(flag.CommandLine)\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/cmd/printers/printable.go", "diff": "+package printers\n+\n+import (\n+ \"github.com/pkg/errors\"\n+)\n+\n+type PrintFormat int\n+\n+const (\n+ Human PrintFormat = iota\n+ Table\n+)\n+\n+type PrintOptions struct {\n+ WithHeaders bool\n+}\n+\n+type Printable interface {\n+ GetFormats() map[PrintFormat]struct{}\n+ Print(format PrintFormat, options PrintOptions) error\n+}\n+\n+func PrintTable(list []Printable) error {\n+ first := true\n+ for _, item := range list {\n+ _, ok := item.GetFormats()[Table]\n+ if !ok {\n+ return errors.Errorf(\"Unsupported print format table supported formats: %v, %v\", item, item.GetFormats())\n+ }\n+ item.Print(Table, PrintOptions{WithHeaders: first})\n+ first = false\n+ }\n+ return nil\n+}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- implements list and get cluster
596,240
26.10.2017 14:06:43
-7,200
9c4332311caff32f4c016795b81068b017b50851
removes version dependencies
[ { "change_type": "MODIFY", "old_path": "ci/task_helm-admin_kubernikus.yaml", "new_path": "ci/task_helm-admin_kubernikus.yaml", "diff": "@@ -9,7 +9,6 @@ image_resource:\ninputs:\n- name: kubernikus.git\n- - name: version\n- name: secrets.git\nrun:\n@@ -18,7 +17,7 @@ run:\n- -c\n- |\nset -exo pipefail\n- VERSION=$(cat version/version)\n+ VERSION=$(cat kubernikus.git/ref)\nhelm dep up --skip-refresh kubernikus.git/charts/kubernikus/\nhelm upgrade $KUBERNIKUS_NAME kubernikus.git/charts/kubernikus/ --namespace=$KUBERNIKUS_NAME --values secrets.git/admin/values/$KUBERNIKUS_NAME.yaml --set imageTag=$VERSION --install\nkubectl rollout status deployment/kubernikus-api --namespace=$KUBERNIKUS_NAME\n" }, { "change_type": "MODIFY", "old_path": "ci/task_helm_kubernikus.yaml", "new_path": "ci/task_helm_kubernikus.yaml", "diff": "@@ -9,7 +9,6 @@ image_resource:\ninputs:\n- name: kubernikus.git\n- - name: version\n- name: secrets.git\nrun:\n@@ -18,7 +17,7 @@ run:\n- -c\n- |\nset -exo pipefail\n- VERSION=$(cat version/version)\n+ VERSION=$(cat kubernikus.git/ref)\nkubernikusctl auth init\nhelm dep up --skip-refresh kubernikus.git/charts/kubernikus/\nhelm upgrade kubernikus kubernikus.git/charts/kubernikus/ --namespace=kubernikus-system --values secrets.git/$KUBERNIKUS_NAME/values/kubernikus.yaml --set imageTag=$VERSION --install\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
removes version dependencies
596,240
26.10.2017 14:12:10
-7,200
8276597bf8ddaf04e5fb514ba037148ad20c621e
fixes ref path
[ { "change_type": "MODIFY", "old_path": "ci/task_helm-admin_kubernikus.yaml", "new_path": "ci/task_helm-admin_kubernikus.yaml", "diff": "@@ -17,7 +17,7 @@ run:\n- -c\n- |\nset -exo pipefail\n- VERSION=$(cat kubernikus.git/ref)\n+ VERSION=$(cat kubernikus.git/.git/ref)\nhelm dep up --skip-refresh kubernikus.git/charts/kubernikus/\nhelm upgrade $KUBERNIKUS_NAME kubernikus.git/charts/kubernikus/ --namespace=$KUBERNIKUS_NAME --values secrets.git/admin/values/$KUBERNIKUS_NAME.yaml --set imageTag=$VERSION --install\nkubectl rollout status deployment/kubernikus-api --namespace=$KUBERNIKUS_NAME\n" }, { "change_type": "MODIFY", "old_path": "ci/task_helm_kubernikus.yaml", "new_path": "ci/task_helm_kubernikus.yaml", "diff": "@@ -17,7 +17,7 @@ run:\n- -c\n- |\nset -exo pipefail\n- VERSION=$(cat kubernikus.git/ref)\n+ VERSION=$(cat kubernikus.git/.git/ref)\nkubernikusctl auth init\nhelm dep up --skip-refresh kubernikus.git/charts/kubernikus/\nhelm upgrade kubernikus kubernikus.git/charts/kubernikus/ --namespace=kubernikus-system --values secrets.git/$KUBERNIKUS_NAME/values/kubernikus.yaml --set imageTag=$VERSION --install\n" }, { "change_type": "DELETE", "old_path": "ci/task_image_properties.yaml", "new_path": null, "diff": "----\n-platform: 'linux'\n-\n-image_resource:\n- type: docker-image\n- source:\n- repository: alpine\n- tag: '3.6'\n-\n-inputs:\n- - name: image0\n- - name: image1\n-\n-outputs:\n- - name: properties\n-\n-params:\n- image0: IMAGE0\n- image1: IMAGE1\n-\n-run:\n- path: /bin/sh\n- args:\n- - -c\n- - |\n- set -exo pipefail\n- cat >\"properties/properties.json\" <<EOF\n- {\n- \"${image0}_REPOSITORY\": \"$(cat image0/repository 2>/dev/null|| true)\",\n- \"${image1}_REPOSITORY\": \"$(cat image1/repository 2>/dev/null|| true)\",\n- \"${image0}_TAG\": \"$(cat image0/tag 2>/dev/null|| true)\",\n- \"${image1}_TAG\": \"$(cat image1/tag 2>/dev/null|| true)\",\n- \"${image0}_DIGEST\": \"$(cat image0/digest 2>/dev/null|| true)\",\n- \"${image1}_DIGEST\": \"$(cat image1/digest 2>/dev/null|| true)\"\n- }\n- EOF\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes ref path
596,240
26.10.2017 14:45:32
-7,200
b6c03619ec63fc82231fceae922a872c52a53bab
fixed api gateway timeouts
[ { "change_type": "MODIFY", "old_path": "charts/kubernikus/templates/api.yaml", "new_path": "charts/kubernikus/templates/api.yaml", "diff": "@@ -15,6 +15,9 @@ spec:\napp: kubernikus\ntype: api\nspec:\n+ strategy:\n+ rollingUpdate:\n+ maxSurge: 1\ncontainers:\n- name: api\nimage: \"{{ .Values.image }}:{{ .Values.imageTag }}\"\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixed api gateway timeouts
596,240
26.10.2017 14:54:29
-7,200
88ee2b1a42a2d6c70477609980d04b7df6a0aea6
moves strategy into deployment spec
[ { "change_type": "MODIFY", "old_path": "charts/kubernikus/templates/api.yaml", "new_path": "charts/kubernikus/templates/api.yaml", "diff": "@@ -8,6 +8,9 @@ metadata:\ntype: api\nspec:\n+ strategy:\n+ rollingUpdate:\n+ maxSurge: 1\nrevisionHistoryLimit: {{ .Values.revisionHistoryLimit }}\ntemplate:\nmetadata:\n@@ -15,9 +18,6 @@ spec:\napp: kubernikus\ntype: api\nspec:\n- strategy:\n- rollingUpdate:\n- maxSurge: 1\ncontainers:\n- name: api\nimage: \"{{ .Values.image }}:{{ .Values.imageTag }}\"\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
moves strategy into deployment spec
596,240
26.10.2017 15:42:53
-7,200
e892afc5ab6898c957de28f2677919aeca42f824
relative baseUrl for relative links
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/config.toml", "new_path": "contrib/kubernikus-docs-builder/data/config.toml", "diff": "-baseurl = \"/docs\"\n+baseURL = \"docs\"\nlanguageCode = \"en-us\"\ntitle = \"Kubernikus\"\ntheme = \"hugo-material-docs\"\nmetadataformat = \"yaml\"\n-canonifyurls = true\n+canonifyurls = false\ngoogleAnalytics = \"\"\n-\n[params]\n# Repository\nprovider = \"GitHub\"\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
relative baseUrl for relative links
596,240
26.10.2017 16:02:32
-7,200
35d3d9304c075c446264c24b37bbd253bafa7696
canonifies urls after all
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/config.toml", "new_path": "contrib/kubernikus-docs-builder/data/config.toml", "diff": "@@ -3,7 +3,7 @@ languageCode = \"en-us\"\ntitle = \"Kubernikus\"\ntheme = \"hugo-material-docs\"\nmetadataformat = \"yaml\"\n-canonifyurls = false\n+canonifyurls = true\ngoogleAnalytics = \"\"\n[params]\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/homepage.css", "new_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/homepage.css", "diff": "}\n.saplogo {\n- background: url(\"/images/sapcc.png\") no-repeat;\n+ background: url(\"images/sapcc.png\") no-repeat;\nheight: 50px;\nwidth: 100%;\nposition: relative;\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
canonifies urls after all
596,240
26.10.2017 16:23:48
-7,200
3f52dcf20f4d1f378cc1f17a8bd550024726b605
redirects to /docs when text/html to api-info otherwise
[ { "change_type": "MODIFY", "old_path": "pkg/api/handlers/root.go", "new_path": "pkg/api/handlers/root.go", "diff": "package handlers\n-import \"net/http\"\n+import (\n+ \"net/http\"\n+ \"strings\"\n+)\nvar RootContent = `{\n\"paths\": [\n@@ -16,6 +19,13 @@ var RootContent = `{\nfunc RootHandler(next http.Handler) http.Handler {\nreturn http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {\nif r.URL.Path == \"/\" {\n+ for _, accept := range strings.Split(r.Header.Get(\"Accept\"), \",\") {\n+ switch strings.TrimSpace(accept) {\n+ case \"text/html\":\n+ http.Redirect(rw, r, \"/docs\", 301)\n+ return\n+ }\n+ }\nrw.Write([]byte(RootContent))\n} else {\nnext.ServeHTTP(rw, r)\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
redirects to /docs when text/html to api-info otherwise
596,240
26.10.2017 16:24:02
-7,200
f78a7fc360cec9d54571a75d0d413aef5835e2c2
uses url functions to generate relative links
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "diff": "<span>Managed Kubernetes Clusters</span>\n</div>\n</div>\n- <img src=\"images/logo.png\" class=\"promologo\" />\n+ <img src=\"{{ \"images/logo.png\" | relURL }}\" class=\"promologo\" />\n<article class=\"article\">\n<div class=\"wrapper\">\n{{ .Content }}\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/homepage.css", "new_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/homepage.css", "diff": "}\n.saplogo {\n- background: url(\"images/sapcc.png\") no-repeat;\n+ background: url(\"{{ \"images/sapcc.png\" | relURL }}\") no-repeat;\nheight: 50px;\nwidth: 100%;\nposition: relative;\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
uses url functions to generate relative links
596,240
26.10.2017 16:42:54
-7,200
d5b48a7254c70317ed0075411b424e4905fb22fa
i have no idea what i'm doing \o/
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/config.toml", "new_path": "contrib/kubernikus-docs-builder/data/config.toml", "diff": "-baseURL = \"docs\"\n+baseURL = \"/docs\"\nlanguageCode = \"en-us\"\ntitle = \"Kubernikus\"\ntheme = \"hugo-material-docs\"\nmetadataformat = \"yaml\"\n-canonifyurls = true\n+canonifyurls = false\ngoogleAnalytics = \"\"\n[params]\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
i have no idea what i'm doing \o/
596,240
26.10.2017 17:47:16
-7,200
6fc009fd41ca849fb547f4e858f4095eedc50ae0
fixes relative entry link into docs
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "diff": "<div class=\"sapbanner\"></div>\n<div class=\"saplogo\"></div>\n<div class=\"saplinks\">\n- <div><a href=\"/user\">docs</a></div>\n+ <div><a href=\"{{ \"user\" | relURL }}\">Docs</a></div>\n{{ with .Site.Social.github }}\n<div class=\"button button-github\" role=\"button\" aria-label=\"GitHub\">\n<a href=\"https://github.com/{{ . }}\" title=\"@{{ . }} on GitHub\" target=\"_blank\" class=\"toggle-button icon icon-github\"></a>\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes relative entry link into docs
596,240
26.10.2017 18:06:19
-7,200
7ecdf39f54a2b8bbb0229c14e3220c8cecf778ac
fixes relative link in css
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/homepage.css", "new_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/homepage.css", "diff": "}\n.saplogo {\n- background: url(\"{{ \"images/sapcc.png\" | relURL }}\") no-repeat;\n+ background: url(\"docs/images/sapcc.png\") no-repeat;\nheight: 50px;\nwidth: 100%;\nposition: relative;\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes relative link in css
596,240
26.10.2017 18:08:18
-7,200
cbd7fc3480a1cddc6f2b5c3e763d768b3400c43c
triggers staging builds. fixes path parameters
[ { "change_type": "MODIFY", "old_path": "ci/pipeline.yaml", "new_path": "ci/pipeline.yaml", "diff": "@@ -19,6 +19,7 @@ resources:\naccess_token: ((github-com-access-token))\nbranch: master\ndepth: 1\n+ ignore_paths: [\"charts\", \"ci\"]\n- name: charts.git\ntype: git\n@@ -28,7 +29,6 @@ resources:\nuri: https://github.com/sapcc/kubernikus.git\nbranch: master\ndepth: 1\n- params:\npaths: [\"charts\"]\n- name: pipeline.git\n@@ -39,7 +39,6 @@ resources:\nuri: https://github.com/sapcc/kubernikus.git\nbranch: master\ndepth: 1\n- params:\npaths: [\"ci\"]\n- name: secrets.git\n@@ -103,6 +102,7 @@ jobs:\n- get: secrets.git\n- get: pipeline.git\n- get: kubernikus.builds\n+ trigger: true\n- task: deploy\nfile: pipeline.git/ci/task_helm_kubernikus.yaml\nparams:\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
triggers staging builds. fixes path parameters
596,240
26.10.2017 18:17:51
-7,200
b8cf9df08f5222cf878c65f946cc688eeb76202b
adds missing slack notification hooks
[ { "change_type": "MODIFY", "old_path": "ci/pipeline.yaml", "new_path": "ci/pipeline.yaml", "diff": "@@ -175,6 +175,8 @@ jobs:\nREGION: admin\nKUBERNIKUS_NAME: k-staging\nGITHUB_TOKEN: ((github-access-token))\n+ on_failure:\n+ <<: *post_failure_to_slack\n- name: rollout_admin\nserial: true\n@@ -225,6 +227,8 @@ jobs:\nOS_PROJECT_DOMAIN_NAME: ccadmin\nKUBERNIKUS_NAME: k-staging\nKUBERNIKUS_URL: https://k-staging.admin.cloud.sap\n+ on_failure:\n+ <<: *post_failure_to_slack\n- name: rollout_kubernikus-system\nserial: true\n@@ -252,3 +256,5 @@ jobs:\nOS_PROJECT_DOMAIN_NAME: ccadmin\nKUBERNIKUS_NAME: k-eu-nl-1\nKUBERNIKUS_URL: https://k-eu-nl-1.admin.cloud.sap\n+ on_failure:\n+ <<: *post_failure_to_slack\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds missing slack notification hooks
596,240
26.10.2017 21:24:58
-7,200
660ebb0c01c4aa31bce27f82a8824bd0901a112f
deploys gh-pages
[ { "change_type": "MODIFY", "old_path": ".travis.yml", "new_path": ".travis.yml", "diff": "@@ -13,7 +13,7 @@ before_script:\n- sudo apt-get -y -o Dpkg::Options::=\"--force-confnew\" install docker-ce\nscript:\n- - make pull build\n+ - make pull build docs\nafter_success:\n- if [ \"$TRAVIS_BRANCH\" == \"master\" ]; then\n@@ -25,3 +25,11 @@ notifications:\nslack:\nrooms:\nsecure: $SLACK_KUBERNIKUS\n+\n+deploy:\n+ provider: pages\n+ skip_cleanup: true\n+ github_token: $GITHUB_TOKEN\n+ local_dir: gh-pages\n+ on:\n+ branch: master\n" }, { "change_type": "MODIFY", "old_path": "Makefile", "new_path": "Makefile", "diff": "@@ -51,6 +51,11 @@ push:\ndocker push sapcc/kubernikus-kubectl:$(VERSION)\ndocker push sapcc/kubernikus-kubectl:latest\n+gh-pages:\n+ docker run --name gh-pages sapcc/kubernikus-docs:$(VERSION) /bin/true\n+ docker cp gh-pages:/public gh-pages\n+ docker rm gh-pages\n+\npkg/api/rest/operations/kubernikus_api.go: swagger.yml\nifndef HAS_SWAGGER\n$(error You need to have go-swagger installed. Run make bootstrap to fix.)\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
deploys gh-pages
596,240
26.10.2017 21:25:28
-7,200
44c37b17c42bb8ab3d41cef0eb8aa54536bbf8a7
uses correct target for gh-pages
[ { "change_type": "MODIFY", "old_path": ".travis.yml", "new_path": ".travis.yml", "diff": "@@ -13,7 +13,7 @@ before_script:\n- sudo apt-get -y -o Dpkg::Options::=\"--force-confnew\" install docker-ce\nscript:\n- - make pull build docs\n+ - make pull build gh-pages\nafter_success:\n- if [ \"$TRAVIS_BRANCH\" == \"master\" ]; then\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
uses correct target for gh-pages
596,240
27.10.2017 09:19:13
-7,200
703beefb3d6f4798e210e5c84df57abe2a038dfb
uses relative urls for gh-pages and self-hosted demo at different baseurls
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/config.toml", "new_path": "contrib/kubernikus-docs-builder/data/config.toml", "diff": "-baseURL = \"/docs\"\n+baseURL = \"\"\nlanguageCode = \"en-us\"\ntitle = \"Kubernikus\"\ntheme = \"hugo-material-docs\"\nmetadataformat = \"yaml\"\ncanonifyurls = false\ngoogleAnalytics = \"\"\n+relativeurls = true\n[params]\n# Repository\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
uses relative urls for gh-pages and self-hosted demo at different baseurls
596,240
27.10.2017 09:38:42
-7,200
f81248b510ad448150b1750db21f9367283cf891
next try for dual base urls
