class Gluu(object): def __init__(self): self.values_file = Path("./helm/gluu/values.yaml").resolve() self.upgrade_values_file = Path( "./helm/gluu-upgrade/values.yaml").resolve() self.settings = SettingsHandler() self.kubernetes = Kubernetes() self.ldap_backup_release_name = self.settings.get( 'CN_HELM_RELEASE_NAME') + "-ldap-backup" if self.settings.get("DEPLOYMENT_ARCH") == "gke": # Clusterrolebinding needs to be created for gke with CB or kubeDB installed if self.settings.get("INSTALL_REDIS") == "Y" or \ self.settings.get("INSTALL_GLUU_GATEWAY") == "Y" or \ self.settings.get("INSTALL_COUCHBASE") == "Y": user_account, stderr, retcode = exec_cmd( "gcloud config get-value core/account") user_account = str(user_account, "utf-8").strip() user, stderr, retcode = exec_cmd("whoami") user = str(user, "utf-8").strip() cluster_role_binding_name = "cluster-admin-{}".format(user) self.kubernetes.create_cluster_role_binding( cluster_role_binding_name=cluster_role_binding_name, user_name=user_account, cluster_role_name="cluster-admin") def prepare_alb(self): ingress_parser = Parser("./alb/ingress.yaml", "Ingress") ingress_parser["spec"]["rules"][0]["host"] = self.settings.get( "CN_FQDN") ingress_parser["metadata"]["annotations"]["alb.ingress.kubernetes.io/certificate-arn"] = \ self.settings.get("ARN_AWS_IAM") if not self.settings.get("ARN_AWS_IAM"): del ingress_parser["metadata"]["annotations"][ "alb.ingress.kubernetes.io/certificate-arn"] for path in ingress_parser["spec"]["rules"][0]["http"]["paths"]: service_name = path["backend"]["serviceName"] if self.settings.get( "ENABLE_CASA") != "Y" and service_name == "casa": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] if self.settings.get("ENABLE_OXSHIBBOLETH" ) != "Y" and service_name == "oxshibboleth": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] if self.settings.get("ENABLE_OXPASSPORT" ) != "Y" and service_name == "oxpassport": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] if self.settings.get("INSTALL_GLUU_GATEWAY" ) != "Y" and service_name == "gg-kong-ui": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] ingress_parser.dump_it() def deploy_alb(self): alb_ingress = Path("./alb/ingress.yaml") self.kubernetes.create_objects_from_dict( alb_ingress, self.settings.get("CN_NAMESPACE")) if self.settings.get("IS_CN_FQDN_REGISTERED") != "Y": prompt = input( "Please input the DNS of the Application load balancer created found on AWS UI: " ) lb_hostname = prompt while True: try: if lb_hostname: break lb_hostname = self.kubernetes.read_namespaced_ingress( name="gluu", namespace="gluu" ).status.load_balancer.ingress[0].hostname except TypeError: logger.info("Waiting for loadbalancer address..") time.sleep(10) self.settings.set("LB_ADD", lb_hostname) def wait_for_nginx_add(self): hostname_ip = None while True: try: if hostname_ip: break if self.settings.get("DEPLOYMENT_ARCH") == "eks": hostname_ip = self.kubernetes.read_namespaced_service( name=self.settings.get('NGINX_INGRESS_RELEASE_NAME') + "-ingress-nginx-controller", namespace=self.settings.get("NGINX_INGRESS_NAMESPACE") ).status.load_balancer.ingress[0].hostname self.settings.set("LB_ADD", hostname_ip) if self.settings.get("AWS_LB_TYPE") == "nlb": try: ip_static = socket.gethostbyname(str(hostname_ip)) if ip_static: break except socket.gaierror: logger.info("Address has not received an ip yet.") elif self.settings.get("DEPLOYMENT_ARCH") == "local": self.settings.set( "LB_ADD", self.settings.get('NGINX_INGRESS_RELEASE_NAME') + "-nginx-ingress-controller." + self.settings.get("NGINX_INGRESS_NAMESPACE") + ".svc.cluster.local") break else: hostname_ip = self.kubernetes.read_namespaced_service( name=self.settings.get('NGINX_INGRESS_RELEASE_NAME') + "-ingress-nginx-controller", namespace=self.settings.get("NGINX_INGRESS_NAMESPACE") ).status.load_balancer.ingress[0].ip self.settings.set("HOST_EXT_IP", hostname_ip) except (TypeError, AttributeError): logger.info("Waiting for address..") time.sleep(10) def check_install_nginx_ingress(self, install_ingress=True): """ Helm installs nginx ingress or checks to recieve and ip or address :param install_ingress: """ if install_ingress: self.kubernetes.delete_custom_resource( "virtualservers.k8s.nginx.org") self.kubernetes.delete_custom_resource( "virtualserverroutes.k8s.nginx.org") self.kubernetes.delete_cluster_role("ingress-nginx-nginx-ingress") self.kubernetes.delete_cluster_role_binding( "ingress-nginx-nginx-ingress") self.kubernetes.create_namespace( name=self.settings.get("NGINX_INGRESS_NAMESPACE"), labels={"app": "ingress-nginx"}) self.kubernetes.delete_cluster_role( self.settings.get('NGINX_INGRESS_RELEASE_NAME') + "-nginx-ingress-controller") self.kubernetes.delete_cluster_role_binding( self.settings.get('NGINX_INGRESS_RELEASE_NAME') + "-nginx-ingress-controller") try: exec_cmd( "helm repo add ingress-nginx https://kubernetes.github.io/ingress-nginx" ) exec_cmd("helm repo add stable https://charts.helm.sh/stable") exec_cmd("helm repo update") except FileNotFoundError: logger.error( "Helm v3 is not installed. Please