[ { "change_type": "MODIFY", "old_path": "Makefile", "new_path": "Makefile", "diff": "@@ -53,7 +53,7 @@ push:\ngh-pages:\ndocker run --name gh-pages sapcc/kubernikus-docs:$(VERSION) /bin/true\n- docker cp gh-pages:/public gh-pages\n+ docker cp gh-pages:/public/kubernikus gh-pages\ndocker rm gh-pages\npkg/api/rest/operations/kubernikus_api.go: swagger.yml\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/Dockerfile", "new_path": "contrib/kubernikus-docs-builder/Dockerfile", "diff": "@@ -8,5 +8,6 @@ RUN tar xvf hugo.tar.gz hugo -C /usr/local/bin\nCOPY data /\nONBUILD COPY docs /content\n-ONBUILD RUN hugo --debug\n+ONBUILD RUN hugo --baseURL \"/docs\" --destination /public/docs\n+ONBUILD RUN hugo --baseURL \"/kubernikus\" --destination /public/kubernikus\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/config.toml", "new_path": "contrib/kubernikus-docs-builder/data/config.toml", "diff": "@@ -5,7 +5,6 @@ theme = \"hugo-material-docs\"\nmetadataformat = \"yaml\"\ncanonifyurls = false\ngoogleAnalytics = \"\"\n-relativeurls = true\n[params]\n# Repository\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
next try for dual base urls
596,240
27.10.2017 09:50:25
-7,200
eaca09bc8bf28f12bc47684e944227c4603cd4d6
adds inital docs dev docs
[ { "change_type": "ADD", "old_path": null, "new_path": "docs/dev/documentation.md", "diff": "+## Editting Self-Hosted Docs\n+\n+The self-hosted documentation served by the apiserver is generated using Hugo.\n+\n+It constists of 2 parts:\n+\n+ * Hugo Theme in `contrib/kubernikus-docs-builder/data`\n+ * Markdown docs in `docs`\n+\n+A live preview for development can be started with:\n+\n+```\n+docker run --rm -ti -p 1313:1313 -v $PWD/contrib/kubernikus-docs-builder/data:/data -v $PWD/docs/:/data/content sapcc/kubernikus-docs:latest hugo server --bind 0.0.0.0\n+```\n+\n+The docs are then accessible locally on http://localhost:1313\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds inital docs dev docs
596,240
27.10.2017 09:51:52
-7,200
12f7e9aaa707a18cb5212c07b3abc5f4fd8a529c
copies only relevant docs
[ { "change_type": "MODIFY", "old_path": "Dockerfile", "new_path": "Dockerfile", "diff": "@@ -12,6 +12,6 @@ RUN curl -Lo /bin/dumb-init https://github.com/Yelp/dumb-init/releases/download/\nCOPY charts/ /etc/kubernikus/charts\nCOPY --from=kubernikus-binaries /apiserver /kubernikus /wormhole /usr/local/bin/\nCOPY --from=kubernikus-binaries /kubernikusctl /static/binaries/linux/amd64/kubernikusctl\n-COPY --from=kubernikus-docs /public /static/docs\n+COPY --from=kubernikus-docs /public/docs /static/docs\nENTRYPOINT [\"dumb-init\", \"--\"]\nCMD [\"apiserver\"]\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
copies only relevant docs
596,230
27.10.2017 14:22:51
-7,200
25f46d41da32a16650fa2436cde10b6bdb5de60c
implements create cluster in kubernikusctl
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/common/kubernikus.go", "new_path": "pkg/cmd/kubernikusctl/common/kubernikus.go", "diff": "@@ -56,6 +56,19 @@ func (k *KubernikusClient) GetCredentials(name string) (string, error) {\nreturn ok.Payload.Kubeconfig, nil\n}\n+func (k *KubernikusClient) CreateCluster(cluster *models.Cluster) error {\n+ params := operations.NewCreateClusterParams().WithBody(cluster)\n+ _, err := k.client.Operations.CreateCluster(params, k.authFunc())\n+ switch err.(type) {\n+ case *operations.CreateClusterDefault:\n+ result := err.(*operations.CreateClusterDefault)\n+ return errors.Errorf(*result.Payload.Message)\n+ case error:\n+ return errors.Wrap(err, \"Error creating cluster\")\n+ }\n+ return nil\n+}\n+\nfunc (k *KubernikusClient) ShowCluster(name string) (*models.Cluster, error) {\nparams := operations.NewShowClusterParams()\nparams.Name = name\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/cmd/kubernikusctl/create.go", "diff": "+package kubernikusctl\n+\n+import (\n+ \"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/common\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/create\"\n+ \"github.com/spf13/cobra\"\n+)\n+\n+func createRun(c *cobra.Command, args []string) {\n+ c.Help()\n+}\n+\n+func NewCreateCommand() *cobra.Command {\n+ o := create.CreateOptions{\n+ Openstack: common.NewOpenstackClient(),\n+ }\n+\n+ c := &cobra.Command{\n+ Use: \"create [object]\",\n+ Short: \"Creates an object from a given spec\",\n+ PersistentPreRun: o.PersistentPreRun,\n+ Run: createRun,\n+ }\n+ o.Openstack.BindFlags(c.PersistentFlags())\n+ cluster := create.NewClusterCommand(o)\n+ c.AddCommand(cluster)\n+ return c\n+}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/cmd/kubernikusctl/create/cluster.go", "diff": "+package create\n+\n+import (\n+ \"io/ioutil\"\n+ \"os\"\n+\n+ \"github.com/golang/glog\"\n+ \"github.com/pkg/errors\"\n+ \"github.com/spf13/cobra\"\n+\n+ \"github.com/sapcc/kubernikus/pkg/client/models\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd\"\n+)\n+\n+func NewClusterCommand(o CreateOptions) *cobra.Command {\n+ c := &cobra.Command{\n+ Use: \"cluster [name]\",\n+ Short: \"Creates a cluster defined in a spec expected at stdin\",\n+ Aliases: []string{\"clusters\"},\n+ PreRun: o.clusterPreRun,\n+ Run: o.clusterRun,\n+ }\n+ c.PersistentFlags().StringVarP(&o.ReadFile, \"file\", \"f\", \"\", \"File to read spec from\")\n+ return c\n+}\n+\n+func (o *CreateOptions) clusterPreRun(c *cobra.Command, args []string) {\n+ cmd.CheckError(validateClusterCommandArgs(args))\n+ cmd.CheckError(o.SetupKubernikusClient())\n+}\n+\n+func (o *CreateOptions) clusterRun(c *cobra.Command, args []string) {\n+ var raw []byte\n+ var err error\n+ glog.V(2).Infof(\"ReadFile: %v\", o.ReadFile)\n+ if o.ReadFile != \"\" {\n+ raw, err = ioutil.ReadFile(o.ReadFile)\n+ if err != nil {\n+ glog.V(2).Infof(\"error reading spec file: %v\", err)\n+ cmd.CheckError(errors.Wrap(err, \"Error reading from spec file\"))\n+ }\n+ } else {\n+ raw, err = ioutil.ReadAll(os.Stdin)\n+ if err != nil {\n+ glog.V(2).Infof(\"error reading from stdin: %v\", err)\n+ cmd.CheckError(errors.Wrap(err, \"Error reading from Stdin\"))\n+ }\n+ }\n+ glog.V(2).Infof(\"Raw read: \\n%v\", string(raw))\n+ var cluster models.Cluster\n+ cmd.CheckError(cluster.UnmarshalBinary(raw))\n+ glog.V(2).Infof(\"cluster: %v\", cluster)\n+ cmd.CheckError(o.Kubernikus.CreateCluster(&cluster))\n+}\n+\n+func validateClusterCommandArgs(args []string) error {\n+ if len(args) != 0 {\n+ return errors.Errorf(\"Unexpected Argument to cluster: %v\", args)\n+ }\n+ return nil\n+}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/cmd/kubernikusctl/create/common.go", "diff": "+package create\n+\n+import (\n+ \"fmt\"\n+ \"net/url\"\n+\n+ \"github.com/golang/glog\"\n+ \"github.com/pkg/errors\"\n+ \"github.com/spf13/cobra\"\n+\n+ \"github.com/sapcc/kubernikus/pkg/cmd\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/common\"\n+)\n+\n+type CreateOptions struct {\n+ _url string\n+ url *url.URL\n+ Openstack *common.OpenstackClient\n+ Kubernikus *common.KubernikusClient\n+ ReadFile string\n+}\n+\n+func (o *CreateOptions) PersistentPreRun(c *cobra.Command, args []string) {\n+ cmd.CheckError(o.Openstack.Validate(c, args))\n+ cmd.CheckError(o.Openstack.Setup())\n+ cmd.CheckError(o.Openstack.Authenticate())\n+}\n+\n+func (o *CreateOptions) SetupKubernikusClient() error {\n+ var err error\n+ if o._url == \"\" {\n+ fmt.Println(\"Auto-Detecting Kubernikus Host ...\")\n+ if o.url, err = o.Openstack.DefaultKubernikusURL(); err != nil {\n+ glog.V(2).Infof(\"Error detecting kubernikus host: %+v\", err)\n+ return errors.Errorf(\"You need to provide --url. Auto-Detection failed.\")\n+ }\n+ }\n+ glog.V(2).Infof(\"Setting up kubernikus client at %v.\", o.url)\n+ o.Kubernikus = common.NewKubernikusClient(o.url, o.Openstack.Provider.TokenID)\n+ return nil\n+}\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/kubernikusctl.go", "new_path": "pkg/cmd/kubernikusctl/kubernikusctl.go", "diff": "@@ -16,6 +16,7 @@ func NewCommand(name string) *cobra.Command {\nc.AddCommand(\nNewAuthCommand(),\nNewGetCommand(),\n+ NewCreateCommand(),\n)\nc.PersistentFlags().AddGoFlagSet(flag.CommandLine)\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- implements create cluster in kubernikusctl
596,230
27.10.2017 15:59:51
-7,200
56543b4d61b4946151c7ac51bc3b1f2652ed7dc4
implements kubernikusctl delete cluster
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/common/kubernikus.go", "new_path": "pkg/cmd/kubernikusctl/common/kubernikus.go", "diff": "@@ -69,6 +69,19 @@ func (k *KubernikusClient) CreateCluster(cluster *models.Cluster) error {\nreturn nil\n}\n+func (k *KubernikusClient) DeleteCluster(name string) error {\n+ params := operations.NewTerminateClusterParams().WithName(name)\n+ _, err := k.client.Operations.TerminateCluster(params, k.authFunc())\n+ switch err.(type) {\n+ case *operations.TerminateClusterDefault:\n+ result := err.(*operations.TerminateClusterDefault)\n+ return errors.Errorf(*result.Payload.Message)\n+ case error:\n+ return errors.Wrap(err, \"Error deleting cluster\")\n+ }\n+ return nil\n+}\n+\nfunc (k *KubernikusClient) ShowCluster(name string) (*models.Cluster, error) {\nparams := operations.NewShowClusterParams()\nparams.Name = name\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/create/cluster.go", "new_path": "pkg/cmd/kubernikusctl/create/cluster.go", "diff": "package create\nimport (\n+ \"fmt\"\n\"io/ioutil\"\n\"os\"\n@@ -14,7 +15,7 @@ import (\nfunc NewClusterCommand(o CreateOptions) *cobra.Command {\nc := &cobra.Command{\n- Use: \"cluster [name]\",\n+ Use: \"cluster\",\nShort: \"Creates a cluster defined in a spec expected at stdin\",\nAliases: []string{\"clusters\"},\nPreRun: o.clusterPreRun,\n@@ -51,6 +52,7 @@ func (o *CreateOptions) clusterRun(c *cobra.Command, args []string) {\ncmd.CheckError(cluster.UnmarshalBinary(raw))\nglog.V(2).Infof(\"cluster: %v\", cluster)\ncmd.CheckError(o.Kubernikus.CreateCluster(&cluster))\n+ fmt.Printf(\"Cluster %v created.\", *cluster.Name)\n}\nfunc validateClusterCommandArgs(args []string) error {\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/cmd/kubernikusctl/delete.go", "diff": "+package kubernikusctl\n+\n+import (\n+ \"github.com/spf13/cobra\"\n+\n+ \"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/common\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/delete\"\n+)\n+\n+func deleteRun(c *cobra.Command, args []string) {\n+ c.Help()\n+}\n+\n+func NewDeleteCommand() *cobra.Command {\n+ o := delete.DeleteOptions{\n+ Openstack: common.NewOpenstackClient(),\n+ }\n+\n+ c := &cobra.Command{\n+ Use: \"delete [object]\",\n+ Short: \"Deletes an object\",\n+ PersistentPreRun: o.PersistentPreRun,\n+ Run: deleteRun,\n+ }\n+ o.Openstack.BindFlags(c.PersistentFlags())\n+ cluster := delete.NewClusterCommand(o)\n+ c.AddCommand(cluster)\n+ return c\n+}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/cmd/kubernikusctl/delete/cluster.go", "diff": "+package delete\n+\n+import (\n+ \"fmt\"\n+\n+ \"github.com/pkg/errors\"\n+ \"github.com/spf13/cobra\"\n+\n+ \"github.com/sapcc/kubernikus/pkg/cmd\"\n+)\n+\n+func NewClusterCommand(o DeleteOptions) *cobra.Command {\n+ c := &cobra.Command{\n+ Use: \"cluster [name]\",\n+ Short: \"Deletes the cluster with the given name\",\n+ Aliases: []string{\"clusters\"},\n+ PreRun: o.clusterPreRun,\n+ Run: o.clusterRun,\n+ }\n+\n+ return c\n+}\n+\n+func (o *DeleteOptions) clusterPreRun(c *cobra.Command, args []string) {\n+ cmd.CheckError(validateClusterCommandArgs(args))\n+ cmd.CheckError(o.SetupKubernikusClient())\n+}\n+\n+func (o *DeleteOptions) clusterRun(c *cobra.Command, args []string) {\n+ cmd.CheckError(o.Kubernikus.DeleteCluster(args[0]))\n+ fmt.Printf(\"Cluster %v scheduled for deletion.\", args[0])\n+}\n+\n+func validateClusterCommandArgs(args []string) error {\n+ if len(args) > 1 {\n+ return errors.Errorf(\"Surplus arguments to cluster delete.\")\n+ }\n+ if len(args) < 1 {\n+ return errors.Errorf(\"Please supply the name of the cluster to be deleted.\")\n+ }\n+ return nil\n+}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/cmd/kubernikusctl/delete/common.go", "diff": "+package delete\n+\n+import (\n+ \"fmt\"\n+ \"net/url\"\n+\n+ \"github.com/golang/glog\"\n+ \"github.com/pkg/errors\"\n+ \"github.com/spf13/cobra\"\n+\n+ \"github.com/sapcc/kubernikus/pkg/cmd\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/common\"\n+)\n+\n+type DeleteOptions struct {\n+ _url string\n+ url *url.URL\n+ Openstack *common.OpenstackClient\n+ Kubernikus *common.KubernikusClient\n+}\n+\n+func (o *DeleteOptions) PersistentPreRun(c *cobra.Command, args []string) {\n+ cmd.CheckError(o.Openstack.Validate(c, args))\n+ cmd.CheckError(o.Openstack.Setup())\n+ cmd.CheckError(o.Openstack.Authenticate())\n+}\n+\n+func (o *DeleteOptions) SetupKubernikusClient() error {\n+ var err error\n+ if o._url == \"\" {\n+ fmt.Println(\"Auto-Detecting Kubernikus Host ...\")\n+ if o.url, err = o.Openstack.DefaultKubernikusURL(); err != nil {\n+ glog.V(2).Infof(\"Error detecting kubernikus host: %+v\", err)\n+ return errors.Errorf(\"You need to provide --url. Auto-Detection failed.\")\n+ }\n+ }\n+ glog.V(2).Infof(\"Setting up kubernikus client at %v.\", o.url)\n+ o.Kubernikus = common.NewKubernikusClient(o.url, o.Openstack.Provider.TokenID)\n+ return nil\n+}\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/kubernikusctl.go", "new_path": "pkg/cmd/kubernikusctl/kubernikusctl.go", "diff": "@@ -17,6 +17,7 @@ func NewCommand(name string) *cobra.Command {\nNewAuthCommand(),\nNewGetCommand(),\nNewCreateCommand(),\n+ NewDeleteCommand(),\n)\nc.PersistentFlags().AddGoFlagSet(flag.CommandLine)\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- implements kubernikusctl delete cluster
596,237
01.11.2017 17:18:42
-3,600
886f50dcd3ae44383c8bf5fde65f6ac17d344728
kubernikus logo svg
[ { "change_type": "ADD", "old_path": null, "new_path": "assets/kubernikus.svg", "diff": "+<svg xmlns=\"http://www.w3.org/2000/svg\" width=\"150.4\" height=\"168.5\" viewBox=\"0 0 150.4 168.5\"><path fill=\"#B8DBFB\" d=\"M74.8 165.1L3 129.3l.2-89.6 71.6 36.6\"/><path fill=\"#CCE5FC\" d=\"M74.8 165.1l72.3-36.3.1-89.1-72.4 36.5\"/><path fill=\"#DDEEFD\" d=\"M147.2 39.7L74.8 76.2 3.2 39.7l72-36.4\"/><path fill=\"none\" stroke=\"#484848\" stroke-width=\"3\" d=\"M75 1.7l73.9 36.8-.2 91-74.1 37.3-73.1-36.6.2-91.4z\"/><g opacity=\".8\"><path fill=\"#94C9F9\" d=\"M75 118l-33.2-16.6.1-41.4L75 77\"/><path fill=\"#ADD5FA\" d=\"M75 118l33.4-16.8.1-41.2L75 76.9\"/><path fill=\"#C5E2FB\" d=\"M108.5 60L75 76.9 41.9 60l33.3-16.8\"/><path opacity=\".93\" fill=\"none\" stroke=\"#484848\" stroke-width=\"2\" d=\"M75.1 42.5l34.1 17.1-.1 42.1-34.2 17.1-33.8-16.9.1-42.3z\"/></g></svg>\n\\ No newline at end of file\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
kubernikus logo svg
596,230
27.10.2017 16:25:33
-7,200
01ece52af657f07b1691d3f52e013e92d5fbd44d
prevent deletion of kluster as long as nodepools are present