install it to continue " "https://helm.sh/docs/intro/install/") raise SystemExit(1) command = "helm install {} ingress-nginx/ingress-nginx --namespace={} ".format( self.settings.get('NGINX_INGRESS_RELEASE_NAME'), self.settings.get("NGINX_INGRESS_NAMESPACE")) if self.settings.get("DEPLOYMENT_ARCH") == "minikube": exec_cmd("minikube addons enable ingress") if self.settings.get("DEPLOYMENT_ARCH") == "eks": if self.settings.get("AWS_LB_TYPE") == "nlb": if install_ingress: nlb_override_values_file = Path( "./nginx/aws/aws-nlb-override-values.yaml").resolve() nlb_values = " --values {}".format( nlb_override_values_file) exec_cmd(command + nlb_values) else: if self.settings.get("USE_ARN") == "Y": if install_ingress: elb_override_values_file = Path( "./nginx/aws/aws-elb-override-values.yaml" ).resolve() elb_file_parser = Parser(elb_override_values_file, True) elb_file_parser["controller"]["service"][ "annotations"].update({ "service.beta.kubernetes.io/aws-load-balancer-ssl-cert": self.settings.get("ARN_AWS_IAM") }) elb_file_parser["controller"]["config"][ "proxy-real-ip-cidr"] = self.settings.get( "VPC_CIDR") elb_file_parser.dump_it() elb_values = " --values {}".format( elb_override_values_file) exec_cmd(command + elb_values) else: if install_ingress: exec_cmd(command) if self.settings.get("DEPLOYMENT_ARCH") in ("gke", "aks", "do"): if install_ingress: cloud_override_values_file = Path( "./nginx/cloud/cloud-override-values.yaml").resolve() cloud_values = " --values {}".format( cloud_override_values_file) exec_cmd(command + cloud_values) if self.settings.get("DEPLOYMENT_ARCH") == "local": if install_ingress: baremetal_override_values_file = Path( "./nginx/baremetal/baremetal-override-values.yaml" ).resolve() baremetal_values = " --values {}".format( baremetal_override_values_file) exec_cmd(command + baremetal_values) if self.settings.get("DEPLOYMENT_ARCH") not in ("microk8s", "minikube"): logger.info("Waiting for nginx to be prepared...") time.sleep(60) self.wait_for_nginx_add() def analyze_global_values(self): """ Parses Gluu values.yaml with the input information from prompts """ values_file_parser = Parser(self.values_file, True) if self.settings.get("DEPLOYMENT_ARCH") == "minikube": provisioner = "k8s.io/minikube-hostpath" elif self.settings.get("DEPLOYMENT_ARCH") == "eks": provisioner = "kubernetes.io/aws-ebs" elif self.settings.get("DEPLOYMENT_ARCH") == "gke": provisioner = "kubernetes.io/gce-pd" elif self.settings.get("DEPLOYMENT_ARCH") == "aks": provisioner = "kubernetes.io/azure-disk" elif self.settings.get("DEPLOYMENT_ARCH") == "do": provisioner = "dobs.csi.digitalocean.com" elif self.settings.get("DEPLOYMENT_ARCH") == "local": provisioner = "openebs.io/local" else: provisioner = "microk8s.io/hostpath" values_file_parser["global"]["storageClass"][ "provisioner"] = provisioner values_file_parser["global"]["lbIp"] = self.settings.get("HOST_EXT_IP") values_file_parser["global"]["domain"] = self.settings.get("CN_FQDN") values_file_parser["global"]["isDomainRegistered"] = "false" if self.settings.get("IS_CN_FQDN_REGISTERED") == "Y": values_file_parser["global"]["isDomainRegistered"] = "true" if self.settings.get("CN_CACHE_TYPE") == "REDIS": values_file_parser["config"]["configmap"][ "cnRedisUrl"] = self.settings.get("REDIS_URL") values_file_parser["config"]["configmap"][ "cnRedisType"] = self.settings.get("REDIS_TYPE") values_file_parser["config"]["configmap"][ "cnRedisUseSsl"] = self.settings.get("REDIS_USE_SSL") values_file_parser["config"]["configmap"]["cnRedisSslTruststore"] = \ self.settings.get("REDIS_SSL_TRUSTSTORE") values_file_parser["config"]["configmap"]["cnRedisSentinelGroup"] = \ self.settings.get("REDIS_SENTINEL_GROUP") values_file_parser["config"]["redisPass"] = self.settings.get( "REDIS_PW") if self.settings.get("DEPLOYMENT_ARCH") in ("microk8s", "minikube") \ or self.settings.get("TEST_ENVIRONMENT") == "Y": values_file_parser["global"]["cloud"]["testEnviroment"] = True values_file_parser["config"]["configmap"][ "lbAddr"] = self.settings.get("LB_ADD") values_file_parser["global"]["cnPersistenceType"] = self.settings.get( "PERSISTENCE_BACKEND") values_file_parser["config"]["configmap"][ "cnPersistenceType"] = self.settings.get("PERSISTENCE_BACKEND") values_file_parser["config"]["configmap"]["cnPersistenceLdapMapping"] = \ self.settings.get("HYBRID_LDAP_HELD_DATA") if self.settings.get("PERSISTENCE_BACKEND") != "ldap": values_file_parser["config"]["configmap"][ "cnCouchbaseUrl"] = self.settings.get("COUCHBASE_URL") values_file_parser["config"]["configmap"][ "cnCouchbaseUser"] = self.settings.get("COUCHBASE_USER") values_file_parser["config"]["configmap"][ "cnCouchbaseIndexNumReplica"] = self.settings.get( "COUCHBASE_INDEX_NUM_REPLICA") values_file_parser["config"]["configmap"][ "cnCouchbaseBucketPrefix"] = self.settings.get( "COUCHBASE_BUCKET_PREFIX") values_file_parser["config"]["configmap"]["cnCouchbaseSuperUser"] = \ self.settings.get("COUCHBASE_SUPERUSER") values_file_parser["config"]["configmap"][ "cnCouchbaseCrt"] = self.settings.get("COUCHBASE_CRT") values_file_parser["config"]["configmap"][ "cnCouchbasePass"] = self.settings.get("COUCHBASE_PASSWORD") values_file_parser["config"]["configmap"]["cnCouchbaseSuperUserPass"] = \ self.settings.get("COUCHBASE_SUPERUSER_PASSWORD") values_file_parser["global"]["auth-server"]["enabled"] = True values_file_parser["global"]["persistence"]["enabled"] = True values_file_parser["global"]["oxtrust"]["enabled"] = True values_file_parser["global"]["config"]["enabled"] = True values_file_parser["global"]["opendj"]["enabled"] = False values_file_parser["global"]["fido2"]["enabled"] = False if self.settings.get("ENABLE_FIDO2") == "Y": values_file_parser["global"]["fido2"]["enabled"] = True values_file_parser["fido2"]["replicas"] = self.settings.get( "FIDO2_REPLICAS") values_file_parser["global"]["scim"]["enabled"] = False if self.settings.get("ENABLE_SCIM") == "Y": values_file_parser["global"]["scim"]["enabled"] = True values_file_parser["scim"]["replicas"] = self.settings.get( "SCIM_REPLICAS") if self.settings.get("ENABLE_CONFIG_API") == "Y": values_file_parser["global"]["config-api"]["enabled"] = True if self.settings.get("INSTALL_JACKRABBIT") == "Y": values_file_parser["global"]["jackrabbit"]["enabled"] = True values_file_parser["config"]["configmap"][ "cnJackrabbitUrl"] = self.settings.get("JACKRABBIT_URL") values_file_parser["jackrabbit"]["secrets"]["cnJackrabbitAdminPass"] = \ self.settings.get("JACKRABBIT_ADMIN_PASSWORD") values_file_parser["jackrabbit"]["secrets"]["cnJackrabbitPostgresPass"] = \ self.settings.get("JACKRABBIT_PG_PASSWORD") if self.settings.get("USE_ISTIO_INGRESS") == "Y": values_file_parser["global"]["istio"]["ingress"] = True values_file_parser["global"]["istio"]["enabled"] = True values_file_parser["global"]["istio"][ "namespace"] = self.settings.get("ISTIO_SYSTEM_NAMESPACE") elif self.settings.get("AWS_LB_TYPE") == "alb": values_file_parser["global"]["alb"]["ingress"] = True else: values_file_parser["nginx-ingress"]["ingress"]["enabled"] = True values_file_parser["nginx-ingress"]["ingress"]["hosts"] = [ self.settings.get("CN_FQDN") ] values_file_parser["nginx-ingress"]["ingress"]["tls"][0][ "hosts"] = [self.settings.get("CN_FQDN")] if self.settings.get("USE_ISTIO") == "Y": values_file_parser["global"]["istio"]["enabled"] = True values_file_parser["global"]["cnJackrabbitCluster"] = "false" if self.settings.get("JACKRABBIT_CLUSTER") == "Y": values_file_parser["global"]["cnJackrabbitCluster"] = "true" values_file_parser["config"]["configmap"]["cnJackrabbitAdminId"] = \ self.settings.get("JACKRABBIT_ADMIN_ID") values_file_parser["config"]["configmap"]["cnJackrabbitPostgresUser"] = \ self.settings.get("JACKRABBIT_PG_USER") values_file_parser["config"]["configmap"]["cnJackrabbitPostgresDatabaseName"] = \ self.settings.get("JACKRABBIT_DATABASE") values_file_parser["config"]["configmap"]["cnJackrabbitPostgresHost"] = \ self.settings.get("POSTGRES_URL") values_file_parser["config"]["configmap"]["cnJackrabbitPostgresUser"] = \ self.settings.get("JACKRABBIT_PG_USER") if self.settings.get("PERSISTENCE_BACKEND") == "hybrid" or \ self.settings.get("PERSISTENCE_BACKEND") == "ldap": values_file_parser["global"]["opendj"]["enabled"] = True # ALPHA-FEATURE: Multi cluster ldap replication if self.settings.get("CN_LDAP_MULTI_CLUSTER") == "Y": values_file_parser["opendj"]["multiCluster"]["enabled"] = True values_file_parser["opendj"]["multiCluster"]["serfAdvertiseAddr"] = \ self.settings.get("CN_LDAP_ADVERTISE_ADDRESS") serf_key = base64.b64encode(secrets.token_bytes()).decode() values_file_parser["opendj"]["multiCluster"][ "serfKey"] = serf_key values_file_parser["opendj"]["multiCluster"]["serfPeers"] = \ self.settings.get("CN_LDAP_SERF_PEERS") if self.settings.get("CN_LDAP_SECONDARY_CLUSTER") == "Y": values_file_parser["global"]["persistence"][ "enabled"] = False values_file_parser["opendj"]["ports"]["tcp-ldaps"]["nodePort"] = \ int(self.settings.get("CN_LDAP_ADVERTISE_LDAPS_PORT")) values_file_parser["opendj"]["ports"]["tcp-repl"]["port"] = \ int(self.settings.get("CN_LDAP_ADVERTISE_REPLICATION_PORT")) values_file_parser["opendj"]["ports"]["tcp-repl"]["targetPort"] = \ int(self.settings.get("CN_LDAP_ADVERTISE_REPLICATION_PORT")) values_file_parser["opendj"]["ports"]["tcp-repl"]["nodePort"] = \ int(self.settings.get("CN_LDAP_ADVERTISE_REPLICATION_PORT")) values_file_parser["opendj"]["ports"]["tcp-admin"]["port"] = \ int(self.settings.get("CN_LDAP_ADVERTISE_ADMIN_PORT")) values_file_parser["opendj"]["ports"]["tcp-admin"]["targetPort"] = \ int(self.settings.get("CN_LDAP_ADVERTISE_ADMIN_PORT")) values_file_parser["opendj"]["ports"]["tcp-admin"]["nodePort"] = \ int(self.settings.get("CN_LDAP_ADVERTISE_ADMIN_PORT")) values_file_parser["opendj"]["ports"]["tcp-serf"]["nodePort"] = \ int(self.settings.get("CN_LDAP_SERF_PORT")) values_file_parser["opendj"]["ports"]["udp-serf"]["nodePort"] = \ int(self.settings.get("CN_LDAP_SERF_PORT")) values_file_parser["global"]["oxshibboleth"]["enabled"] = False if self.settings.get("ENABLE_OXSHIBBOLETH") == "Y": values_file_parser["global"]["oxshibboleth"]["enabled"] = True values_file_parser["config"]["configmap"][ "cnSyncShibManifests"] = True values_file_parser["global"]["client-api"]["enabled"] = False if self.settings.get("ENABLE_CLIENT_API") == "Y": values_file_parser["global"]["client-api"]["enabled"] = True values_file_parser["config"]["configmap"]["jansClientApiApplicationCertCn"] = \ self.settings.get("CLIENT_API_APPLICATION_KEYSTORE_CN") values_file_parser["config"]["configmap"][ "jansClientApiAdminCertCn"] = self.settings.get( "CLIENT_API_ADMIN_KEYSTORE_CN") values_file_parser["client-api"]["replicas"] = self.settings.get( "CLIENT_API_REPLICAS") values_file_parser["opendj"]["cnRedisEnabled"] = False if self.settings.get("CN_CACHE_TYPE") == "REDIS": values_file_parser["opendj"]["cnRedisEnabled"] = True values_file_parser["global"]["nginx-ingress"]["enabled"] = True values_file_parser["global"]["cr-rotate"]["enabled"] = False if self.settings.get("ENABLE_CACHE_REFRESH") == "Y": values_file_parser["global"]["cr-rotate"]["enabled"] = True values_file_parser["global"]["auth-server-key-rotation"][ "enabled"] = False if self.settings.get("ENABLE_AUTH_SERVER_KEY_ROTATE") == "Y": values_file_parser["global"]["auth-server-key-rotation"][ "enabled"] = True values_file_parser["auth-server-key-rotation"][ "keysLife"] = self.settings.get("AUTH_SERVER_KEYS_LIFE") values_file_parser["config"]["orgName"] = self.settings.get("ORG_NAME") values_file_parser["config"]["email"] = self.settings.get("EMAIL") values_file_parser["config"]["adminPass"] = self.settings.get( "ADMIN_PW") values_file_parser["config"]["ldapPass"] = self.settings.get("LDAP_PW") values_file_parser["config"]["countryCode"] = self.settings.get( "COUNTRY_CODE") values_file_parser["config"]["state"] = self.settings.get("STATE") values_file_parser["config"]["city"] = self.settings.get("CITY") values_file_parser["config"]["configmap"][ "cnCacheType"] = self.settings.get("CN_CACHE_TYPE") values_file_parser["opendj"]["replicas"] = self.settings.get( "LDAP_REPLICAS") values_file_parser["opendj"]["persistence"][ "size"] = self.settings.get("LDAP_STORAGE_SIZE") if self.settings.get("ENABLE_OXTRUST_API_BOOLEAN") == "true": values_file_parser["config"]["configmap"][ "cnOxtrustApiEnabled"] = True if self.settings.get("ENABLE_OXTRUST_TEST_MODE_BOOLEAN") == "true": values_file_parser["config"]["configmap"][ "cnOxtrustApiTestMode"] = True if self.settings.get("ENABLE_CASA_BOOLEAN") == "true": values_file_parser["config"]["configmap"]["cnCasaEnabled"] = True values_file_parser["config"]["configmap"][ "cnSyncCasaManifests"] = True if self.settings.get("ENABLE_OXPASSPORT_BOOLEAN") == "true": values_file_parser["config"]["configmap"][ "cnPassportEnabled"] = True if self.settings.get("ENABLE_RADIUS_BOOLEAN") == "true": values_file_parser["config"]["configmap"]["cnRadiusEnabled"] = True if self.settings.get("ENABLE_SAML_BOOLEAN") == "true": values_file_parser["config"]["configmap"]["cnSamlEnabled"] = True values_file_parser["oxpassport"]["resources"] = {} values_file_parser["casa"]["image"]["repository"] = self.settings.get( "CASA_IMAGE_NAME") values_file_parser["casa"]["image"]["tag"] = self.settings.get( "CASA_IMAGE_TAG") values_file_parser["casa"]["replicas"] = self.settings.get( "CASA_REPLICAS") values_file_parser["config"]["image"][ "repository"] = self.settings.get("CONFIG_IMAGE_NAME") values_file_parser["config"]["image"]["tag"] = self.settings.get( "CONFIG_IMAGE_TAG") values_file_parser["cr-rotate"]["image"][ "repository"] = self.settings.get( "CACHE_REFRESH_ROTATE_IMAGE_NAME") values_file_parser["cr-rotate"]["image"]["tag"] = self.settings.get( "CACHE_REFRESH_ROTATE_IMAGE_TAG") values_file_parser["auth-server-key-rotation"]["image"][ "repository"] = self.settings.get("CERT_MANAGER_IMAGE_NAME") values_file_parser["auth-server-key-rotation"]["image"][ "tag"] = self.settings.get("CERT_MANAGER_IMAGE_TAG") values_file_parser["opendj"]["image"][ "repository"] = self.settings.get("LDAP_IMAGE_NAME") values_file_parser["opendj"]["image"]["tag"] = self.settings.get( "LDAP_IMAGE_TAG") values_file_parser["persistence"]["image"][ "repository"] = self.settings.get("PERSISTENCE_IMAGE_NAME") values_file_parser["persistence"]["image"]["tag"] = self.settings.get( "PERSISTENCE_IMAGE_TAG") values_file_parser["auth-server"]["image"][ "repository"] = self.settings.get("AUTH_SERVER_IMAGE_NAME") values_file_parser["auth-server"]["image"]["tag"] = self.settings.get( "AUTH_SERVER_IMAGE_TAG") values_file_parser["client-api"]["image"][ "repository"] = self.settings.get("CLIENT_API_IMAGE_NAME") values_file_parser["client-api"]["image"]["tag"] = self.settings.get( "CLIENT_API_IMAGE_TAG") values_file_parser["auth-server"]["replicas"] = self.settings.get( "AUTH_SERVER_REPLICAS") values_file_parser["oxpassport"]["image"][ "repository"] = self.settings.get("OXPASSPORT_IMAGE_NAME") values_file_parser["oxpassport"]["image"]["tag"] = self.settings.get( "OXPASSPORT_IMAGE_TAG") values_file_parser["oxpassport"]["replicas"] = self.settings.get( "OXPASSPORT_REPLICAS") values_file_parser["oxshibboleth"]["image"][ "repository"] = self.settings.get("OXSHIBBOLETH_IMAGE_NAME") values_file_parser["oxshibboleth"]["image"]["tag"] = self.settings.get( "OXSHIBBOLETH_IMAGE_TAG") values_file_parser["oxshibboleth"]["replicas"] = self.settings.get( "OXSHIBBOLETH_REPLICAS") values_file_parser["jackrabbit"]["image"][ "repository"] = self.settings.get("JACKRABBIT_IMAGE_NAME") values_file_parser["jackrabbit"]["image"]["tag"] = self.settings.get( "JACKRABBIT_IMAGE_TAG") values_file_parser["oxtrust"]["image"][ "repository"] = self.settings.get("OXTRUST_IMAGE_NAME") values_file_parser["oxtrust"]["image"]["tag"] = self.settings.get( "OXTRUST_IMAGE_TAG") values_file_parser["oxtrust"]["replicas"] = self.settings.get( "OXTRUST_REPLICAS") values_file_parser["radius"]["image"][ "repository"] = self.settings.get("RADIUS_IMAGE_NAME") values_file_parser["radius"]["image"]["tag"] = self.settings.get( "RADIUS_IMAGE_TAG") values_file_parser["radius"]["replicas"] = self.settings.get( "RADIUS_REPLICAS") values_file_parser.dump_it() def install_gluu(self, install_ingress=True): """ Helm install Gluu :param install_ingress: """ labels = {"app": "gluu"} if self.settings.get("USE_ISTIO") == "Y": labels = {"app": "gluu", "istio-injection": "enabled"} self.kubernetes.create_namespace( name=self.settings.get("CN_NAMESPACE"), labels=labels) if self.settings.get( "PERSISTENCE_BACKEND") != "ldap" and self.settings.get( "INSTALL_COUCHBASE") == "Y": couchbase_app = Couchbase() couchbase_app.uninstall() couchbase_app = Couchbase() couchbase_app.install() self.settings = SettingsHandler() if self.settings.get("AWS_LB_TYPE") == "alb": self.prepare_alb() self.deploy_alb() if self.settings.get("AWS_LB_TYPE") != "alb" and self.settings.get( "USE_ISTIO_INGRESS") != "Y": self.check_install_nginx_ingress(install_ingress) self.analyze_global_values() try: exec_cmd("helm install {} -f {} ./helm/gluu --namespace={}".format( self.settings.get('CN_HELM_RELEASE_NAME'), self.values_file, self.settings.get("CN_NAMESPACE"))) if self.settings.get("PERSISTENCE_BACKEND") == "hybrid" or \ self.settings.get("PERSISTENCE_BACKEND") == "ldap": self.install_ldap_backup() except FileNotFoundError: logger.error( "Helm v3 is not installed. Please install it to continue " "https://helm.sh/docs/intro/install/") raise SystemExit(1) def install_ldap_backup(self): values_file = Path("./helm/ldap-backup/values.yaml").resolve() values_file_parser = Parser(values_file, True) values_file_parser["ldapPass"] = self.settings.get("LDAP_PW") values_file_parser.dump_it() exec_cmd( "helm install {} -f ./helm/ldap-backup/values.yaml ./helm/ldap-backup --namespace={}" .format(self.ldap_backup_release_name, self.settings.get("CN_NAMESPACE"))) def upgrade_gluu(self): values_file_parser = Parser(self.upgrade_values_file, True) values_file_parser["domain"] = self.settings.get("CN_FQDN") values_file_parser["cnCacheType"] = self.settings.get("CN_CACHE_TYPE") values_file_parser["cnCouchbaseUrl"] = self.settings.get( "COUCHBASE_URL") values_file_parser["cnCouchbaseUser"] = self.settings.get( "COUCHBASE_USER") values_file_parser["cnCouchbaseSuperUser"] = self.settings.get( "COUCHBASE_SUPERUSER") values_file_parser["cnPersistenceLdapMapping"] = self.settings.get( "HYBRID_LDAP_HELD_DATA") values_file_parser["cnPersistenceType"] = self.settings.get( "PERSISTENCE_BACKEND") values_file_parser["source"] = self.settings.get("CN_VERSION") values_file_parser["target"] = self.settings.get( "CN_UPGRADE_TARGET_VERSION") values_file_parser.dump_it() exec_cmd( "helm install {} -f {} ./helm/gluu-upgrade --namespace={}".format( self.settings.get('CN_HELM_RELEASE_NAME'), self.values_file, self.settings.get("CN_NAMESPACE"))) def uninstall_gluu(self): exec_cmd("helm delete {} --namespace={}".format( self.settings.get('CN_HELM_RELEASE_NAME'), self.settings.get("CN_NAMESPACE"))) exec_cmd("helm delete {} --namespace={}".format( self.ldap_backup_release_name, self.settings.get("CN_NAMESPACE"))) def uninstall_nginx_ingress(self): exec_cmd("helm delete {} --namespace={}".format( self.settings.get('NGINX_INGRESS_RELEASE_NAME'), self.settings.get("NGINX_INGRESS_NAMESPACE")))
class Gluu(object): def __init__(self): self.values_file = Path("./helm/gluu/override-values.yaml").resolve() self.upgrade_values_file = Path( "./helm/gluu-upgrade/values.yaml").resolve() self.settings = ValuesHandler() self.kubernetes = Kubernetes() self.ldap_backup_release_name = self.settings.get( "installer-settings.releaseName") + "-ldap-backup" if "gke" in self.settings.get( "installer-settings.volumeProvisionStrategy"): # Clusterrolebinding needs to be created for gke with CB installed if self.settings.get("config.configmap.cnCacheType") == "REDIS" or \ self.settings.get("installer-settings.couchbase.install"): user_account, stderr, retcode = exec_cmd( "gcloud config get-value core/account") user_account = str(user_account, "utf-8").strip() user, stderr, retcode = exec_cmd("whoami") user = str(user, "utf-8").strip() cluster_role_binding_name = "cluster-admin-{}".format(user) self.kubernetes.create_cluster_role_binding( cluster_role_binding_name=cluster_role_binding_name, user_name=user_account, cluster_role_name="cluster-admin") def prepare_alb(self): ingress_parser = Parser("./alb/ingress.yaml", "Ingress") ingress_parser["spec"]["rules"][0]["host"] = self.settings.get( "global.fqdn") ingress_parser["metadata"]["annotations"]["alb.ingress.kubernetes.io/certificate-arn"] = \ self.settings.get("installer-settings.aws.arn.arnAcmCert") if not self.settings.get("installer-settings.aws.arn.enabled"): del ingress_parser["metadata"]["annotations"][ "alb.ingress.kubernetes.io/certificate-arn"] for path in ingress_parser["spec"]["rules"][0]["http"]["paths"]: service_name = path["backend"]["serviceName"] if self.settings.get("config.configmap.cnCasaEnabled" ) and service_name == "casa": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] if self.settings.get("global.oxshibboleth.enabled" ) and service_name == "oxshibboleth": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] if self.settings.get("config.configmap.cnPassportEnabled" ) and service_name == "oxpassport": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] if self.settings.get("installer-settings.global.scim.enabled" ) and service_name == "jans-scim": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] if self.settings.get("installer-settings.config-api.enabled" ) and service_name == "config-api": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] ingress_parser.dump_it() def deploy_alb(self): alb_ingress = Path("./alb/ingress.yaml") self.kubernetes.create_objects_from_dict( alb_ingress, self.settings.get("installer-settings.namespace")) if self.settings.get("global.fqdn"): prompt = input( "Please input the DNS of the Application load balancer found on AWS UI: " ) lb_hostname = prompt while True: try: if lb_hostname: break lb_hostname = self.kubernetes.read_namespaced_ingress( name="gluu", namespace="gluu" ).status.load_balancer.ingress[0].hostname except TypeError: logger.info("Waiting for loadbalancer address..") time.sleep(10) self.settings.set("config.configmap.lbAddr", lb_hostname) def wait_for_nginx_add(self): hostname_ip = None while True: try: if hostname_ip: break if "aws" in self.settings.get( "installer-settings.volumeProvisionStrategy"): hostname_ip = self.kubernetes.read_namespaced_service( name=self.settings.get( 'installer-settings.nginxIngress.releaseName') + "-ingress-nginx-controller", namespace=self.settings.get( "installer-settings.nginxIngress.releaseName" )).status.load_balancer.ingress[0].hostname self.settings.set("config.configmap.lbAddr", hostname_ip) if self.settings.get( "installer-settings.aws.lbType") == "nlb": try: ip_static = socket.gethostbyname(str(hostname_ip)) if ip_static: break except socket.gaierror: logger.info("Address has not received an ip yet.") elif "local" in self.settings.get( "installer-settings.volumeProvisionStrategy"): self.settings.set( "config.configmap.lbAddr", self.settings.get( 'installer-settings.nginxIngress.releaseName') + "-nginx-ingress-controller." + self.settings.get( "installer-settings.nginxIngress.releaseName") + ".svc.cluster.local") break else: hostname_ip = self.kubernetes.read_namespaced_service( name=self.settings.get( 'installer-settings.nginxIngress.releaseName') + "-ingress-nginx-controller", namespace=self.settings.get( "installer-settings.nginxIngress.releaseName" )).status.load_balancer.ingress[0].ip self.settings.set("global.lbIp", hostname_ip) except (TypeError, AttributeError): logger.info("Waiting for address..") time.sleep(10) def check_install_nginx_ingress(self, install_ingress=True): """ Helm installs nginx ingress or checks to recieve and ip or address :param install_ingress: """ if install_ingress: self.kubernetes.delete_custom_resource( "virtualservers.k8s.nginx.org") self.kubernetes.delete_custom_resource( "virtualserverroutes.k8s.nginx.org") self.kubernetes.delete_cluster_role("ingress-nginx-nginx-ingress") self.kubernetes.delete_cluster_role_binding( "ingress-nginx-nginx-ingress") self.kubernetes.create_namespace(name=self.settings.get( "installer-settings.nginxIngress.releaseName"), labels={"app": "ingress-nginx"}) self.kubernetes.delete_cluster_role( self.settings.get( 'installer-settings.nginxIngress.releaseName') + "-nginx-ingress-controller") self.kubernetes.delete_cluster_role_binding( self.settings.get( 'installer-settings.nginxIngress.releaseName') + "-nginx-ingress-controller") try: exec_cmd( "helm repo add ingress-nginx https://kubernetes.github.io/ingress-nginx" ) exec_cmd("helm repo add stable https://charts.helm.sh/stable") exec_cmd("helm repo update") except FileNotFoundError: logger.error( "Helm v3 is not installed. Please install it to continue " "https://helm.sh/docs/intro/install/") raise SystemExit(1) command = "helm install {} ingress-nginx/ingress-nginx --namespace={} ".format( self.settings.get('installer-settings.nginxIngress.releaseName'), self.settings.get("installer-settings.nginxIngress.namespace")) if self.settings.get("installer-settings.volumeProvisionStrategy" ) == "minikubeDynamic": exec_cmd("minikube