[ { "change_type": "MODIFY", "old_path": "pkg/api/handlers/terminate_cluster.go", "new_path": "pkg/api/handlers/terminate_cluster.go", "diff": "@@ -8,6 +8,7 @@ import (\n\"github.com/sapcc/kubernikus/pkg/apis/kubernikus/v1\"\napierrors \"k8s.io/apimachinery/pkg/api/errors\"\n+ metav1 \"k8s.io/apimachinery/pkg/apis/meta/v1\"\n)\nfunc NewTerminateCluster(rt *api.Runtime) operations.TerminateClusterHandler {\n@@ -20,7 +21,18 @@ type terminateCluster struct {\nfunc (d *terminateCluster) Handle(params operations.TerminateClusterParams, principal *models.Principal) middleware.Responder {\n- _, err := editCluster(d.Kubernikus.Kubernikus().Klusters(d.Namespace), principal, params.Name, func(kluster *v1.Kluster) {\n+ k, err := d.Kubernikus.Kubernikus().Klusters(d.Namespace).Get(qualifiedName(params.Name, principal.Account), metav1.GetOptions{})\n+ if err != nil {\n+ if apierrors.IsNotFound(err) {\n+ return NewErrorResponse(&operations.TerminateClusterDefault{}, 404, \"Not found\")\n+ }\n+ return NewErrorResponse(&operations.TerminateClusterDefault{}, 500, err.Error())\n+ }\n+ if k.Status.NodePools != nil && len(k.Status.NodePools) > 0 {\n+ return NewErrorResponse(&operations.TerminateClusterDefault{}, 409, \"Cluster still has NodePools\")\n+ }\n+\n+ _, err = editCluster(d.Kubernikus.Kubernikus().Klusters(d.Namespace), principal, params.Name, func(kluster *v1.Kluster) {\nkluster.Status.Kluster.State = v1.KlusterTerminating\nkluster.Status.Kluster.Message = \"Cluster terminating\"\n})\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- prevent deletion of kluster as long as nodepools are present
596,230
02.11.2017 12:50:42
-3,600
da1ed09d1a46c34a90dd7221755a6913592c8747
refactor into temp variable
[ { "change_type": "MODIFY", "old_path": "pkg/api/handlers/terminate_cluster.go", "new_path": "pkg/api/handlers/terminate_cluster.go", "diff": "@@ -21,7 +21,8 @@ type terminateCluster struct {\nfunc (d *terminateCluster) Handle(params operations.TerminateClusterParams, principal *models.Principal) middleware.Responder {\n- k, err := d.Kubernikus.Kubernikus().Klusters(d.Namespace).Get(qualifiedName(params.Name, principal.Account), metav1.GetOptions{})\n+ kluster := d.Kubernikus.Kubernikus().Klusters(d.Namespace)\n+ k, err := kluster.Get(qualifiedName(params.Name, principal.Account), metav1.GetOptions{})\nif err != nil {\nif apierrors.IsNotFound(err) {\nreturn NewErrorResponse(&operations.TerminateClusterDefault{}, 404, \"Not found\")\n@@ -32,7 +33,7 @@ func (d *terminateCluster) Handle(params operations.TerminateClusterParams, prin\nreturn NewErrorResponse(&operations.TerminateClusterDefault{}, 409, \"Cluster still has NodePools\")\n}\n- _, err = editCluster(d.Kubernikus.Kubernikus().Klusters(d.Namespace), principal, params.Name, func(kluster *v1.Kluster) {\n+ _, err = editCluster(kluster, principal, params.Name, func(kluster *v1.Kluster) {\nkluster.Status.Kluster.State = v1.KlusterTerminating\nkluster.Status.Kluster.Message = \"Cluster terminating\"\n})\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- refactor into temp variable
596,230
02.11.2017 16:15:37
-3,600
50cd40e4009b275b8d6f35a0faea030dafeed0f9
remove double check for not found
[ { "change_type": "MODIFY", "old_path": "pkg/api/handlers/terminate_cluster.go", "new_path": "pkg/api/handlers/terminate_cluster.go", "diff": "@@ -38,11 +38,7 @@ func (d *terminateCluster) Handle(params operations.TerminateClusterParams, prin\nkluster.Status.Kluster.Message = \"Cluster terminating\"\n})\nif err != nil {\n- if apierrors.IsNotFound(err) {\n- return NewErrorResponse(&operations.TerminateClusterDefault{}, 404, \"Not found\")\n- }\nreturn NewErrorResponse(&operations.TerminateClusterDefault{}, 500, err.Error())\n-\n}\nreturn operations.NewTerminateClusterAccepted()\n}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- remove double check for not found
596,230
03.11.2017 11:12:31
-3,600
258ba89ad3268b57f5a07a6d5dee4f918cd8dcb0
do not test on nodepools but on their size instead
[ { "change_type": "MODIFY", "old_path": "pkg/api/handlers/terminate_cluster.go", "new_path": "pkg/api/handlers/terminate_cluster.go", "diff": "@@ -30,7 +30,11 @@ func (d *terminateCluster) Handle(params operations.TerminateClusterParams, prin\nreturn NewErrorResponse(&operations.TerminateClusterDefault{}, 500, err.Error())\n}\nif k.Status.NodePools != nil && len(k.Status.NodePools) > 0 {\n- return NewErrorResponse(&operations.TerminateClusterDefault{}, 409, \"Cluster still has NodePools\")\n+ for _, nodepoolinfo := range k.Status.NodePools {\n+ if nodepoolinfo.Size > 0 {\n+ return NewErrorResponse(&operations.TerminateClusterDefault{}, 409, \"Cluster still has Nodes in a Pool\")\n+ }\n+ }\n}\n_, err = editCluster(kluster, principal, params.Name, func(kluster *v1.Kluster) {\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- do not test on nodepools but on their size instead
596,230
03.11.2017 15:12:57
-3,600
2368f1b1a1a76b1f435f9ea90e0d36303f43b6c5
not size but running
[ { "change_type": "MODIFY", "old_path": "pkg/api/handlers/terminate_cluster.go", "new_path": "pkg/api/handlers/terminate_cluster.go", "diff": "@@ -31,7 +31,7 @@ func (d *terminateCluster) Handle(params operations.TerminateClusterParams, prin\n}\nif k.Status.NodePools != nil && len(k.Status.NodePools) > 0 {\nfor _, nodepoolinfo := range k.Status.NodePools {\n- if nodepoolinfo.Size > 0 {\n+ if nodepoolinfo.Running > 0 {\nreturn NewErrorResponse(&operations.TerminateClusterDefault{}, 409, \"Cluster still has Nodes in a Pool\")\n}\n}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- not size but running
596,230
06.11.2017 11:23:51
-3,600
dedd0800d800c6387fbeb23f401ba8733f1e8796
add node pool status to human readable form of cluster print
[ { "change_type": "MODIFY", "old_path": "pkg/client/models/cluster_print.go", "new_path": "pkg/client/models/cluster_print.go", "diff": "@@ -34,6 +34,23 @@ func (c *Cluster) printHuman(options printers.PrintOptions) {\nfor _, pool := range (*c).Spec.NodePools {\npool.print()\n}\n+ fmt.Println(\"Cluster node pool status: \")\n+ for _, pool := range (*c).Status.NodePools {\n+ pool.print()\n+ }\n+}\n+\n+func (p *ClusterStatusNodePoolsItems0) print() {\n+ fmt.Print(\"Name: \")\n+ fmt.Println(*p.Name)\n+ fmt.Print(\" Size: \\t\")\n+ fmt.Println(*p.Size)\n+ fmt.Print(\" Running: \\t\")\n+ fmt.Println(*p.Running)\n+ fmt.Print(\" Schedulable: \\t\")\n+ fmt.Println(*p.Schedulable)\n+ fmt.Print(\" Healthy: \\t\")\n+ fmt.Println(*p.Healthy)\n}\nfunc (p *ClusterSpecNodePoolsItems0) print() {\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- add node pool status to human readable form of cluster print
596,240
06.11.2017 11:24:52
-3,600
9c4a3ff3f1d7200898ac6025eb3eb545850e23ab
renders sitenav 'properly'
[ { "change_type": "DELETE", "old_path": "contrib/kubernikus-docs-builder/data/archetypes/default.md", "new_path": null, "diff": "----\n-title: \"{{ replace .TranslationBaseName \"-\" \" \" | title }}\"\n-date: {{ .Date }}\n-draft: true\n----\n-\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/config.toml", "new_path": "contrib/kubernikus-docs-builder/data/config.toml", "diff": "@@ -5,6 +5,7 @@ theme = \"hugo-material-docs\"\nmetadataformat = \"yaml\"\ncanonifyurls = false\ngoogleAnalytics = \"\"\n+sectionPagesMenu = \"main\"\n[params]\n# Repository\n@@ -31,25 +32,9 @@ googleAnalytics = \"\"\ntext = \"Ubuntu\"\ncode = \"Ubuntu Mono\"\n-\n[social]\ngithub = \"sapcc/kubernikus\"\n-[[menu.main]]\n- name = \"Getting Started\"\n- url = \"user/\"\n- weight = 10\n-\n-[[menu.main]]\n- name = \"Development\"\n- url = \"dev/\"\n- weight = 20\n-\n-[[menu.main]]\n- name = \"Operations\"\n- url = \"ops/\"\n- weight = 30\n-\n[blackfriday]\nsmartypants = true\nfractions = true\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "diff": "<div class=\"sapbanner\"></div>\n<div class=\"saplogo\"></div>\n<div class=\"saplinks\">\n- <div><a href=\"{{ \"user\" | relURL }}\">Docs</a></div>\n+ <div><a href=\"{{ ref \"guide\" }}\">Docss</a></div>\n{{ with .Site.Social.github }}\n<div class=\"button button-github\" role=\"button\" aria-label=\"GitHub\">\n<a href=\"https://github.com/{{ . }}\" title=\"@{{ . }} on GitHub\" target=\"_blank\" class=\"toggle-button icon icon-github\"></a>\n<div id='stars2'></div>\n<div id='stars3'></div>\n<div id='title'>\n- <span class=\"bigger\">Kubernikus</span>\n+ <span class=\"bigger\">Kubernikuss</span>\n<br />\n<span>Managed Kubernetes Clusters</span>\n</div>\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/homepage.css", "new_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/homepage.css", "diff": "}\n.saplogo {\n- background: url(\"docs/images/sapcc.png\") no-repeat;\n+ background: url(\"images/sapcc.png\") no-repeat;\nheight: 50px;\nwidth: 100%;\nposition: relative;\ntext-align: center;\nfont-family: \"lato\", sans-serif;\nfont-weight: 300;\n- font-size: 20px;\n+ font-size: 500px;\n}\n#title span {\n" }, { "change_type": "ADD", "old_path": null, "new_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/syntax.css", "diff": "+/* Background */ .chroma { color: #f8f8f2; background-color: #272822 }\n+/* Error */ .chroma .err { color: #960050; background-color: #1e0010 }\n+/* LineTableTD */ .chroma .lntd { ; vertical-align: top; padding: 0; margin: 0; border: 0; }\n+/* LineTable */ .chroma .lntable { ; border-spacing: 0; padding: 0; margin: 0; border: 0; width: 100%; overflow: auto; display: block; }\n+/* LineHighlight */ .chroma .hl { background-color: #ffffcc; display: block; width: 100% }\n+/* LineNumbersTable */ .chroma .lnt { ; margin-right: 0.4em; padding: 0 0.4em 0 0.4em; display: block; }\n+/* LineNumbers */ .chroma .ln { ; margin-right: 0.4em; padding: 0 0.4em 0 0.4em; }\n+/* Keyword */ .chroma .k { color: #66d9ef }\n+/* KeywordConstant */ .chroma .kc { color: #66d9ef }\n+/* KeywordDeclaration */ .chroma .kd { color: #66d9ef }\n+/* KeywordNamespace */ .chroma .kn { color: #f92672 }\n+/* KeywordPseudo */ .chroma .kp { color: #66d9ef }\n+/* KeywordReserved */ .chroma .kr { color: #66d9ef }\n+/* KeywordType */ .chroma .kt { color: #66d9ef }\n+/* NameAttribute */ .chroma .na { color: #a6e22e }\n+/* NameClass */ .chroma .nc { color: #a6e22e }\n+/* NameConstant */ .chroma .no { color: #66d9ef }\n+/* NameDecorator */ .chroma .nd { color: #a6e22e }\n+/* NameException */ .chroma .ne { color: #a6e22e }\n+/* NameFunction */ .chroma .nf { color: #a6e22e }\n+/* NameOther */ .chroma .nx { color: #a6e22e }\n+/* NameTag */ .chroma .nt { color: #f92672 }\n+/* Literal */ .chroma .l { color: #ae81ff }\n+/* LiteralDate */ .chroma .ld { color: #e6db74 }\n+/* LiteralString */ .chroma .s { color: #e6db74 }\n+/* LiteralStringAffix */ .chroma .sa { color: #e6db74 }\n+/* LiteralStringBacktick */ .chroma .sb { color: #e6db74 }\n+/* LiteralStringChar */ .chroma .sc { color: #e6db74 }\n+/* LiteralStringDelimiter */ .chroma .dl { color: #e6db74 }\n+/* LiteralStringDoc */ .chroma .sd { color: #e6db74 }\n+/* LiteralStringDouble */ .chroma .s2 { color: #e6db74 }\n+/* LiteralStringEscape */ .chroma .se { color: #ae81ff }\n+/* LiteralStringHeredoc */ .chroma .sh { color: #e6db74 }\n+/* LiteralStringInterpol */ .chroma .si { color: #e6db74 }\n+/* LiteralStringOther */ .chroma .sx { color: #e6db74 }\n+/* LiteralStringRegex */ .chroma .sr { color: #e6db74 }\n+/* LiteralStringSingle */ .chroma .s1 { color: #e6db74 }\n+/* LiteralStringSymbol */ .chroma .ss { color: #e6db74 }\n+/* LiteralNumber */ .chroma .m { color: #ae81ff }\n+/* LiteralNumberBin */ .chroma .mb { color: #ae81ff }\n+/* LiteralNumberFloat */ .chroma .mf { color: #ae81ff }\n+/* LiteralNumberHex */ .chroma .mh { color: #ae81ff }\n+/* LiteralNumberInteger */ .chroma .mi { color: #ae81ff }\n+/* LiteralNumberIntegerLong */ .chroma .il { color: #ae81ff }\n+/* LiteralNumberOct */ .chroma .mo { color: #ae81ff }\n+/* Operator */ .chroma .o { color: #f92672 }\n+/* OperatorWord */ .chroma .ow { color: #f92672 }\n+/* Comment */ .chroma .c { color: #75715e }\n+/* CommentHashbang */ .chroma .ch { color: #75715e }\n+/* CommentMultiline */ .chroma .cm { color: #75715e }\n+/* CommentSingle */ .chroma .c1 { color: #75715e }\n+/* CommentSpecial */ .chroma .cs { color: #75715e }\n+/* CommentPreproc */ .chroma .cp { color: #75715e }\n+/* CommentPreprocFile */ .chroma .cpf { color: #75715e }\n+/* GenericDeleted */ .chroma .gd { color: #f92672 }\n+/* GenericEmph */ .chroma .ge { font-style: italic }\n+/* GenericInserted */ .chroma .gi { color: #a6e22e }\n+/* GenericStrong */ .chroma .gs { font-weight: bold }\n+/* GenericSubheading */ .chroma .gu { color: #75715e }\n" }, { "change_type": "RENAME", "old_path": "contrib/kubernikus-docs-builder/data/themes/hugo-material-docs/layouts/_default/__list.html", "new_path": "contrib/kubernikus-docs-builder/data/themes/hugo-material-docs/layouts/_default/list.html", "diff": "<br>\n{{ printf \"%s\" .Summary | markdownify }}\n-\n<hr>\n{{ end }}\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/themes/hugo-material-docs/layouts/partials/drawer.html", "new_path": "contrib/kubernikus-docs-builder/data/themes/hugo-material-docs/layouts/partials/drawer.html", "diff": "{{ end }}\n<div class=\"toc\">\n- {{ if gt (len .Site.Menus.main) 0 }}\n- <ul>\n{{ partial \"nav\" . }}\n- </ul>\n- {{ end }}\n{{ if isset .Site.Params \"author\" }}\n<hr>\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/themes/hugo-material-docs/layouts/partials/nav.html", "new_path": "contrib/kubernikus-docs-builder/data/themes/hugo-material-docs/layouts/partials/nav.html", "diff": "-{{ $currentNode := . }}\n+{{ $section := .Section }}\n+{{ $url := .URL }}\n-{{ range .Site.Menus.main.ByWeight }}\n-\n-{{ $.Scratch.Set \"currentMenuEntry\" . }}\n-<li>\n- {{ if .HasChildren }}\n- <span class=\"section\">{{ .Name | title }}</span>\n<ul>\n- {{ range .Children }}\n- {{ $.Scratch.Set \"currentMenuEntry\" . }}\n- {{ partial \"nav_link\" $currentNode }}\n+ {{ range .Site.Sections }}\n+ <li>\n+ <a href=\"{{ range first 1 .Pages }}{{ .URL }}{{ end }}\">{{ .Title }}</a>\n+\n+ {{ if eq $section .Section }}\n+ <ul class=\"anchor\">\n+ {{ range .Pages.ByWeight }}\n+ <li class=\"anchor\"><a {{ if eq $url .URL }}class=\"current\"{{ end }} href=\"{{ .URL }}\">{{ .Title }}</a></li>\n{{ end }}\n</ul>\n- {{ else }}\n- {{ partial \"nav_link\" $currentNode }}\n{{ end }}\n</li>\n{{ end }}\n+</ul>\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
renders sitenav 'properly'
596,230
06.11.2017 11:28:51
-3,600
c521d50710769ad747bce855b9d2b2674d78750e
add service and cluster cidr to human readable form of cluster print
[ { "change_type": "MODIFY", "old_path": "pkg/client/models/cluster_print.go", "new_path": "pkg/client/models/cluster_print.go", "diff": "@@ -30,6 +30,8 @@ func (c *Cluster) Print(format printers.PrintFormat, options printers.PrintOptio\nfunc (c *Cluster) printHuman(options printers.PrintOptions) {\nfmt.Println(\"Cluster name: \", *c.Name)\nfmt.Println(\"Cluster state: \", (*c).Status.Kluster.State)\n+ fmt.Println(\"Cluster CIDR: \", (*c).Spec.ClusterCIDR)\n+ fmt.Println(\"Service CIDR: \", (*c).Spec.ServiceCIDR)\nfmt.Println(\"Cluster node pools: \", len((*c).Spec.NodePools))\nfor _, pool := range (*c).Spec.NodePools {\npool.print()\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- add service and cluster cidr to human readable form of cluster print
596,240
06.11.2017 11:31:39
-3,600
5e3b04a652bf8d6e33ff773f2ccdb88f5cd28a0c
adds more skelleton content
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "diff": "<div class=\"sapbanner\"></div>\n<div class=\"saplogo\"></div>\n<div class=\"saplinks\">\n- <div><a href=\"{{ ref \"guide\" }}\">Docss</a></div>\n+ <div><a href=\"{{ \"guide/getting_started\" | relURL }}\">Docs</a></div>\n{{ with .Site.Social.github }}\n<div class=\"button button-github\" role=\"button\" aria-label=\"GitHub\">\n<a href=\"https://github.com/{{ . }}\" title=\"@{{ . }} on GitHub\" target=\"_blank\" class=\"toggle-button icon icon-github\"></a>\n<div id='stars2'></div>\n<div id='stars3'></div>\n<div id='title'>\n- <span class=\"bigger\">Kubernikuss</span>\n+ <span class=\"bigger\">Kubernikus</span>\n<br />\n<span>Managed Kubernetes Clusters</span>\n</div>\n" }, { "change_type": "MODIFY", "old_path": "docs/_index.md", "new_path": "docs/_index.md", "diff": "date: 2016-03-08T21:07:13+01:00\ntitle: Kubernikus\ntype: index\n-layout: splash\nweight: 0\n---\n-## Documentation\n-Please see the /docs for full documentation.\n+## Kubernikus\n" }, { "change_type": "DELETE", "old_path": "docs/dev/index.md", "new_path": null, "diff": "----\n-date: 2016-03-08T21:07:13+01:00\n-title: Kubernikus\n-type: index\n-weight: 0\n----\n-\n-## Documentation\n-Please see the /docs for full documentation.\n" }, { "change_type": "RENAME", "old_path": "docs/dev/documentation.md", "new_path": "docs/development/changing_docs.md", "diff": "-## Editting Self-Hosted Docs\n+---\n+title: Changing Docs\n+---\n+\n+## Self-Hosted Docs\nThe self-hosted documentation served by the apiserver is generated using Hugo.\n@@ -10,7 +14,12 @@ It constists of 2 parts:\nA live preview for development can be started with:\n```\n-docker run --rm -ti -p 1313:1313 -v $PWD/contrib/kubernikus-docs-builder/data:/data -v $PWD/docs/:/data/content sapcc/kubernikus-docs:latest hugo server --bind 0.0.0.0\n+docker run --rm -ti -p 1313:1313 \\\n+ -v $PWD/contrib/kubernikus-docs-builder/data:/data \\\n+ -v $PWD/docs/:/data/content\n+ sapcc/kubernikus-docs:latest hugo server --bind 0.0.0.0\n```\nThe docs are then accessible locally on http://localhost:1313\n+\n+lkfl\n" }, { "change_type": "ADD", "old_path": null, "new_path": "docs/guide/authentication.md", "diff": "+---\n+title: Authentication\n+---\n+\n+## Authentication\n" }, { "change_type": "ADD", "old_path": null, "new_path": "docs/guide/getting_started.md", "diff": "+---\n+title: Getting Started\n+weight: -10\n+---\n+\n+## Getting Started\n" }, { "change_type": "ADD", "old_path": null, "new_path": "docs/operations/controlplane.md", "diff": "+---\n+title: ControlPlane\n+---\n+\n+## Setting up a new Region\n+\n+### Prepare Tiller with RBAC\n+```\n+kubectl -n kube-system create sa tiller\n+kubectl create clusterrolebinding tiller --clusterrole cluster-admin --serviceaccount=kube-system:tiller\n+helm init --service-account tiller\n+```\n+\n+## Authenticating\n+\n+Initial kubeconfig setup:\n+```\n+kubernikusctl auth init --url https://k-staging.admin.cloud.sap --name k-staging --user-domain-name ccadmin --project-name kubernikus-staging --project-domain-name ccadmin --auth-url https://identity-3.eu-nl-1.cloud.sap --username <USER>\n+kubernikusctl auth init --url https://k-eu-nl-1.admin.cloud.sap --name k-eu-nl-1 --user-domain-name ccadmin --project-name kubernikus --project-domain-name ccadmin --auth-url https://identity-3.eu-nl-1.cloud.sap --username <USER>\n+```\n+\n+Refresh certificates with:\n+```\n+kubernikusctl auth refresh\n+```\n+\n+Automate in Fish with:\n+```\n+function _kubectl\n+ test -n \"$KUBECTL_CONTEXT\"; or set -x KUBECTL_CONTEXT (kubectl config current-context)\n+\n+ if count $argv > /dev/null\n+ kubernikusctl auth refresh --context $KUBECTL_CONTEXT\n+ end\n+\n+ if test -n \"$KUBECTL_NAMESPACE\"\n+ eval kubectl --context $KUBECTL_CONTEXT --namespace $KUBECTL_NAMESPACE $argv\n+ else\n+ eval kubectl --context $KUBECTL_CONTEXT $argv\n+ end\n+end\n+```\n" }, { "change_type": "ADD", "old_path": null, "new_path": "docs/operations/logging.md", "diff": "+---\n+title: Logging\n+---\n+\n+## Setting up a new Region\n+\n+### Prepare Tiller with RBAC\n+```\n+kubectl -n kube-system create sa tiller\n+kubectl create clusterrolebinding tiller --clusterrole cluster-admin --serviceaccount=kube-system:tiller\n+helm init --service-account tiller\n+```\n+\n+## Authenticating\n+\n+Initial kubeconfig setup:\n+```\n+kubernikusctl auth init --url https://k-staging.admin.cloud.sap --name k-staging --user-domain-name ccadmin --project-name kubernikus-staging --project-domain-name ccadmin --auth-url https://identity-3.eu-nl-1.cloud.sap --username <USER>\n+kubernikusctl auth init --url https://k-eu-nl-1.admin.cloud.sap --name k-eu-nl-1 --user-domain-name ccadmin --project-name kubernikus --project-domain-name ccadmin --auth-url https://identity-3.eu-nl-1.cloud.sap --username <USER>\n+```\n+\n+Refresh certificates with:\n+```\n+kubernikusctl auth refresh\n+```\n+\n+Automate in Fish with:\n+```\n+function _kubectl\n+ test -n \"$KUBECTL_CONTEXT\"; or set -x KUBECTL_CONTEXT (kubectl config current-context)\n+\n+ if count $argv > /dev/null\n+ kubernikusctl auth refresh --context $KUBECTL_CONTEXT\n+ end\n+\n+ if test -n \"$KUBECTL_NAMESPACE\"\n+ eval kubectl --context $KUBECTL_CONTEXT --namespace $KUBECTL_NAMESPACE $argv\n+ else\n+ eval kubectl --context $KUBECTL_CONTEXT $argv\n+ end\n+end\n+```\n" }, { "change_type": "DELETE", "old_path": "docs/ops/index.md", "new_path": null, "diff": "----\n-date: 2016-03-08T21:07:13+01:00\n-title: Kubernikus\n-type: index\n-weight: 0\n----\n-\n-## Documentation\n-Please see the /docs for full documentation.\n" }, { "change_type": "DELETE", "old_path": "docs/user/index.md", "new_path": null, "diff": "----\n-date: 2016-03-08T21:07:13+01:00\n-title: Kubernikus\n-type: index\n-weight: 0\n----\n-\n-## Documentation\n-Please see the /docs for full documentation.\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds more skelleton content
596,240
06.11.2017 11:31:56
-3,600
00e1c3411ed374c5993b61d7f7b90e1e1a88c826
moves content to docs
[ { "change_type": "MODIFY", "old_path": "README.md", "new_path": "README.md", "diff": "Converged Cloud goes Containers\n-## Setting up a new Region\n-### Prepare Tiller with RBAC\n-```\n-kubectl -n kube-system create sa tiller\n-kubectl create clusterrolebinding tiller --clusterrole cluster-admin --serviceaccount=kube-system:tiller\n-helm init --service-account tiller\n-```\n-\n-### Tiller Hacks until Workhole Reverse Tunnel works\n-`kubectl edit deployment/tiller-deploy`:\n-```\n- volumes:\n- - configMap:\n- defaultMode: 420\n- name: tiller-kubeconfig\n- name: kubeconfig\n- containers:\n- - env:\n- - name: TILLER_NAMESPACE\n- value: kube-system\n- - name: KUBECONFIG\n- value: /etc/tiller/kubeconfig\n- - name: KUBERNETES_SERVICE_HOST\n-\n-```\n-\n-Create Configmap. Edit `server`:\n-```\n-cat <<EOF | kubectl create configmap tiller-kubeconfig -n kube-system --from-file -\n-apiVersion: v1\n-kind: Config\n-clusters:\n-- cluster:\n- certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n- server: https://k-staging-7df1acb1a2f2478eadf3f350d3f44c51.kubernikus-staging.admin.cloud.sap\n- name: default\n-contexts:\n-- context:\n- cluster: default\n- namespace: default\n- user: default\n- name: default\n-current-context: default\n-users:\n-- name: default\n- user:\n- tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n-EOF\n-```\n-\n-## Authenticating at the Control Planes\n-\n-Initial kubeconfig setup:\n-```\n-kubernikusctl auth init --url https://k-staging.admin.cloud.sap --name k-staging --user-domain-name ccadmin --project-name kubernikus-staging --project-domain-name ccadmin --auth-url https://identity-3.eu-nl-1.cloud.sap --username <USER>\n-kubernikusctl auth init --url https://k-eu-nl-1.admin.cloud.sap --name k-eu-nl-1 --user-domain-name ccadmin --project-name kubernikus --project-domain-name ccadmin --auth-url https://identity-3.eu-nl-1.cloud.sap --username <USER>\n-```\n-\n-Refresh certificates with:\n-```\n-kubernikusctl auth refresh\n-```\n-\n-Automate in Fish with:\n-```\n-function _kubectl\n- test -n \"$KUBECTL_CONTEXT\"; or set -x KUBECTL_CONTEXT (kubectl config current-context)\n-\n- if count $argv > /dev/null\n- kubernikusctl auth refresh --context $KUBECTL_CONTEXT\n- end\n-\n- if test -n \"$KUBECTL_NAMESPACE\"\n- eval kubectl --context $KUBECTL_CONTEXT --namespace $KUBECTL_NAMESPACE $argv\n- else\n- eval kubectl --context $KUBECTL_CONTEXT $argv\n- end\n-end\n-```\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
moves content to docs
596,230
06.11.2017 12:52:49
-3,600
9d3ff89ce322282526b996712eff6ae8524b25ca
add net.ipv4.conf.all.accept_redirects to sysctl.d, fixes
[ { "change_type": "MODIFY", "old_path": "pkg/templates/node.go", "new_path": "pkg/templates/node.go", "diff": "@@ -164,6 +164,12 @@ networkd:\nstorage:\nfiles:\n+ - path: /etc/sysctl.d/10-enable-icmp-redirects\n+ filesystem: root\n+ mode: 0644\n+ contents:\n+ inline: |-\n+ net.ipv4.conf.all.accept_redirects=1\n- path: /etc/kubernetes/certs/kubelet-clients-ca.pem\nfilesystem: root\nmode: 0644\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- add net.ipv4.conf.all.accept_redirects to sysctl.d, fixes #65
596,240
06.11.2017 11:36:08
-3,600
5a27455cc8c82be6dffd6dcf578bc8592ead2d06
updates live preview command
[ { "change_type": "MODIFY", "old_path": "docs/development/changing_docs.md", "new_path": "docs/development/changing_docs.md", "diff": "@@ -15,11 +15,14 @@ A live preview for development can be started with:\n```\ndocker run --rm -ti -p 1313:1313 \\\n- -v $PWD/contrib/kubernikus-docs-builder/data:/data \\\n- -v $PWD/docs/:/data/content\n- sapcc/kubernikus-docs:latest hugo server --bind 0.0.0.0\n+ -v $PWD/contrib/kubernikus-docs-builder/data:/live \\\n+ -v $PWD/docs/:/live/content \\\n+ --workdir /live \\\n+ sapcc/kubernikus-docs:latest \\\n+ hugo server \\\n+ --bind 0.0.0.0 \\\n+ --baseURL \"http://localhost:1313/docs\" \\\n+ --debug\n```\nThe docs are then accessible locally on http://localhost:1313\n-\n-lkfl\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
updates live preview command
596,240
06.11.2017 16:16:44
-3,600
f044288f6d5daf34f122f9290ca5e774d8adee7a
initializes README
[ { "change_type": "MODIFY", "old_path": "README.md", "new_path": "README.md", "diff": "# Kubernikus\n+[![Kubernikus](blob/assets/kubernikus.svg)](https://github.com/sapcc/kubernikus)\n+\n[![Build Status](https://travis-ci.org/sapcc/kubernikus.svg?branch=master)](https://travis-ci.org/sapcc/kubernikus)\n+[![Contributions](https://img.shields.io/badge/contributions-welcome-brightgreen.svg)](https://travis-ci.org/sapcc/kubernikus.svg?branch=master)\n+[![License](https://img.shields.io/badge/license-Apache-blue.svg)](http://www.apache.org/licenses/LICENSE-2.0.txt)\n+\n+----\n+\n+Kubernikus is \"Kubernetes as a Service\" for Openstack.\n+\n+It allows to easily manage Kubernetes clusters that are natively integrated with Openstack. The architecture is designed to be facilitate the operation as a managed service.\n+\n+----\n+\n+## Features\n+\n+ * Architecured to be operated as a managed service\n+ * Masters are managed centrally\n+ * Nodes are dececentralized in customer's projects\n+ * 100% Vanilla Kubernetes\n+ * 100% Compatible Openstack API\n+ * Air-Gapped Masters and Nodes\n+ * Full TLS encryption between all components\n+ * Auto-Updating nodes based on CoreOS Container Linux\n+ * Authentication Tooling\n+ * Unified Authorization Policy between Openstack and Kubernetes RBAC\n+\n+## Guiding Principles\n+\n+ * Running Kubernetes using Kubernetes\n+ * Automation is driven by Operators\n+ * Cloud Native Tooling: Golang, Helm, Swagger, Prometheus\n+\n+## Prerequisites\n+\n+ * Openstack (including LBaaS)\n+ * Kubernetes Seed-Cluster (1.7+)\n+\n+## Documentation\n+\n+More documentation can be found at:\n+\n+ * [blob/master/docs/](blob/master/docs/)\n+ * [https://sapcc.github.io/kubernikus](https://sapcc.github.io/kubernikus)\n+\n+## Contact\n+\n+https://convergedcloud.slack.com\n-Converged Cloud goes Containers\n+## License\n+This project is licensed under the Apache2 License - see the [LICENSE](blob/master/LICENSE) file for details\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
initializes README
596,230
07.11.2017 10:31:36
-3,600
f390b376c109c540e5ffb78e3dad3960b0ecf94f
implements get nodepool
[ { "change_type": "MODIFY", "old_path": "pkg/api/models/cluster_print.go", "new_path": "pkg/api/models/cluster_print.go", "diff": "@@ -34,28 +34,50 @@ func (c *Cluster) printHuman(options printers.PrintOptions) {\nfmt.Println(\"Service CIDR: \", (*c).Spec.ServiceCIDR)\nfmt.Println(\"Cluster node pools: \", len((*c).Spec.NodePools))\nfor _, pool := range (*c).Spec.NodePools {\n- pool.print()\n+ pool.printHuman(options)\n}\nfmt.Println(\"Cluster node pool status: \")\nfor _, pool := range (*c).Status.NodePools {\n- pool.print()\n+ pool.printHuman(options)\n}\n}\n-func (p *ClusterStatusNodePoolsItems0) print() {\n- fmt.Print(\"Name: \")\n- fmt.Println(*p.Name)\n- fmt.Print(\" Size: \\t\")\n- fmt.Println(*p.Size)\n- fmt.Print(\" Running: \\t\")\n- fmt.Println(*p.Running)\n- fmt.Print(\" Schedulable: \\t\")\n- fmt.Println(*p.Schedulable)\n- fmt.Print(\" Healthy: \\t\")\n- fmt.Println(*p.Healthy)\n+func (c *Cluster) printTable(options printers.PrintOptions) {\n+ if options.WithHeaders {\n+ fmt.Print(\"NAME\")\n+ fmt.Print(\"\\t\")\n+ fmt.Print(\"STATUS\")\n+ fmt.Print(\"\\t\")\n+ fmt.Println(\"MESSAGE\")\n+ }\n+ fmt.Print(*c.Name)\n+ fmt.Print(\"\\t\")\n+ fmt.Print((*c).Status.Kluster.State)\n+ fmt.Print(\"\\t\")\n+ fmt.Println((*c).Status.Kluster.Message)\n+}\n+\n+func (p *ClusterSpecNodePoolsItems0) GetFormats() map[printers.PrintFormat]struct{} {\n+ ret := map[printers.PrintFormat]struct{}{\n+ printers.Table: struct{}{},\n+ printers.Human: struct{}{},\n+ }\n+ return ret\n}\n-func (p *ClusterSpecNodePoolsItems0) print() {\n+func (p *ClusterSpecNodePoolsItems0) Print(format printers.PrintFormat, options printers.PrintOptions) error {\n+ switch format {\n+ case printers.Human:\n+ p.printHuman(options)\n+ case printers.Table:\n+ p.printTable(options)\n+ default:\n+ return errors.Errorf(\"Unknown printformat models.Cluster is unable to print in format: %v\", format)\n+ }\n+ return nil\n+}\n+\n+func (p *ClusterSpecNodePoolsItems0) printHuman(options printers.PrintOptions) {\nfmt.Print(\"Name: \")\nfmt.Println(*p.Name)\nfmt.Print(\" Flavor: \\t\")\n@@ -66,17 +88,34 @@ func (p *ClusterSpecNodePoolsItems0) print() {\nfmt.Println(*p.Size)\n}\n-func (c *Cluster) printTable(options printers.PrintOptions) {\n+func (p *ClusterSpecNodePoolsItems0) printTable(options printers.PrintOptions) {\nif options.WithHeaders {\nfmt.Print(\"NAME\")\nfmt.Print(\"\\t\")\n- fmt.Print(\"STATUS\")\n+ fmt.Print(\"FLAVOR\")\nfmt.Print(\"\\t\")\n- fmt.Println(\"MESSAGE\")\n+ fmt.Print(\"IMAGE\")\n+ fmt.Print(\"\\t\")\n+ fmt.Println(\"SIZE\")\n}\n- fmt.Print(*c.Name)\n+ fmt.Print(*p.Name)\nfmt.Print(\"\\t\")\n- fmt.Print((*c).Status.Kluster.State)\n+ fmt.Print(*p.Flavor)\nfmt.Print(\"\\t\")\n- fmt.Println((*c).Status.Kluster.Message)\n+ fmt.Print(p.Image)\n+ fmt.Print(\"\\t\")\n+ fmt.Println(*p.Size)\n+}\n+\n+func (p *ClusterStatusNodePoolsItems0) printHuman(options printers.PrintOptions) {\n+ fmt.Print(\"Name: \")\n+ fmt.Println(*p.Name)\n+ fmt.Print(\" Size: \\t\")\n+ fmt.Println(*p.Size)\n+ fmt.Print(\" Running: \\t\")\n+ fmt.Println(*p.Running)\n+ fmt.Print(\" Schedulable: \\t\")\n+ fmt.Println(*p.Schedulable)\n+ fmt.Print(\" Healthy: \\t\")\n+ fmt.Println(*p.Healthy)\n}\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/common/kubernikus.go", "new_path": "pkg/cmd/kubernikusctl/common/kubernikus.go", "diff": "@@ -114,6 +114,27 @@ func (k *KubernikusClient) ListAllClusters() ([]*models.Cluster, error) {\nreturn ok.Payload, nil\n}\n+func (k *KubernikusClient) ListNodePools(clusterName string) ([]*models.ClusterSpecNodePoolsItems0, error) {\n+ ok, err := k.ShowCluster(clusterName)\n+ if err != nil {\n+ return nil, err\n+ }\n+ return ok.Spec.NodePools, nil\n+}\n+\n+func (k *KubernikusClient) ShowNodePool(clusterName string, nodePoolName string) (*models.ClusterSpecNodePoolsItems0, error) {\n+ ok, err := k.ShowCluster(clusterName)\n+ if err != nil {\n+ return nil, err\n+ }\n+ for _, nodePool := range ok.Spec.NodePools {\n+ if *nodePool.Name == nodePoolName {\n+ return nodePool, nil\n+ }\n+ }\n+ return nil, nil\n+}\n+\nfunc (k *KubernikusClient) GetDefaultCluster() (*models.Cluster, error) {\nok, err := k.client.Operations.ListClusters(operations.NewListClustersParams(), k.authFunc())\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/get.go", "new_path": "pkg/cmd/kubernikusctl/get.go", "diff": "@@ -25,5 +25,7 @@ func NewGetCommand() *cobra.Command {\no.Openstack.BindFlags(c.PersistentFlags())\ncluster := get.NewClusterCommand(o)\nc.AddCommand(cluster)\n+ nodePool := get.NewNodePoolCommand(o)\n+ c.AddCommand(nodePool)\nreturn c\n}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/cmd/kubernikusctl/get/nodepool.go", "diff": "+package get\n+\n+import (\n+ \"github.com/golang/glog\"\n+ \"github.com/pkg/errors\"\n+ \"github.com/spf13/cobra\"\n+\n+ \"github.com/sapcc/kubernikus/pkg/cmd\"\n+ \"github.com/sapcc/kubernikus/pkg/cmd/printers\"\n+)\n+\n+func NewNodePoolCommand(o GetOptions) *cobra.Command {\n+ c := &cobra.Command{\n+ Use: \"nodepool [cluster] [name]\",\n+ Short: \"Gets info about nodepools of a cluster\",\n+ Long: `Retrieves information about a nodepool or all nodepools of a specific cluster.