addons enable ingress") if "aws" in self.settings.get( "installer-settings.volumeProvisionStrategy"): if self.settings.get("installer-settings.aws.lbType") == "nlb": if install_ingress: nlb_override_values_file = Path( "./nginx/aws/aws-nlb-override-values.yaml").resolve() nlb_values = " --values {}".format( nlb_override_values_file) exec_cmd(command + nlb_values) else: if self.settings.get("installer-settings.aws.arn.enabled"): if install_ingress: elb_override_values_file = Path( "./nginx/aws/aws-elb-override-values.yaml" ).resolve() elb_file_parser = Parser(elb_override_values_file, True) elb_file_parser["controller"]["service"][ "annotations"].update({ "service.beta.kubernetes.io/aws-load-balancer-ssl-cert": self.settings.get( "installer-settings.aws.arn.arnAcmCert") }) elb_file_parser["controller"]["config"]["proxy-real-ip-cidr"] = \ self.settings.get("installer-settings.aws.vpcCidr") elb_file_parser.dump_it() elb_values = " --values {}".format( elb_override_values_file) exec_cmd(command + elb_values) else: if install_ingress: exec_cmd(command) volume_provision_strategy = self.settings.get( "installer-settings.volumeProvisionStrategy") if "gke" in volume_provision_strategy or \ "aks" in volume_provision_strategy or \ "doks" in volume_provision_strategy: if install_ingress: cloud_override_values_file = Path( "./nginx/cloud/cloud-override-values.yaml").resolve() cloud_values = " --values {}".format( cloud_override_values_file) exec_cmd(command + cloud_values) elif "local" in volume_provision_strategy: if install_ingress: baremetal_override_values_file = Path( "./nginx/baremetal/baremetal-override-values.yaml" ).resolve() baremetal_values = " --values {}".format( baremetal_override_values_file) exec_cmd(command + baremetal_values) if self.settings.get("global.storageClass.provisioner") not in \ ("microk8s.io/hostpath", "k8s.io/minikube-hostpath"): logger.info("Waiting for nginx to be prepared...") time.sleep(60) self.wait_for_nginx_add() def install_gluu(self, install_ingress=True): """ Helm install Gluu :param install_ingress: """ labels = {"app": "gluu"} if self.settings.get("global.istio.enabled"): labels = {"app": "gluu", "istio-injection": "enabled"} self.kubernetes.create_namespace( name=self.settings.get("installer-settings.namespace"), labels=labels) if self.settings.get("global.cnPersistenceType") != "ldap" and \ self.settings.get("installer-settings.couchbase.install"): couchbase_app = Couchbase() couchbase_app.uninstall() couchbase_app = Couchbase() couchbase_app.install() self.settings = ValuesHandler() if self.settings.get("installer-settings.aws.lbType") == "alb": self.prepare_alb() self.deploy_alb() if self.settings.get("installer-settings.aws.lbType") != "alb" and \ self.settings.get("global.istio.ingress"): self.check_install_nginx_ingress(install_ingress) try: exec_cmd("helm install {} -f {} ./helm/gluu --namespace={}".format( self.settings.get('installer-settings.releaseName'), self.values_file, self.settings.get("installer-settings.namespace"))) if self.settings.get("global.cnPersistenceType") in ("hybrid", "ldap"): self.install_ldap_backup() except FileNotFoundError: logger.error( "Helm v3 is not installed. Please install it to continue " "https://helm.sh/docs/intro/install/") raise SystemExit(1) def install_ldap_backup(self): values_file = Path("./helm/ldap-backup/values.yaml").resolve() values_file_parser = Parser(values_file, True) values_file_parser["ldapPass"] = self.settings.get( "config.ldapPassword") if self.settings.get("global.storageClass.provisioner") not in \ ("microk8s.io/hostpath", "k8s.io/minikube-hostpath"): values_file_parser["gluuLdapSchedule"] = self.settings.get( "installer-settings.ldap.backup.fullSchedule") if self.settings.get("opendj.multiCluster.enabled"): values_file_parser["multiCluster"]["enabled"] = True values_file_parser["multiCluster"]["ldapAdvertiseAdminPort"] = \ self.settings.get("opendj.ports.tcp-admin.nodePort") values_file_parser["multiCluster"]["serfAdvertiseAddrSuffix"] = \ self.settings.get("opendj.multiCluster.serfAdvertiseAddrSuffix")[:-6] values_file_parser.dump_it() exec_cmd( "helm install {} -f ./helm/ldap-backup/values.yaml ./helm/ldap-backup --namespace={}" .format(self.ldap_backup_release_name, self.settings.get("installer-settings.namespace"))) def upgrade_gluu(self): values_file_parser = Parser(self.upgrade_values_file, True) values_file_parser["domain"] = self.settings.get("global.fqdn") values_file_parser["cnCacheType"] = self.settings.get( "config.configmap.cnCacheType") values_file_parser["cnCouchbaseUrl"] = self.settings.get( "config.configmap.cnCouchbaseUrl") values_file_parser["cnCouchbaseUser"] = self.settings.get( "config.configmap.cnCouchbaseUser") values_file_parser["cnCouchbaseSuperUser"] = self.settings.get( "config.configmap.cnCouchbaseSuperUser") values_file_parser["cnPersistenceLdapMapping"] = self.settings.get( "global.cnPersistenceType") values_file_parser["cnPersistenceType"] = self.settings.get( "config.configmap.cnPersistenceLdapMapping") values_file_parser["source"] = self.settings.get( "installer-settings.currentVersion") values_file_parser["target"] = self.settings.get( "installer-settings.upgrade.targetVersion") values_file_parser.dump_it() exec_cmd( "helm