`,\n+ Aliases: []string{\"nodepools\", \"np\"},\n+ PreRun: o.nodePoolPreRun,\n+ Run: o.nodePoolRun,\n+ }\n+ return c\n+}\n+\n+func (o *GetOptions) nodePoolPreRun(c *cobra.Command, args []string) {\n+ cmd.CheckError(validateNodePoolCommandArgs(args))\n+ cmd.CheckError(o.SetupKubernikusClient())\n+}\n+\n+func (o *GetOptions) nodePoolRun(c *cobra.Command, args []string) {\n+ glog.V(2).Infof(\"Run args: %v\", args)\n+ if len(args) == 1 {\n+ cmd.CheckError(o.nodePoolList(args[0]))\n+ } else {\n+ cmd.CheckError(o.nodePoolShow(args[0], args[1]))\n+ }\n+}\n+\n+func (o *GetOptions) nodePoolList(cluster string) error {\n+ nodePools, err := o.Kubernikus.ListNodePools(cluster)\n+ if err != nil {\n+ glog.V(2).Infof(\"Error listing nodepools: %v\", err)\n+ return errors.Wrap(err, \"Error listing nodepools\")\n+ }\n+ printme := make([]printers.Printable, len(nodePools))\n+ for i, nodePool := range nodePools {\n+ tmp := nodePool\n+ printme[i] = tmp\n+ }\n+ return printers.PrintTable(printme)\n+}\n+\n+func (o *GetOptions) nodePoolShow(cluster string, nodePoolName string) error {\n+ nodePool, err := o.Kubernikus.ShowNodePool(cluster, nodePoolName)\n+ if err != nil {\n+ glog.V(2).Infof(\"Error getting nodepool %v from cluster %v: %v\", nodePoolName, cluster, err)\n+ return errors.Wrap(err, \"Error getting nodepool\")\n+ }\n+ return nodePool.Print(printers.Human, printers.PrintOptions{})\n+}\n+\n+func validateNodePoolCommandArgs(args []string) error {\n+ if len(args) > 2 {\n+ return errors.Errorf(\"Surplus arguments to nodepool, %v\", args)\n+ }\n+ if len(args) < 1 {\n+ return errors.Errorf(\"No clustername given, %v\", args)\n+ }\n+ return nil\n+}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- implements get nodepool
596,240
07.11.2017 10:13:59
-3,600
d9957a95ed3f7e113d077391123ff7d6773ae808
fixes css hacks to be templatable
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/config.toml", "new_path": "contrib/kubernikus-docs-builder/data/config.toml", "diff": "@@ -19,7 +19,7 @@ pluralizelisttitles = false\npermalink = \"#\"\n# Custom assets\n- custom_css = [\"stylesheets/homepage.css\"]\n+ custom_css = [\"stylesheets/hacks.css\"]\ncustom_js = []\n# Syntax highlighting theme\n" }, { "change_type": "RENAME", "old_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/homepage.css", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.css", "diff": "}\n.saplogo {\n- background: url(\"images/sapcc.png\") no-repeat;\n+ background: url({{ \"images/sapcc.png\" | relURL }}) no-repeat;\nheight: 50px;\nwidth: 100%;\nposition: relative;\n" }, { "change_type": "ADD", "old_path": null, "new_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/hacks.css", "diff": "+.project .logo img {\n+ background: none;\n+ border-radius: none;\n+}\n+\n+.project:focus .logo img, .project:hover .logo img {\n+ box-shadow: none;\n+}\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/themes/hugo-material-docs/layouts/partials/drawer.html", "new_path": "contrib/kubernikus-docs-builder/data/themes/hugo-material-docs/layouts/partials/drawer.html", "diff": "<div class=\"banner\">\n{{ with .Site.Params.logo }}\n<div class=\"logo\">\n- <img src=\"{{ $.Site.BaseURL }}{{ . }}\">\n+ <img src=\"{{ . | relURL }}\">\n</div>\n{{ end }}\n<div class=\"name\">\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/themes/hugo-material-docs/layouts/partials/head.html", "new_path": "contrib/kubernikus-docs-builder/data/themes/hugo-material-docs/layouts/partials/head.html", "diff": "{{ range .Site.Params.custom_css }}\n<link rel=\"stylesheet\" href=\"{{ . | absURL }}\">\n{{ end }}\n+ {{ with .OutputFormats.Get \"css\" }}\n+ <link rel=\"{{ .Rel }}\" type=\"{{ .MediaType.Type }}\" href=\"{{ .Permalink | safeURL }}\">\n+ {{ end }}\n<script src=\"{{ \"javascripts/modernizr.js\" | absURL }}\"></script>\n{{ with .RSSLink }}\n" }, { "change_type": "MODIFY", "old_path": "docs/_index.md", "new_path": "docs/_index.md", "diff": "@@ -3,6 +3,9 @@ date: 2016-03-08T21:07:13+01:00\ntitle: Kubernikus\ntype: index\nweight: 0\n+outputs:\n+- html\n+- css\n---\n## Kubernikus\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes css hacks to be templatable
596,240
07.11.2017 10:52:18
-3,600
210a843666ca898a6d047dc2f52ae9aff0dfc390
fixes titles
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.css", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.css", "diff": "#title {\nposition: relative;\n- top: 20px;\n- left: 0;\n- right: 0;\n+ top: 25px;\ncolor: #FFF;\ntext-align: center;\n- font-family: \"lato\", sans-serif;\n+ font-family: \"Source Sans Pro\";\nfont-weight: 300;\n- font-size: 500px;\n}\n#title span {\n- background: -webkit-linear-gradient(white, #38495a);\n+ background: -webkit-linear-gradient(white, lightblue);\n-webkit-background-clip: text;\n-webkit-text-fill-color: transparent;\n+ font-size: 35px;\n+ line-height: 0.9em\n}\n#title span.bigger {\n- font-size: 60px;\n+ font-size: 73px;\n+ font-weight: 700;\n}\n@keyframes animStar {\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "diff": "{{ partial \"head\" . }}\n-<link href='https://fonts.googleapis.com/css?family=Lato:300,400,700' rel='stylesheet' type='text/css'>\n+<link href='https://fonts.googleapis.com/css?family=Source+Sans+Pro:300,400,700' rel='stylesheet' type='text/css'>\n<main class=\"main\">\n<div class=\"sapbanner\"></div>\n<div id='stars2'></div>\n<div id='stars3'></div>\n<div id='title'>\n- <span class=\"bigger\">Kubernikus</span>\n+ <span class=\"bigger\">KUBERNIKUS</span>\n<br />\n<span>Managed Kubernetes Clusters</span>\n</div>\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes titles
596,230
07.11.2017 14:01:36
-3,600
300f7e15ded6e32ed77403831b3f57c5a5f53770
make auth init respect --kubeconfig
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/auth/init.go", "new_path": "pkg/cmd/kubernikusctl/auth/init.go", "diff": "@@ -122,7 +122,7 @@ func (o *InitOptions) Run(c *cobra.Command) (err error) {\nreturn errors.Wrapf(err, \"Couldn't merge existing kubeconfig with fetched credentials\")\n}\n- fmt.Printf(\"Wrote merged kubeconfig to %v\\n\", clientcmd.NewDefaultPathOptions().GetDefaultFilename())\n+ fmt.Println(\"Wrote merged kubeconfig\")\nreturn nil\n}\n@@ -166,8 +166,13 @@ func (o *InitOptions) mergeAndPersist(rawConfig string) error {\n}\ndefaultPathOptions := clientcmd.NewDefaultPathOptions()\n+ if o.kubeconfigPath != \"\" {\n+ defaultPathOptions.LoadingRules.ExplicitPath = o.kubeconfigPath\n+ defaultPathOptions.LoadingRules.Precedence = []string{o.kubeconfigPath}\n+ }\n+ glog.V(2).Infof(\"DefaultPathOptions: %v\", defaultPathOptions)\nif err = clientcmd.ModifyConfig(defaultPathOptions, *o.kubeconfig, false); err != nil {\n- return errors.Wrapf(err, \"Couldn't merge Kubernikus config with kubeconfig at %v:\", defaultPathOptions.GetDefaultFilename())\n+ return errors.Wrapf(err, \"Couldn't merge Kubernikus config with kubeconfig\")\n}\nreturn nil\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- make auth init respect --kubeconfig
596,240
07.11.2017 11:13:35
-3,600
04e34e9f970fd63592dd929b8039ae5aa862f3fa
uses svg logo for pixel perfection
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.css", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.css", "diff": ".promologo {\nposition: relative;\n- top: 70px;\n- width: 365px;\n- left: 413px;\n+ top: 106px;\n+ width: 281px;\n+ left: 470px;\n}\n#title {\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "diff": "<span>Managed Kubernetes Clusters</span>\n</div>\n</div>\n- <img src=\"{{ \"images/logo.png\" | relURL }}\" class=\"promologo\" />\n+ <img src=\"{{ \"images/kubernikus.svg\" | relURL }}\" class=\"promologo\" />\n<article class=\"article\">\n<div class=\"wrapper\">\n{{ .Content }}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "contrib/kubernikus-docs-builder/data/static/images/kubernikus.svg", "diff": "+<svg xmlns=\"http://www.w3.org/2000/svg\" width=\"150.4\" height=\"168.5\" viewBox=\"0 0 150.4 168.5\"><path fill=\"#B8DBFB\" d=\"M74.6 165.2l-71.8-36 .5-89.6 71.3 37\"/><path fill=\"#CCE5FC\" d=\"M74.6 165.2l72.9-36.7V39.4l-73 37.3\"/><path fill=\"#DDEEFD\" d=\"M147.5 39.4l-73 37.3-71.3-37L74.8 3.4\"/><path fill=\"none\" stroke=\"#484848\" stroke-width=\"3\" d=\"M75 1.7l73.9 36.8v90.9l-74.3 37.4-73.1-36.6.2-91.4z\"/><path fill=\"#94C9F9\" d=\"M74.5 117.9l-33-16.3.3-41.7 32.7 16.8\"/><path fill=\"#ADD5FA\" d=\"M74.5 117.9l33.3-16.8.1-41.6-33.4 17.1\"/><path fill=\"#C5E2FB\" d=\"M107.9 59.5L74.5 76.7 41.8 59.9l32.8-16.4\"/><path opacity=\".93\" fill=\"none\" stroke=\"#484848\" stroke-width=\"2\" d=\"M74.7 42.4l34.2 16.7-.2 42.6-34.2 17.2-33.7-17.1.1-42.5z\"/></svg>\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
uses svg logo for pixel perfection
596,240
07.11.2017 14:26:47
-3,600
56fed55cf2cf51f5c3ac607d0fe563933a7c7929
prettifies the landing page
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.css", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.css", "diff": "top: 106px;\nwidth: 281px;\nleft: 470px;\n+ z-index: 100;\n}\n#title {\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "diff": "</div>\n</div>\n<img src=\"{{ \"images/kubernikus.svg\" | relURL }}\" class=\"promologo\" />\n- <article class=\"article\">\n- <div class=\"wrapper\">\n+\n+ {{ range where .Data.Pages \"Type\" \"index\" }}\n+ <div class=\"{{ .File.TranslationBaseName }}\">\n+ <div class=\"wrap\">\n{{ .Content }}\n</div>\n- </article>\n+ </div>\n+ {{ end }}\n+\n</main>\n+\n+\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/hacks.css", "new_path": "contrib/kubernikus-docs-builder/data/static/stylesheets/hacks.css", "diff": ".project:focus .logo img, .project:hover .logo img {\nbox-shadow: none;\n}\n+\n+.about {\n+ position: absolute;\n+ top: 450px;\n+ width: 100%;\n+ left: 0;\n+ text-align: center;\n+ background: #6ea4fb;\n+}\n+\n+.about .wrap {\n+ padding: 4em 0 4em 0;\n+ width: 100%;\n+ max-width: 1200px;\n+ display: inline-block;\n+ text-align: left;\n+ font-size: 28px;\n+ line-height: 1.5em;\n+ color: #fff;\n+ letter-spacing: 0.05em;\n+ font-family: \"Source Sans Pro\";\n+ height: 400px;\n+}\n+\n+.features {\n+ position: absolute;\n+ top: 820px;\n+ width: 100%;\n+ left: 0;\n+ text-align: center;\n+ background: #ddeefd;\n+}\n+\n+.features .wrap {\n+ padding: 1em 0 2em 0;\n+ width: 100%;\n+ max-width: 1200px;\n+ display: inline-block;\n+ text-align: left;\n+ line-height: 1.5em;\n+ font-family: \"Source Sans Pro\";\n+ font-size: 3em;\n+}\n+\n+.features .wrap h2 {\n+ padding: 1em 0 0.5em 0;\n+}\n+\n+\n+body.palette-primary-blue {\n+ background: #ddeefd;\n+}\n" }, { "change_type": "MODIFY", "old_path": "docs/_index.md", "new_path": "docs/_index.md", "diff": "@@ -7,5 +7,3 @@ outputs:\n- html\n- css\n---\n-\n-## Kubernikus\n" }, { "change_type": "ADD", "old_path": null, "new_path": "docs/about.md", "diff": "+---\n+weight: 0\n+type: index\n+---\n+\n+Kubernikus is \"Kubernetes as a Service\" for Openstack.\n+\n+<br>\n+\n+It allows to easily manage Kubernetes clusters that are natively integrated\n+with Openstack. The architecture is designed to facilitate operations\n+as a managed service.\n" }, { "change_type": "ADD", "old_path": null, "new_path": "docs/features.md", "diff": "+---\n+weight: 0\n+type: index\n+---\n+\n+## Managed\n+\n+ * Architecured to be operated as a managed service\n+ * Masters are managed centrally\n+ * Nodes are dececentralized in customer's projects\n+\n+## Compliant\n+\n+ * 100% Vanilla Kubernetes\n+ * 100% Compatible Openstack API\n+\n+## Secured\n+\n+ * Air-Gapped Masters and Nodes\n+ * Full TLS encryption between all components\n+ * Auto-Updating nodes based on CoreOS Container Linux\n+ * Authentication Tooling\n+ * Unified Authorization Policy between Openstack and Kubernetes RBAC\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
prettifies the landing page
596,240
07.11.2017 16:51:06
-3,600
98208c9c5f50894ec4aeb5d8b3a8cc3d377ee461
renders swagger api docs into gh-pages as well
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/Dockerfile", "new_path": "contrib/kubernikus-docs-builder/Dockerfile", "diff": "@@ -5,9 +5,14 @@ ARG HUGO_VERSION=0.30.2\nRUN apk add --no-cache curl\nRUN curl -Lo hugo.tar.gz https://github.com/gohugoio/hugo/releases/download/v${HUGO_VERSION}/hugo_${HUGO_VERSION}_Linux-64bit.tar.gz\nRUN tar xvf hugo.tar.gz hugo -C /usr/local/bin\n+RUN curl -Lo /usr/local/bin/yaml https://github.com/mikefarah/yaml/releases/download/1.13.1/yaml_linux_amd64 && \\\n+ chmod +x /usr/local/bin/yaml\nCOPY data /\nONBUILD COPY docs /content\nONBUILD RUN hugo --baseURL \"/docs\" --destination /public/docs\nONBUILD RUN hugo --baseURL \"/kubernikus\" --destination /public/kubernikus\n+ONBUILD COPY swagger.yml /\n+ONBUILD RUN yaml --tojson read /swagger.yml . > /public/docs/api/swagger.json\n+ONBUILD RUN yaml --tojson read /swagger.yml . > /public/kubernikus/api/swagger.json\n" }, { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "diff": "<div class=\"saplogo\"></div>\n<div class=\"saplinks\">\n<div><a href=\"{{ \"guide/getting_started\" | relURL }}\">Docs</a></div>\n+ <div><a href=\"{{ \"guide/getting_started\" | relURL }}\">API</a></div>\n{{ with .Site.Social.github }}\n<div class=\"button button-github\" role=\"button\" aria-label=\"GitHub\">\n<a href=\"https://github.com/{{ . }}\" title=\"@{{ . }} on GitHub\" target=\"_blank\" class=\"toggle-button icon icon-github\"></a>\n" }, { "change_type": "ADD", "old_path": null, "new_path": "contrib/kubernikus-docs-builder/data/static/api/index.html", "diff": "+<!DOCTYPE html>\n+<html>\n+ <head>\n+ <title>API documentation</title>\n+\n+ <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\">\n+\n+\n+ <style>\n+ body {\n+ margin: 0;\n+ padding: 0;\n+ }\n+ </style>\n+ </head>\n+ <body>\n+ <redoc spec-url='swagger.json'></redoc>\n+ <script src=\"https://rebilly.github.io/ReDoc/releases/latest/redoc.min.js\"> </script>\n+ </body>\n+</html>\n+\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
renders swagger api docs into gh-pages as well
596,240
07.11.2017 16:59:45
-3,600
df76f8c986feeacadde2a0114b8459501a371b4a
uses different yaml converter
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/Dockerfile", "new_path": "contrib/kubernikus-docs-builder/Dockerfile", "diff": "@@ -5,8 +5,8 @@ ARG HUGO_VERSION=0.30.2\nRUN apk add --no-cache curl\nRUN curl -Lo hugo.tar.gz https://github.com/gohugoio/hugo/releases/download/v${HUGO_VERSION}/hugo_${HUGO_VERSION}_Linux-64bit.tar.gz\nRUN tar xvf hugo.tar.gz hugo -C /usr/local/bin\n-RUN curl -Lo /usr/local/bin/yaml https://github.com/mikefarah/yaml/releases/download/1.13.1/yaml_linux_amd64 && \\\n- chmod +x /usr/local/bin/yaml\n+RUN curl -Lo /usr/local/bin/yaml2json https://github.com/bronze1man/yaml2json/blob/master/builds/linux_amd64/yaml2json?raw=true64 && \\\n+ chmod +x /usr/local/bin/yaml2json\nCOPY data /\nONBUILD COPY docs /content\n@@ -14,5 +14,5 @@ ONBUILD RUN hugo --baseURL \"/docs\" --destination /public/docs\nONBUILD RUN hugo --baseURL \"/kubernikus\" --destination /public/kubernikus\nONBUILD COPY swagger.yml /\n-ONBUILD RUN yaml --tojson read /swagger.yml . > /public/docs/api/swagger.json\n-ONBUILD RUN yaml --tojson read /swagger.yml . > /public/kubernikus/api/swagger.json\n+ONBUILD RUN yaml2json < /swagger.yml > /public/docs/api/swagger.json\n+ONBUILD RUN yaml2json < /swagger.yml > /public/kubernikus/api/swagger.json\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
uses different yaml converter
596,240
09.11.2017 16:47:55
-3,600
2d5a8fa1728be2b8a9c1c2d71384716130f2afff
adds na-us-1 as productive region
[ { "change_type": "MODIFY", "old_path": "ci/pipeline.yaml", "new_path": "ci/pipeline.yaml", "diff": "@@ -77,16 +77,19 @@ groups:\n- e2e\n- rollout\n- eu-nl-1\n+ - na-us-1\n- name: admin\njobs:\n- admin_staging\n- rollout_admin\n- admin_eu-nl-1\n+ - admin_na-us-1\n- name: kubernikus-system\njobs:\n- staging_kubernikus-system\n- rollout_kubernikus-system\n- eu-nl-1_kubernikus-system\n+ - na-us-1_kubernikus-system\njobs:\n####################################################################################\n@@ -155,6 +158,29 @@ jobs:\non_failure:\n<<: *post_failure_to_slack\n+ - name: na-us-1\n+ serial: true\n+ plan:\n+ - aggregate:\n+ - get: secrets.git\n+ - get: pipeline.git\n+ - get: kubernikus.builds\n+ passed: [rollout]\n+ trigger: true\n+ - task: deploy\n+ file: pipeline.git/ci/task_helm_kubernikus.yaml\n+ params:\n+ OS_AUTH_URL: https://identity-3.na-us-1.cloud.sap/v3\n+ OS_USERNAME: {{kubernikus-na-us-1-username}}\n+ OS_PASSWORD: {{kubernikus-na-us-1-password}}\n+ OS_USER_DOMAIN_NAME: ccadmin\n+ OS_PROJECT_NAME: kubernikus\n+ OS_PROJECT_DOMAIN_NAME: ccadmin\n+ KUBERNIKUS_NAME: k-na-us-1\n+ KUBERNIKUS_URL: https://k-na-us-1.admin.cloud.sap\n+ on_failure:\n+ <<: *post_failure_to_slack\n+\n####################################################################################\n#\n# admin\n@@ -203,6 +229,24 @@ jobs:\non_failure:\n<<: *post_failure_to_slack\n+ - name: admin_na-us-1\n+ serial: true\n+ plan:\n+ - aggregate:\n+ - get: secrets.git\n+ - get: pipeline.git\n+ - get: kubernikus.builds\n+ passed: [rollout_admin]\n+ trigger: true\n+ - task: deploy\n+ file: kubernikus.builds/ci/task_helm-admin_kubernikus.yaml\n+ params:\n+ REGION: admin\n+ KUBERNIKUS_NAME: k-na-us-1\n+ GITHUB_TOKEN: ((github-access-token))\n+ on_failure:\n+ <<: *post_failure_to_slack\n+\n####################################################################################\n#\n# kubernikus-system\n@@ -258,3 +302,26 @@ jobs:\nKUBERNIKUS_URL: https://k-eu-nl-1.admin.cloud.sap\non_failure:\n<<: *post_failure_to_slack\n+\n+ - name: na-us-1_kubernikus-system\n+ serial: true\n+ plan:\n+ - aggregate:\n+ - get: secrets.git\n+ - get: pipeline.git\n+ - get: charts.git\n+ passed: [rollout_kubernikus-system]\n+ trigger: true\n+ - task: deploy\n+ file: pipeline.git/ci/task_helm_kubernikus-system.yaml\n+ params:\n+ OS_AUTH_URL: https://identity-3.na-us-1.cloud.sap/v3\n+ OS_USERNAME: {{kubernikus-na-us-1-username}}\n+ OS_PASSWORD: {{kubernikus-na-us-1-password}}\n+ OS_USER_DOMAIN_NAME: ccadmin\n+ OS_PROJECT_NAME: kubernikus\n+ OS_PROJECT_DOMAIN_NAME: ccadmin\n+ KUBERNIKUS_NAME: k-na-us-1\n+ KUBERNIKUS_URL: https://k-na-us-1.admin.cloud.sap\n+ on_failure:\n+ <<: *post_failure_to_slack\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds na-us-1 as productive region
596,240
09.11.2017 16:48:06
-3,600
46198c0ccc0c7e9466c26a4c2fa95a8eb3404646
adds inital regional setup
[ { "change_type": "MODIFY", "old_path": "docs/operations/controlplane.md", "new_path": "docs/operations/controlplane.md", "diff": "@@ -4,6 +4,21 @@ title: ControlPlane\n## Setting up a new Region\n+ * Create a new Openstack project, e.g. `ccadmin/kubernikus`\n+ * Create service user: `openstack user create kubernikus --domain Default t--password abc123`\n+ * Create a new network: `openstack network create kubernikus`\n+ * Create a subnet: `openstack subnet create --network kubernikus --subnet-range 198.18.0.0/24 kubernikus`\n+ * Create Router\n+ * Assign administrative roles: `openstack role add --user kubernikus --user-domain Default --domain ccadmin admin`\n+\n+```\n+openstack role add --user kubernikus --user-domain Default --project cloud_admin --project-domain ccadmin admin\n+openstack role add --user kubernikus --user-domain Default --project cloud_admin --project-domain ccadmin cloud_network_admin\n+openstack role add --user kubernikus --user-domain Default --project cloud_admin --project-domain ccadmin cloud_compute_admin\n+openstack role add --user kubernikus --user-domain Default --project cloud_admin --project-domain ccadmin cloud_dns_admin\n+```\n+\n+\n### Prepare Tiller with RBAC\n```\nkubectl -n kube-system create sa tiller\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds inital regional setup
596,230
13.11.2017 11:35:53
-3,600
ee59e190f89149e07ce2cabbbb9aca149691dff4
expose override url of get
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/get.go", "new_path": "pkg/cmd/kubernikusctl/get.go", "diff": "@@ -22,7 +22,7 @@ func NewGetCommand() *cobra.Command {\nRun: getRun,\n}\n- o.Openstack.BindFlags(c.PersistentFlags())\n+ o.BindFlags(c.PersistentFlags())\ncluster := get.NewClusterCommand(o)\nc.AddCommand(cluster)\nnodePool := get.NewNodePoolCommand(o)\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/get/common.go", "new_path": "pkg/cmd/kubernikusctl/get/common.go", "diff": "@@ -9,6 +9,7 @@ import (\n\"github.com/sapcc/kubernikus/pkg/cmd\"\n\"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/common\"\n\"github.com/spf13/cobra\"\n+ \"github.com/spf13/pflag\"\n)\ntype GetOptions struct {\n@@ -18,6 +19,11 @@ type GetOptions struct {\nKubernikus *common.KubernikusClient\n}\n+func (o *GetOptions) BindFlags(flags *pflag.FlagSet) {\n+ o.Openstack.BindFlags(flags)\n+ flags.StringVar(&o._url, \"url\", o._url, \"URL for Kubernikus API\")\n+}\n+\nfunc (o *GetOptions) PersistentPreRun(c *cobra.Command, args []string) {\ncmd.CheckError(o.Openstack.Validate(c, args))\ncmd.CheckError(o.Openstack.Setup())\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- expose override url of get
596,230
13.11.2017 11:45:46
-3,600
5bbcc56fd5810b595566bff4a8c31190a6ef7143
expose override url for create and delete
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/create.go", "new_path": "pkg/cmd/kubernikusctl/create.go", "diff": "@@ -21,7 +21,7 @@ func NewCreateCommand() *cobra.Command {\nPersistentPreRun: o.PersistentPreRun,\nRun: createRun,\n}\n- o.Openstack.BindFlags(c.PersistentFlags())\n+ o.BindFlags(c.PersistentFlags())\ncluster := create.NewClusterCommand(o)\nc.AddCommand(cluster)\nreturn c\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/create/common.go", "new_path": "pkg/cmd/kubernikusctl/create/common.go", "diff": "@@ -7,6 +7,7 @@ import (\n\"github.com/golang/glog\"\n\"github.com/pkg/errors\"\n\"github.com/spf13/cobra\"\n+ \"github.com/spf13/pflag\"\n\"github.com/sapcc/kubernikus/pkg/cmd\"\n\"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/common\"\n@@ -26,6 +27,12 @@ func (o *CreateOptions) PersistentPreRun(c *cobra.Command, args []string) {\ncmd.CheckError(o.Openstack.Authenticate())\n}\n+func (o *CreateOptions) BindFlags(flags *pflag.FlagSet) {\n+ o.Openstack.BindFlags(flags)\n+\n+ flags.StringVar(&o._url, \"url\", o._url, \"URL for Kubernikus API\")\n+}\n+\nfunc (o *CreateOptions) SetupKubernikusClient() error {\nvar err error\nif o._url == \"\" {\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/delete.go", "new_path": "pkg/cmd/kubernikusctl/delete.go", "diff": "@@ -22,7 +22,7 @@ func NewDeleteCommand() *cobra.Command {\nPersistentPreRun: o.PersistentPreRun,\nRun: deleteRun,\n}\n- o.Openstack.BindFlags(c.PersistentFlags())\n+ o.BindFlags(c.PersistentFlags())\ncluster := delete.NewClusterCommand(o)\nc.AddCommand(cluster)\nreturn c\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/delete/common.go", "new_path": "pkg/cmd/kubernikusctl/delete/common.go", "diff": "@@ -7,6 +7,7 @@ import (\n\"github.com/golang/glog\"\n\"github.com/pkg/errors\"\n\"github.com/spf13/cobra\"\n+ \"github.com/spf13/pflag\"\n\"github.com/sapcc/kubernikus/pkg/cmd\"\n\"github.com/sapcc/kubernikus/pkg/cmd/kubernikusctl/common\"\n@@ -25,6 +26,12 @@ func (o *DeleteOptions) PersistentPreRun(c *cobra.Command, args []string) {\ncmd.CheckError(o.Openstack.Authenticate())\n}\n+func (o *DeleteOptions) BindFlags(flags *pflag.FlagSet) {\n+ o.Openstack.BindFlags(flags)\n+\n+ flags.StringVar(&o._url, \"url\", o._url, \"URL for Kubernikus API\")\n+}\n+\nfunc (o *DeleteOptions) SetupKubernikusClient() error {\nvar err error\nif o._url == \"\" {\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- expose override url for create and delete
596,230
13.11.2017 14:19:29
-3,600
ce3ba190df9e8a64eb4c2aaaedc462638820e95d
refactor NewCommand logic to use options directly
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/create.go", "new_path": "pkg/cmd/kubernikusctl/create.go", "diff": "@@ -22,7 +22,6 @@ func NewCreateCommand() *cobra.Command {\nRun: createRun,\n}\no.BindFlags(c.PersistentFlags())\n- cluster := create.NewClusterCommand(o)\n- c.AddCommand(cluster)\n+ c.AddCommand(o.NewClusterCommand())\nreturn c\n}\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/create/cluster.go", "new_path": "pkg/cmd/kubernikusctl/create/cluster.go", "diff": "@@ -13,7 +13,7 @@ import (\n\"github.com/sapcc/kubernikus/pkg/cmd\"\n)\n-func NewClusterCommand(o CreateOptions) *cobra.Command {\n+func (o *CreateOptions) NewClusterCommand() *cobra.Command {\nc := &cobra.Command{\nUse: \"cluster\",\nShort: \"Creates a cluster defined in a spec expected at stdin\",\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/delete.go", "new_path": "pkg/cmd/kubernikusctl/delete.go", "diff": "@@ -23,7 +23,6 @@ func NewDeleteCommand() *cobra.Command {\nRun: deleteRun,\n}\no.BindFlags(c.PersistentFlags())\n- cluster := delete.NewClusterCommand(o)\n- c.AddCommand(cluster)\n+ c.AddCommand(o.NewClusterCommand())\nreturn c\n}\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/delete/cluster.go", "new_path": "pkg/cmd/kubernikusctl/delete/cluster.go", "diff": "@@ -9,7 +9,7 @@ import (\n\"github.com/sapcc/kubernikus/pkg/cmd\"\n)\n-func NewClusterCommand(o DeleteOptions) *cobra.Command {\n+func (o *DeleteOptions) NewClusterCommand() *cobra.Command {\nc := &cobra.Command{\nUse: \"cluster [name]\",\nShort: \"Deletes the cluster with the given name\",\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/get.go", "new_path": "pkg/cmd/kubernikusctl/get.go", "diff": "@@ -11,7 +11,7 @@ func getRun(c *cobra.Command, args []string) {\n}\nfunc NewGetCommand() *cobra.Command {\n- o := get.GetOptions{\n+ o := &get.GetOptions{\nOpenstack: common.NewOpenstackClient(),\n}\n@@ -23,9 +23,7 @@ func NewGetCommand() *cobra.Command {\n}\no.BindFlags(c.PersistentFlags())\n- cluster := get.NewClusterCommand(o)\n- c.AddCommand(cluster)\n- nodePool := get.NewNodePoolCommand(o)\n- c.AddCommand(nodePool)\n+ c.AddCommand(o.NewClusterCommand())\n+ c.AddCommand(o.NewNodePoolCommand())\nreturn c\n}\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/get/cluster.go", "new_path": "pkg/cmd/kubernikusctl/get/cluster.go", "diff": "@@ -8,7 +8,7 @@ import (\n\"github.com/spf13/cobra\"\n)\n-func NewClusterCommand(o GetOptions) *cobra.Command {\n+func (o *GetOptions) NewClusterCommand() *cobra.Command {\nc := &cobra.Command{\nUse: \"cluster [name]\",\nShort: \"Gets info about clusters\",\n@@ -21,6 +21,7 @@ func NewClusterCommand(o GetOptions) *cobra.Command {\n}\nfunc (o *GetOptions) clusterPreRun(c *cobra.Command, args []string) {\n+ glog.V(2).Infof(\"Get Cluster PR: %v\", o)\ncmd.CheckError(validateClusterCommandArgs(args))\ncmd.CheckError(o.SetupKubernikusClient())\n}\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/get/common.go", "new_path": "pkg/cmd/kubernikusctl/get/common.go", "diff": "@@ -25,19 +25,28 @@ func (o *GetOptions) BindFlags(flags *pflag.FlagSet) {\n}\nfunc (o *GetOptions) PersistentPreRun(c *cobra.Command, args []string) {\n+ glog.V(2).Infof(\"Get PPR: %v\", o)\ncmd.CheckError(o.Openstack.Validate(c, args))\ncmd.CheckError(o.Openstack.Setup())\ncmd.CheckError(o.Openstack.Authenticate())\n+ glog.V(2).Infof(\"Get PPR out: %v\", o)\n}\nfunc (o *GetOptions) SetupKubernikusClient() error {\nvar err error\n+ glog.V(2).Infof(\"SetupKubernikusClient called with url: %v\", o._url)\nif o._url == \"\" {\nfmt.Println(\"Auto-Detecting Kubernikus Host ...\")\nif o.url, err = o.Openstack.DefaultKubernikusURL(); err != nil {\nglog.V(2).Infof(\"Error detecting kubernikust host: %+v\", err)\nreturn errors.Errorf(\"You need to provide --url. Auto-Detection failed.\")\n}\n+ } else {\n+ o.url, err = url.Parse(o._url)\n+ if err != nil {\n+ glog.V(2).Infof(\"Error parsing url: %v\", o._url)\n+ return errors.Wrap(err, \"Error parsing url\")\n+ }\n}\nglog.V(2).Infof(\"Setting up kubernikus client at %v.\", o.url)\no.Kubernikus = common.NewKubernikusClient(o.url, o.Openstack.Provider.TokenID)\n" }, { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikusctl/get/nodepool.go", "new_path": "pkg/cmd/kubernikusctl/get/nodepool.go", "diff": "@@ -9,7 +9,7 @@ import (\n\"github.com/sapcc/kubernikus/pkg/cmd/printers\"\n)\n-func NewNodePoolCommand(o GetOptions) *cobra.Command {\n+func (o *GetOptions) NewNodePoolCommand() *cobra.Command {\nc := &cobra.Command{\nUse: \"nodepool [cluster] [name]\",\nShort: \"Gets info about nodepools of a cluster\",\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- refactor NewCommand logic to use options directly
596,240
13.11.2017 09:27:37
-3,600
4ae9b333d5814fbe5898e09e50aa5583d9bd2462
fixes swagger link
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "diff": "<div class=\"saplogo\"></div>\n<div class=\"saplinks\">\n<div><a href=\"{{ \"guide/getting_started\" | relURL }}\">Docs</a></div>\n- <div><a href=\"{{ \"guide/getting_started\" | relURL }}\">API</a></div>\n+ <div><a href=\"{{ \"/swagger\" | relURL }}\">API</a></div>\n{{ with .Site.Social.github }}\n<div class=\"button button-github\" role=\"button\" aria-label=\"GitHub\">\n<a href=\"https://github.com/{{ . }}\" title=\"@{{ . }} on GitHub\" target=\"_blank\" class=\"toggle-button icon icon-github\"></a>\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes swagger link
596,240
13.11.2017 13:07:16
-3,600
caf8b91d9a944b02e25c652b86a18813dcd1e526
adds notes for openstack setup
[ { "change_type": "MODIFY", "old_path": "docs/operations/controlplane.md", "new_path": "docs/operations/controlplane.md", "diff": "@@ -8,6 +8,7 @@ title: ControlPlane\n* Create service user: `openstack user create kubernikus --domain Default t--password abc123`\n* Create a new network: `openstack network create kubernikus`\n* Create a subnet: `openstack subnet create --network kubernikus --subnet-range 198.18.0.0/24 kubernikus`\n+ * Create a role: `openstack role create kubernetes_admin`\n* Create Router\n* Assign administrative roles: `openstack role add --user kubernikus --user-domain Default --domain ccadmin admin`\n@@ -18,6 +19,8 @@ openstack role add --user kubernikus --user-domain Default --project cloud_admin\nopenstack role add --user kubernikus --user-domain Default --project cloud_admin --project-domain ccadmin cloud_dns_admin\n```\n+ * Create Openstack Service: `openstack service create --name kubernikus --description \"Kubernikus Service\" kubernikus`\n+ * Create Endpoint: `openstack endpoint create --region na-us-1 kubernikus public https://kubernikus.na-us-1.cloud.sap`\n### Prepare Tiller with RBAC\n```\n@@ -32,6 +35,7 @@ Initial kubeconfig setup:\n```\nkubernikusctl auth init --url https://k-staging.admin.cloud.sap --name k-staging --user-domain-name ccadmin --project-name kubernikus-staging --project-domain-name ccadmin --auth-url https://identity-3.eu-nl-1.cloud.sap --username <USER>\nkubernikusctl auth init --url https://k-eu-nl-1.admin.cloud.sap --name k-eu-nl-1 --user-domain-name ccadmin --project-name kubernikus --project-domain-name ccadmin --auth-url https://identity-3.eu-nl-1.cloud.sap --username <USER>\n+kubernikusctl auth init --url https://k-na-us-1.admin.cloud.sap --name k-na-us-1 --user-domain-name ccadmin --project-name kubernikus --project-domain-name ccadmin --auth-url https://identity-3.na-us-1.cloud.sap --username <USER>\n```\nRefresh certificates with:\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds notes for openstack setup
596,240
13.11.2017 16:08:18
-3,600
89f93669eea1019661ccff5a8c9a7a4a5f2a7a94
removes non-functional link to internal slack
[ { "change_type": "MODIFY", "old_path": "README.md", "new_path": "README.md", "diff": "@@ -43,7 +43,6 @@ It allows to easily manage Kubernetes clusters that are natively integrated with\nMore documentation can be found at:\n* [blob/master/docs/](blob/master/docs/)\n- * [https://sapcc.github.io/kubernikus](https://sapcc.github.io/kubernikus)\n## Contact\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
removes non-functional link to internal slack
596,240
13.11.2017 16:10:10
-3,600
e73c95efb407f81d9e9259663ee0f71bb142266f
adds version link
[ { "change_type": "MODIFY", "old_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "new_path": "contrib/kubernikus-docs-builder/data/layouts/index.html", "diff": "<div class=\"saplogo\"></div>\n<div class=\"saplinks\">\n<div><a href=\"{{ \"guide/getting_started\" | relURL }}\">Docs</a></div>\n- <div><a href=\"{{ \"/swagger\" | relURL }}\">API</a></div>\n+ <div><a href=\"/swagger\">API</a></div>\n+ <div><a href=\"/info\">Version</a></div>\n{{ with .Site.Social.github }}\n<div class=\"button button-github\" role=\"button\" aria-label=\"GitHub\">\n<a href=\"https://github.com/{{ . }}\" title=\"@{{ . }} on GitHub\" target=\"_blank\" class=\"toggle-button icon icon-github\"></a>\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds version link
596,240
13.11.2017 16:40:25
-3,600
1444e17ce345bb2e63c8a72c73ccc8aa9269a093
works around helm bug. see:
[ { "change_type": "DELETE", "old_path": "charts/kubernikus/templates/namespace.yaml", "new_path": null, "diff": "-apiVersion: v1\n-kind: Namespace\n-metadata:\n- name: kubernikus\n" }, { "change_type": "MODIFY", "old_path": "pkg/controller/ground.go", "new_path": "pkg/controller/ground.go", "diff": "@@ -308,6 +308,10 @@ func (op *GroundControl) createKluster(kluster *v1.Kluster) error {\nglog.Infof(\"Installing helm release %s\", kluster.GetName())\nglog.V(3).Infof(\"Chart values:\\n%s\", string(rawValues))\n+ if err := op.CreateNamespaceIfNeeded(kluster.Namespace); err != nil {\n+ return err\n+ }\n+\n_, err = op.Clients.Helm.InstallRelease(path.Join(op.Config.Helm.ChartDirectory, \"kube-master\"), kluster.Namespace, helm.ValueOverrides(rawValues), helm.ReleaseName(kluster.GetName()))\nreturn err\n}\n@@ -472,3 +476,20 @@ func (op *GroundControl) podUpdate(cur, old interface{}) {\n}\n}\n}\n+\n+func (op *GroundControl) CreateNamespaceIfNeeded(ns string) error {\n+ if _, err := op.Clients.Kubernetes.Core().Namespaces().Get(ns, metav1.GetOptions{}); err == nil {\n+ return nil\n+ }\n+ newNs := &api_v1.Namespace{\n+ ObjectMeta: metav1.ObjectMeta{\n+ Name: ns,\n+ Namespace: \"\",\n+ },\n+ }\n+ _, err := op.Clients.Kubernetes.Core().Namespaces().Create(newNs)\n+ if err != nil && apierrors.IsAlreadyExists(err) {\n+ err = nil\n+ }\n+ return err\n+}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
works around helm bug. see: https://github.com/kubernetes/helm/issues/2013
596,240
13.11.2017 17:22:58
-3,600
08736e20cb0ae9df68cb8de4155b3949f41dec8c
initializes status with default values
[ { "change_type": "MODIFY", "old_path": "pkg/api/spec/embedded_spec.go", "new_path": "pkg/api/spec/embedded_spec.go", "diff": "@@ -439,19 +439,23 @@ func init() {\n\"type\": \"object\",\n\"properties\": {\n\"healthy\": {\n- \"type\": \"integer\"\n+ \"type\": \"integer\",\n+ \"default\": 0\n},\n\"name\": {\n\"type\": \"string\"\n},\n\"running\": {\n- \"type\": \"integer\"\n+ \"type\": \"integer\",\n+ \"default\": 0\n},\n\"schedulable\": {\n- \"type\": \"integer\"\n+ \"type\": \"integer\",\n+ \"default\": 0\n},\n\"size\": {\n- \"type\": \"integer\"\n+ \"type\": \"integer\",\n+ \"default\": 0\n}\n},\n\"x-nullable\": false\n" }, { "change_type": "MODIFY", "old_path": "swagger.yml", "new_path": "swagger.yml", "diff": "@@ -316,12 +316,16 @@ definitions:\ntype: string\nsize:\ntype: integer\n+ default: 0\nrunning:\ntype: integer\n+ default: 0\nhealthy:\ntype: integer\n+ default: 0\nschedulable:\ntype: integer\n+ default: 0\nCredentials:\ntype: object\nproperties:\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
initializes status with default values
596,240
14.11.2017 10:12:36
-3,600
32f2a1f901c94e65d9f359a56cb78729dd43bf72
tries again to fix travis notifications
[ { "change_type": "MODIFY", "old_path": ".travis.yml", "new_path": ".travis.yml", "diff": "@@ -23,10 +23,10 @@ after_success:\nnotifications:\nslack:\n- on_success: always\n+ on_success: change\non_failure: always\nrooms:\n- - secure: $SLACK_KUBERNIKUS\n+ secure: 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\ndeploy:\nprovider: pages\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
tries again to fix travis notifications
596,240
14.11.2017 15:22:47
-3,600
95894a14601e546a78d1a28b5206d6daa309c94d
tries again to pass no security group at all
[ { "change_type": "MODIFY", "old_path": "pkg/client/openstack/client.go", "new_path": "pkg/client/openstack/client.go", "diff": "@@ -585,7 +585,6 @@ func (c *client) CreateNode(kluster *kubernikus_v1.Kluster, pool *models.NodePoo\nImageName: pool.Image,\nNetworks: []servers.Network{servers.Network{UUID: kluster.Spec.Openstack.NetworkID}},\nUserData: userData,\n- SecurityGroups: []string{\"default\"},\nServiceClient: client,\n}).Extract()\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
tries again to pass no security group at all
596,240
14.11.2017 16:01:31
-3,600
6cce0b9dbbce9fa4ad666431cd475c070684d281
tightens node pool detection. also fixes
[ { "change_type": "MODIFY", "old_path": "pkg/client/openstack/client.go", "new_path": "pkg/client/openstack/client.go", "diff": "@@ -549,7 +549,7 @@ func (c *client) GetNodes(kluster *kubernikus_v1.Kluster, pool *models.NodePool)\nreturn nodes, err\n}\n- prefix := fmt.Sprintf(\"%v-%v\", kluster.Spec.Name, pool_id)\n+ prefix := fmt.Sprintf(\"%v-%v-\", kluster.Spec.Name, pool_id)\nopts := servers.ListOpts{Name: prefix}\nservers.List(client, opts).EachPage(func(page pagination.Page) (bool, error) {\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
tightens node pool detection. also fixes #79
596,230
17.11.2017 16:30:04
-3,600
3b744559515fa40fccd85b297d5c91536a36b7c0
first throw
[ { "change_type": "ADD", "old_path": null, "new_path": "docs/development/helm_dev.md", "diff": "+---\n+title: Developing Helm Charts\n+---\n+\n+## Helm value generation\n+\n+When developing on the Helm charts you can generate the values file (including certs) via\n+```kubernikus helm --with --many --options > values.yaml```\n+\n+You will need to provide all of the options which are:\n+``` --api https://k-eu-nl-1.admin.cloud.sap``` the region of kubernikus you are interacting with\n+``` --auth-url https://identity-3.eu-nl-1.cloud.sap/v3/``` the identity instance of that region (_v3_ is important)\n+``` --auth-project marian``` the name of the project you are interacting with\n+``` --auth-domain kubernikus``` the domain of the user you want to use\n+``` --project-id 513be7d11ee64ed7826f5c7c4cfdf10c```\n+``` --auth-password supersecret``` the password of the user\n+``` --auth-project-domain monsoon3``` the domain of the project\n+``` --auth-username techuser1``` the user with which to interact\n+\n+### Chaging values.yaml\n+After the fact some values have to be added to the ```values.yaml```:\n+```\n+api:\n+ apiserverHost: m2-513be7d11ee64ed7826f5c7c4cfdf10c.kubernikus.eu-nl-1.cloud.sap\n+ wormholeHost: m2-513be7d11ee64ed7826f5c7c4cfdf10c-wormhole.kubernikus.eu-nl-1.cloud.sap\n+\n+openstack:\n+ region: eu-nl-1\n+ lbSubnetID: \"4e16419d-eb9f-4245-bcd3-179067c59298\"\n+ routerID: \"757e348c-6e10-457c-b418-81933725c077\"\n+```\n+The api part represents the host of the ingress definition and has to have some form:\n+```\n+<clustername>-<projectid>.kubernikus.<region>.cloud.sap\n+<clustername>-<projectid>-wormhole.kubernikus.<region>.cloud.sap\n+```\n+\n+These openstack things need also be added:\n+```region``` the region in which this is running\n+```lbSubnetID``` the private _subnet_ to which the loadbalancer should be added\n+```routerID``` the id of your router.\n+\n+### The user\n+\n+The technical user which you use to interact has to have a default project set. This is very problematic as we have no way of changing a normal user whcih is in LDAP.\n+\n+Thus the user has to be a technical user and created via commandline.\n+To be able to do this it has to be created outside of any LDAP configured domain.\n+\n+```\n+openstack user create --with --many --options\n+```\n+Will help to create a user inside the ```kubernikus``` domain with a default project set to the project id.\n+\n+```openstack role list``` and ```openstack role add``` will need to be used to get the user the necessary rights inside your target project.\n+```\n+admin\n+kubernetes_admin\n+member\n+network_admin\n+compute_admin\n+```\n+Now you should be able to see your tech user in elektra including it's roles.\n+\n+## Installing\n+\n+```\n+helm install --name m2-513be7d11ee64ed7826f5c7c4cfdf10c charts/kube-master/ --values values.yaml --namespace kubernikus\n+```\n+Should now suffice the name is your clustername and the projectid.\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
-- first throw
596,240
27.11.2017 08:59:20
-3,600
0fa98fdf6481a240d748e174c0188bdcce71b0b8
adds pre-scaled logos
[ { "change_type": "ADD", "old_path": "assets/kubernikus_14x14.png", "new_path": "assets/kubernikus_14x14.png", "diff": "Binary files /dev/null and b/assets/kubernikus_14x14.png differ\n" }, { "change_type": "ADD", "old_path": "assets/kubernikus_192x192.png", "new_path": "assets/kubernikus_192x192.png", "diff": "Binary files /dev/null and b/assets/kubernikus_192x192.png differ\n" }, { "change_type": "ADD", "old_path": "assets/kubernikus_64x64.png", "new_path": "assets/kubernikus_64x64.png", "diff": "Binary files /dev/null and b/assets/kubernikus_64x64.png differ\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds pre-scaled logos
596,240
27.11.2017 14:38:10
-3,600
3ae3e57fbb119c0503d2d8da6b2b1d609ab89d8f
adds basic launchctl metrics
[ { "change_type": "MODIFY", "old_path": "pkg/cmd/kubernikus/operator.go", "new_path": "pkg/cmd/kubernikus/operator.go", "diff": "@@ -12,6 +12,7 @@ import (\n\"github.com/golang/glog\"\n\"github.com/sapcc/kubernikus/pkg/cmd\"\n\"github.com/sapcc/kubernikus/pkg/controller\"\n+ \"github.com/sapcc/kubernikus/pkg/controller/metrics\"\n\"github.com/spf13/cobra\"\n\"github.com/spf13/pflag\"\n)\n@@ -97,7 +98,7 @@ func (o *Options) Run(c *cobra.Command) error {\nwg := &sync.WaitGroup{} // Goroutines can add themselves to this to be waited on\ngo controller.NewKubernikusOperator(&o.KubernikusOperatorOptions, logger).Run(stop, wg)\n- go controller.ExposeMetrics(o.MetricPort, stop, wg)\n+ go metrics.ExposeMetrics(o.MetricPort, stop, wg)\n<-sigs // Wait for signals (this hangs until a signal arrives)\nglog.Info(\"Shutting down...\")\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/controller/base/instrumenting.go", "diff": "+package base\n+\n+import (\n+ \"time\"\n+\n+ \"github.com/prometheus/client_golang/prometheus\"\n+ \"github.com/sapcc/kubernikus/pkg/apis/kubernikus/v1\"\n+)\n+\n+type InstrumentingReconciler struct {\n+ Reconciler\n+ ReconciliationCount *prometheus.CounterVec\n+ ReconciliationLatency *prometheus.HistogramVec\n+}\n+\n+func (ir *InstrumentingReconciler) Reconcile(kluster *v1.Kluster) (requeue bool, err error) {\n+ defer func(begin time.Time) {\n+ ir.ReconciliationCount.With(\n+ prometheus.Labels{\n+ \"kluster\": kluster.Spec.Name,\n+ \"project\": kluster.Account(),\n+ }).Add(1)\n+ ir.ReconciliationLatency.With(\n+ prometheus.Labels{\n+ \"kluster\": kluster.Spec.Name,\n+ \"project\": kluster.Account(),\n+ }).Observe(time.Since(begin).Seconds())\n+ }(time.Now())\n+ return ir.Reconciler.Reconcile(kluster)\n+}\n" }, { "change_type": "MODIFY", "old_path": "pkg/controller/base/logging.go", "new_path": "pkg/controller/base/logging.go", "diff": "@@ -19,18 +19,6 @@ type EventingReconciler struct {\nReconciler\n}\n-type InstrumentedReconciler struct {\n- Reconciler\n-}\n-\n-func (r *InstrumentedReconciler) Reconcile(kluster *v1.Kluster) (requeue bool, err error) {\n- defer func() {\n- RECONCILLIATION_COUNTER = RECONCILLIATION_COUNTER + 1\n- fmt.Printf(\"Metrics: Reconciled %v kluster\\n\", RECONCILLIATION_COUNTER)\n- }()\n- return r.Reconciler.Reconcile(kluster)\n-}\n-\nfunc (r *EventingReconciler) Reconcile(kluster *v1.Kluster) (requeue bool, err error) {\nfmt.Printf(\"EVENT: Reconciled %v\\n\", kluster.Name)\nreturn r.Reconciler.Reconcile(kluster)\n" }, { "change_type": "MODIFY", "old_path": "pkg/controller/ground.go", "new_path": "pkg/controller/ground.go", "diff": "@@ -25,6 +25,7 @@ import (\n\"github.com/sapcc/kubernikus/pkg/client/kubernetes\"\n\"github.com/sapcc/kubernikus/pkg/controller/config\"\n\"github.com/sapcc/kubernikus/pkg/controller/ground\"\n+ \"github.com/sapcc/kubernikus/pkg/controller/metrics\"\n\"github.com/sapcc/kubernikus/pkg/util\"\nhelm_util \"github.com/sapcc/kubernikus/pkg/util/helm\"\nwaitutil \"github.com/sapcc/kubernikus/pkg/util/wait\"\n@@ -136,8 +137,8 @@ func (op *GroundControl) handler(key string) error {\n} else {\nkluster := obj.(*v1.Kluster)\nglog.V(5).Infof(\"Handling kluster %v in phase %q\", kluster.Name, kluster.Status.Phase)\n- setMetricKlusterInfo(kluster.GetNamespace(),kluster.GetName(),kluster.Status.Version,kluster.Spec.Openstack.ProjectID,kluster.GetAnnotations(),kluster.GetLabels())\n- setMetricKlusterStatusPhase(kluster.GetName(), kluster.Status.Phase)\n+ metrics.SetMetricKlusterInfo(kluster.GetNamespace(), kluster.GetName(), kluster.Status.Version, kluster.Spec.Openstack.ProjectID, kluster.GetAnnotations(), kluster.GetLabels())\n+ metrics.SetMetricKlusterStatusPhase(kluster.GetName(), kluster.Status.Phase)\nswitch phase := kluster.Status.Phase; phase {\ncase models.KlusterPhasePending:\n" }, { "change_type": "MODIFY", "old_path": "pkg/controller/launch/controller.go", "new_path": "pkg/controller/launch/controller.go", "diff": "@@ -6,6 +6,7 @@ import (\n\"github.com/sapcc/kubernikus/pkg/client/openstack\"\n\"github.com/sapcc/kubernikus/pkg/controller/base\"\n\"github.com/sapcc/kubernikus/pkg/controller/config\"\n+ \"github.com/sapcc/kubernikus/pkg/controller/metrics\"\n\"github.com/sapcc/kubernikus/pkg/templates\"\n\"github.com/go-kit/kit/log\"\n@@ -52,7 +53,11 @@ func NewController(factories config.Factories, clients config.Clients, recorder\nreconciler = &LaunchReconciler{clients, recorder, logger}\nreconciler = &base.LoggingReconciler{reconciler, logger}\nreconciler = &base.EventingReconciler{reconciler}\n- reconciler = &base.InstrumentedReconciler{reconciler}\n+ reconciler = &base.InstrumentingReconciler{\n+ reconciler,\n+ metrics.KlusterReconcilicationCount,\n+ metrics.KlusterReconciliationLatency,\n+ }\nreturn base.NewController(factories, clients, reconciler, logger)\n}\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/controller/metrics/launch.go", "diff": "+package metrics\n+\n+import \"github.com/prometheus/client_golang/prometheus\"\n+\n+var KlusterReconcilicationCount = prometheus.NewCounterVec(\n+ prometheus.CounterOpts{\n+ Namespace: \"kubernikus\",\n+ Subsystem: \"launch\",\n+ Name: \"kluster_reconciliation_count\",\n+ Help: \"Number of reconcilitations.\"},\n+ []string{\"kluster\", \"project\"})\n+\n+var KlusterReconciliationLatency = prometheus.NewHistogramVec(\n+ prometheus.HistogramOpts{\n+ Namespace: \"kubernikus\",\n+ Subsystem: \"launch\",\n+ Name: \"kluster_reconciliation_latency_microseconds\",\n+ Help: \"Total duration of reconciliation in microseconds.\",\n+ },\n+ []string{\"kluster\", \"project\"})\n" }, { "change_type": "RENAME", "old_path": "pkg/controller/metrics.go", "new_path": "pkg/controller/metrics/metrics.go", "diff": "-package controller\n+package metrics\nimport (\n\"fmt\"\n@@ -58,7 +58,7 @@ var nodePoolStatus = prometheus.NewGaugeVec(\n[]string{\"kluster_id\", \"node_pool\", \"status\"},\n)\n-func setMetricKlusterInfo(namespace, name, version, projectID string, annotations, labels map[string]string) {\n+func SetMetricKlusterInfo(namespace, name, version, projectID string, annotations, labels map[string]string) {\npromLabels := prometheus.Labels{\n\"kluster_namespace\": namespace,\n\"kluster_name\": name,\n@@ -77,7 +77,7 @@ kubernikus_kluster_status_phase{\"kluster_id\"=\"<id>\",\"phase\"=\"running\"} 0\nkubernikus_kluster_status_phase{\"kluster_id\"=\"<id>\",\"phase\"=\"pending\"} 0\nkubernikus_kluster_status_phase{\"kluster_id\"=\"<id>\",\"phase\"=\"terminating\"} 0\n*/\n-func setMetricKlusterStatusPhase(klusterName string, klusterPhase models.KlusterPhase) {\n+func SetMetricKlusterStatusPhase(klusterName string, klusterPhase models.KlusterPhase) {\n// Set current phase to 1, others to 0\nfor _, phase := range klusterPhases {\nlabels := prometheus.Labels{\n@@ -147,6 +147,8 @@ func init() {\nklusterStatusPhase,\nnodePoolSize,\nnodePoolStatus,\n+ KlusterReconcilicationCount,\n+ KlusterReconciliationLatency,\n)\n}\n" }, { "change_type": "RENAME", "old_path": "pkg/controller/metrics_test.go", "new_path": "pkg/controller/metrics/metrics_test.go", "diff": "-package controller\n+package metrics\nimport (\n\"bytes\"\n@@ -17,28 +17,24 @@ import (\nfunc TestMetrics(t *testing.T) {\nexpectedMetrics := map[prometheus.Collector]string{\n- nodePoolSize:\n- `\n+ nodePoolSize: `\n# HELP kubernikus_node_pool_size size of a node pool\n# TYPE kubernikus_node_pool_size gauge\nkubernikus_node_pool_size{flavor_name=\"flavorName\",image_name=\"imageName\",kluster_id=\"klusterID\",node_pool=\"nodePoolName\"} 3\n`,\n- nodePoolStatus:\n- `\n+ nodePoolStatus: `\n# HELP kubernikus_node_pool_status status of the node pool and the number of nodes nodes in that status\n# TYPE kubernikus_node_pool_status gauge\nkubernikus_node_pool_status{kluster_id=\"klusterID\",node_pool=\"nodePoolName\",status=\"ready\"} 2\nkubernikus_node_pool_status{kluster_id=\"klusterID\",node_pool=\"nodePoolName\",status=\"running\"} 2\nkubernikus_node_pool_status{kluster_id=\"klusterID\",node_pool=\"nodePoolName\",status=\"starting\"} 1\n`,\n- klusterInfo:\n- `\n+ klusterInfo: `\n# HELP kubernikus_kluster_info detailed information on a kluster\n# TYPE kubernikus_kluster_info gauge\nkubernikus_kluster_info{account=\"account\",creator=\"D012345\",kluster_name=\"klusterName\",kluster_namespace=\"namespace\",kluster_version=\"version\",project_id=\"projectID\"} 1\n`,\n- klusterStatusPhase:\n- `\n+ klusterStatusPhase: `\n# HELP kubernikus_kluster_status_phase the phase the kluster is currently in\n# TYPE kubernikus_kluster_status_phase gauge\nkubernikus_kluster_status_phase{kluster_id=\"klusterID\",phase=\"Pending\"} 0\n@@ -54,7 +50,6 @@ kubernikus_kluster_status_phase{kluster_id=\"klusterID\",phase=\"Terminating\"} 0\nsetMetricKlusterInfo(\"namespace\", \"klusterName\", \"version\", \"projectID\", map[string]string{\"creator\": \"D012345\"}, map[string]string{\"account\": \"account\"})\nsetMetricKlusterStatusPhase(\"klusterID\", models.KlusterPhaseRunning)\n-\nregistry := prometheus.NewPedanticRegistry()\nfor collector, expectedMetricString := range expectedMetrics {\n// register the metric we're checking right now\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
adds basic launchctl metrics
596,240
27.11.2017 15:13:33
-3,600
71ad34718dfbbdb862c8daf12ca670154d8a3a3d
uses summary instead of histogram
[ { "change_type": "MODIFY", "old_path": "pkg/controller/base/instrumenting.go", "new_path": "pkg/controller/base/instrumenting.go", "diff": "@@ -10,7 +10,7 @@ import (\ntype InstrumentingReconciler struct {\nReconciler\nReconciliationCount *prometheus.CounterVec\n- ReconciliationLatency *prometheus.HistogramVec\n+ ReconciliationLatency *prometheus.SummaryVec\n}\nfunc (ir *InstrumentingReconciler) Reconcile(kluster *v1.Kluster) (requeue bool, err error) {\n" }, { "change_type": "MODIFY", "old_path": "pkg/controller/metrics/launch.go", "new_path": "pkg/controller/metrics/launch.go", "diff": "@@ -6,15 +6,15 @@ var KlusterReconcilicationCount = prometheus.NewCounterVec(\nprometheus.CounterOpts{\nNamespace: \"kubernikus\",\nSubsystem: \"launch\",\n- Name: \"kluster_reconciliation_count\",\n+ Name: \"reconciliation_count\",\nHelp: \"Number of reconcilitations.\"},\n[]string{\"kluster\", \"project\"})\n-var KlusterReconciliationLatency = prometheus.NewHistogramVec(\n- prometheus.HistogramOpts{\n+var KlusterReconciliationLatency = prometheus.NewSummaryVec(\n+ prometheus.SummaryOpts{\nNamespace: \"kubernikus\",\nSubsystem: \"launch\",\n- Name: \"kluster_reconciliation_latency_microseconds\",\n+ Name: \"reconciliation_latency_microseconds\",\nHelp: \"Total duration of reconciliation in microseconds.\",\n},\n[]string{\"kluster\", \"project\"})\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
uses summary instead of histogram
596,240
27.11.2017 16:24:48
-3,600
70e1503ee5af097f6a346121df8bc7f3dee3f0b0
removes klusters and ids from metrics
[ { "change_type": "MODIFY", "old_path": "pkg/controller/base/instrumenting.go", "new_path": "pkg/controller/base/instrumenting.go", "diff": "@@ -9,22 +9,36 @@ import (\ntype InstrumentingReconciler struct {\nReconciler\n- ReconciliationCount *prometheus.CounterVec\n- ReconciliationLatency *prometheus.SummaryVec\n+\n+ Latency *prometheus.SummaryVec\n+ Total *prometheus.CounterVec\n+ Successful *prometheus.CounterVec\n+ Failed *prometheus.CounterVec\n}\nfunc (ir *InstrumentingReconciler) Reconcile(kluster *v1.Kluster) (requeue bool, err error) {\ndefer func(begin time.Time) {\n- ir.ReconciliationCount.With(\n+ ir.Latency.With(\n+ prometheus.Labels{\n+ \"method\": \"Reconcile\",\n+ }).Observe(time.Since(begin).Seconds())\n+\n+ ir.Total.With(\n+ prometheus.Labels{\n+ \"method\": \"Reconcile\",\n+ }).Add(1)\n+\n+ if err != nil {\n+ ir.Failed.With(\nprometheus.Labels{\n- \"kluster\": kluster.Spec.Name,\n- \"project\": kluster.Account(),\n+ \"method\": \"Reconcile\",\n}).Add(1)\n- ir.ReconciliationLatency.With(\n+ } else {\n+ ir.Successful.With(\nprometheus.Labels{\n- \"kluster\": kluster.Spec.Name,\n- \"project\": kluster.Account(),\n- }).Observe(time.Since(begin).Seconds())\n+ \"method\": \"Reconcile\",\n+ }).Add(1)\n+ }\n}(time.Now())\nreturn ir.Reconciler.Reconcile(kluster)\n}\n" }, { "change_type": "MODIFY", "old_path": "pkg/controller/launch/controller.go", "new_path": "pkg/controller/launch/controller.go", "diff": "@@ -55,8 +55,10 @@ func NewController(factories config.Factories, clients config.Clients, recorder\nreconciler = &base.EventingReconciler{reconciler}\nreconciler = &base.InstrumentingReconciler{\nreconciler,\n- metrics.KlusterReconcilicationCount,\n- metrics.KlusterReconciliationLatency,\n+ metrics.LaunchOperationsLatency,\n+ metrics.LaunchOperationsTotal,\n+ metrics.LaunchSuccessfulOperationsTotal,\n+ metrics.LaunchFailedOperationsTotal,\n}\nreturn base.NewController(factories, clients, reconciler, logger)\n" }, { "change_type": "ADD", "old_path": null, "new_path": "pkg/controller/launch/instrumenting.go", "diff": "+package launch\n+\n+import (\n+ \"time\"\n+\n+ \"github.com/prometheus/client_golang/prometheus\"\n+)\n+\n+type InstrumentingPoolManager struct {\n+ PoolManager PoolManager\n+\n+ Latency *prometheus.SummaryVec\n+ Total *prometheus.CounterVec\n+ Successful *prometheus.CounterVec\n+ Failed *prometheus.CounterVec\n+}\n+\n+func (pm *InstrumentingPoolManager) GetStatus() (status *PoolStatus, err error) {\n+ defer func(begin time.Time) {\n+ pm.Latency.With(\n+ prometheus.Labels{\n+ \"method\": \"GetStatus\",\n+ }).Observe(time.Since(begin).Seconds())\n+\n+ pm.Total.With(\n+ prometheus.Labels{\n+ \"method\": \"GetStatus\",\n+ }).Add(1)\n+\n+ if err != nil {\n+ pm.Failed.With(\n+ prometheus.Labels{\n+ \"method\": \"GetStatus\",\n+ }).Add(1)\n+ } else {\n+ pm.Successful.With(\n+ prometheus.Labels{\n+ \"method\": \"GetStatus\",\n+ }).Add(1)\n+ }\n+ }(time.Now())\n+ return pm.PoolManager.GetStatus()\n+}\n+\n+func (pm *InstrumentingPoolManager) SetStatus(status *PoolStatus) (err error) {\n+ defer func(begin time.Time) {\n+ pm.Latency.With(\n+ prometheus.Labels{\n+ \"method\": \"SetStatus\",\n+ }).Observe(time.Since(begin).Seconds())\n+\n+ pm.Total.With(\n+ prometheus.Labels{\n+ \"method\": \"SetStatus\",\n+ }).Add(1)\n+\n+ if err != nil {\n+ pm.Failed.With(\n+ prometheus.Labels{\n+ \"method\": \"SetStatus\",\n+ }).Add(1)\n+ } else {\n+ pm.Successful.With(\n+ prometheus.Labels{\n+ \"method\": \"SetStatus\",\n+ }).Add(1)\n+ }\n+ }(time.Now())\n+ return pm.PoolManager.SetStatus(status)\n+}\n+\n+func (pm *InstrumentingPoolManager) CreateNode() (id string, err error) {\n+ defer func(begin time.Time) {\n+ pm.Latency.With(\n+ prometheus.Labels{\n+ \"method\": \"CreateNode\",\n+ }).Observe(time.Since(begin).Seconds())\n+\n+ pm.Total.With(\n+ prometheus.Labels{\n+ \"method\": \"CreateNode\",\n+ }).Add(1)\n+\n+ if err != nil {\n+ pm.Failed.With(\n+ prometheus.Labels{\n+ \"method\": \"CreateNode\",\n+ }).Add(1)\n+ } else {\n+ pm.Successful.With(\n+ prometheus.Labels{\n+ \"method\": \"CreateNode\",\n+ }).Add(1)\n+ }\n+ }(time.Now())\n+\n+ return pm.PoolManager.CreateNode()\n+}\n+\n+func (pm *InstrumentingPoolManager) DeleteNode(id string) (err error) {\n+ defer func(begin time.Time) {\n+ pm.Latency.With(\n+ prometheus.Labels{\n+ \"method\": \"DeleteNode\",\n+ }).Observe(time.Since(begin).Seconds())\n+\n+ pm.Total.With(\n+ prometheus.Labels{\n+ \"method\": \"DeleteNode\",\n+ }).Add(1)\n+\n+ if err != nil {\n+ pm.Failed.With(\n+ prometheus.Labels{\n+ \"method\": \"DeleteNode\",\n+ }).Add(1)\n+ } else {\n+ pm.Successful.With(\n+ prometheus.Labels{\n+ \"method\": \"DeleteNode\",\n+ }).Add(1)\n+ }\n+ }(time.Now())\n+\n+ return pm.PoolManager.DeleteNode(id)\n+}\n" }, { "change_type": "MODIFY", "old_path": "pkg/controller/metrics/launch.go", "new_path": "pkg/controller/metrics/launch.go", "diff": "@@ -2,19 +2,35 @@ package metrics\nimport \"github.com/prometheus/client_golang/prometheus\"\n-var KlusterReconcilicationCount = prometheus.NewCounterVec(\n+var LaunchOperationsLatency = prometheus.NewSummaryVec(\n+ prometheus.SummaryOpts{\n+ Namespace: \"kubernikus\",\n+ Subsystem: \"launch\",\n+ Name: \"operation_latency_microseconds\",\n+ Help: \"Total duration of reconciliation in microseconds.\",\n+ },\n+ []string{\"method\"})\n+\n+var LaunchOperationsTotal = prometheus.NewCounterVec(\nprometheus.CounterOpts{\nNamespace: \"kubernikus\",\nSubsystem: \"launch\",\n- Name: \"reconciliation_count\",\n- Help: \"Number of reconcilitations.\"},\n- []string{\"kluster\", \"project\"})\n+ Name: \"operation_total\",\n+ Help: \"Number of operations.\"},\n+ []string{\"method\"})\n-var KlusterReconciliationLatency = prometheus.NewSummaryVec(\n- prometheus.SummaryOpts{\n+var LaunchSuccessfulOperationsTotal = prometheus.NewCounterVec(\n+ prometheus.CounterOpts{\nNamespace: \"kubernikus\",\nSubsystem: \"launch\",\n- Name: \"reconciliation_latency_microseconds\",\n- Help: \"Total duration of reconciliation in microseconds.\",\n- },\n- []string{\"kluster\", \"project\"})\n+ Name: \"successful_operation_total\",\n+ Help: \"Number of successful operations.\"},\n+ []string{\"method\"})\n+\n+var LaunchFailedOperationsTotal = prometheus.NewCounterVec(\n+ prometheus.CounterOpts{\n+ Namespace: \"kubernikus\",\n+ Subsystem: \"launch\",\n+ Name: \"failed_operation_total\",\n+ Help: \"Number of failed operations.\"},\n+ []string{\"method\"})\n" }, { "change_type": "MODIFY", "old_path": "pkg/controller/metrics/metrics.go", "new_path": "pkg/controller/metrics/metrics.go", "diff": "@@ -147,8 +147,10 @@ func init() {\nklusterStatusPhase,\nnodePoolSize,\nnodePoolStatus,\n- KlusterReconcilicationCount,\n- KlusterReconciliationLatency,\n+ LaunchOperationsLatency,\n+ LaunchOperationsTotal,\n+ LaunchSuccessfulOperationsTotal,\n+ LaunchFailedOperationsTotal,\n)\n}\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
removes klusters and ids from metrics
596,240
27.11.2017 16:31:48
-3,600
1f96644b0a5e03aaa5b9132fff28da673e16a929
unifies kluster values for logging
[ { "change_type": "MODIFY", "old_path": "pkg/controller/base/logging.go", "new_path": "pkg/controller/base/logging.go", "diff": "@@ -28,7 +28,8 @@ func (r *LoggingReconciler) Reconcile(kluster *v1.Kluster) (requeue bool, err er\ndefer func(begin time.Time) {\nr.Logger.Log(\n\"msg\", \"reconciled kluster\",\n- \"kluster\", kluster.Name,\n+ \"kluster\", kluster.Spec.Name,\n+ \"project\", kluster.Account(),\n\"requeue\", requeue,\n\"took\", time.Since(begin),\n\"err\", err)\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
unifies kluster values for logging
596,240
27.11.2017 16:34:01
-3,600
3a574b045b3c71041192232aa8e36c4ffab56f82
fixes label name
[ { "change_type": "MODIFY", "old_path": "pkg/controller/metrics/launch.go", "new_path": "pkg/controller/metrics/launch.go", "diff": "@@ -6,7 +6,7 @@ var LaunchOperationsLatency = prometheus.NewSummaryVec(\nprometheus.SummaryOpts{\nNamespace: \"kubernikus\",\nSubsystem: \"launch\",\n- Name: \"operation_latency_microseconds\",\n+ Name: \"operation_latency_seconds\",\nHelp: \"Total duration of reconciliation in microseconds.\",\n},\n[]string{\"method\"})\n" } ]
Go
Apache License 2.0
sapcc/kubernikus
fixes label name