install {} -f {} ./helm/gluu-upgrade --namespace={}".format( self.settings.get('installer-settings.releaseName'), self.values_file, self.settings.get("installer-settings.namespace"))) def uninstall_gluu(self): exec_cmd("helm delete {} --namespace={}".format( self.settings.get('installer-settings.releaseName'), self.settings.get("installer-settings.namespace"))) exec_cmd("helm delete {} --namespace={}".format( self.ldap_backup_release_name, self.settings.get("installer-settings.namespace"))) def uninstall_nginx_ingress(self): exec_cmd("helm delete {} --namespace={}".format( self.settings.get('installer-settings.nginxIngress.releaseName'), self.settings.get("installer-settings.nginxIngress.namespace")))
class Helm(object): def __init__(self): self.values_file = Path("./helm/gluu/values.yaml").resolve() self.settings = SettingsHandler() self.kubernetes = Kubernetes() self.ldap_backup_release_name = self.settings.get( 'CN_HELM_RELEASE_NAME') + "-ldap-backup" if self.settings.get("DEPLOYMENT_ARCH") == "gke": # Clusterrolebinding needs to be created for gke with CB or kubeDB installed if self.settings.get("INSTALL_REDIS") == "Y" or \ self.settings.get("INSTALL_GLUU_GATEWAY") == "Y" or \ self.settings.get("INSTALL_COUCHBASE") == "Y": user_account, stderr, retcode = exec_cmd( "gcloud config get-value core/account") user_account = str(user_account, "utf-8").strip() user, stderr, retcode = exec_cmd("whoami") user = str(user, "utf-8").strip() cluster_role_binding_name = "cluster-admin-{}".format(user) self.kubernetes.create_cluster_role_binding( cluster_role_binding_name=cluster_role_binding_name, user_name=user_account, cluster_role_name="cluster-admin") def prepare_alb(self): ingress_parser = Parser("./alb/ingress.yaml", "Ingress") ingress_parser["spec"]["rules"][0]["host"] = self.settings.get( "CN_FQDN") ingress_parser["metadata"]["annotations"]["alb.ingress.kubernetes.io/certificate-arn"] = \ self.settings.get("ARN_AWS_IAM") if not self.settings.get("ARN_AWS_IAM"): del ingress_parser["metadata"]["annotations"][ "alb.ingress.kubernetes.io/certificate-arn"] for path in ingress_parser["spec"]["rules"][0]["http"]["paths"]: service_name = path["backend"]["serviceName"] if self.settings.get( "ENABLE_CASA") != "Y" and service_name == "casa": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] if self.settings.get("ENABLE_OXSHIBBOLETH" ) != "Y" and service_name == "oxshibboleth": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] if self.settings.get("ENABLE_OXPASSPORT" ) != "Y" and service_name == "oxpassport": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] if self.settings.get("INSTALL_GLUU_GATEWAY" ) != "Y" and service_name == "gg-kong-ui": path_index = ingress_parser["spec"]["rules"][0]["http"][ "paths"].index(path) del ingress_parser["spec"]["rules"][0]["http"]["paths"][ path_index] ingress_parser.dump_it() def deploy_alb(self): alb_ingress = Path("./alb/ingress.yaml") self.kubernetes.create_objects_from_dict( alb_ingress, self.settings.get("CN_NAMESPACE")) if self.settings.get("IS_CN_FQDN_REGISTERED") != "Y": prompt = input( "Please input the DNS of the Application load balancer created found on AWS UI: " ) lb_hostname = prompt while True: try: if lb_hostname: break lb_hostname = self.kubernetes.read_namespaced_ingress( name="gluu", namespace="gluu" ).status.load_balancer.ingress[0].hostname except TypeError: logger.info("Waiting for loadbalancer address..") time.sleep(10) self.settings.set("LB_ADD", lb_hostname) def wait_for_nginx_add(self): hostname_ip = None while True: try: if hostname_ip: break if self.settings.get("DEPLOYMENT_ARCH") == "eks": hostname_ip = self.kubernetes.read_namespaced_service( name=self.settings.get('NGINX_INGRESS_RELEASE_NAME') + "-ingress-nginx-controller", namespace=self.settings.get("NGINX_INGRESS_NAMESPACE") ).status.load_balancer.ingress[0].hostname self.settings.set("LB_ADD", hostname_ip) if self.settings.get("AWS_LB_TYPE") == "nlb": try: ip_static = socket.gethostbyname(str(hostname_ip)) if ip_static: break except socket.gaierror: logger.info("Address has not received an ip yet.") elif self.settings.get("DEPLOYMENT_ARCH") == "local": self.settings.set( "LB_ADD", self.settings.get('NGINX_INGRESS_RELEASE_NAME') + "-nginx-ingress-controller." + self.settings.get("NGINX_INGRESS_NAMESPACE") + ".svc.cluster.local") break else: hostname_ip = self.kubernetes.read_namespaced_service( name=self.settings.get('NGINX_INGRESS_RELEASE_NAME') + "-ingress-nginx-controller", namespace=self.settings.get("NGINX_INGRESS_NAMESPACE") ).status.load_balancer.ingress[0].ip self.settings.set("HOST_EXT_IP", hostname_ip) except (TypeError, AttributeError): logger.info("Waiting for address..") time.sleep(10) def check_install_nginx_ingress(self, install_ingress=True): """ Helm installs nginx ingress or checks to recieve and ip or address :param install_ingress: """ if install_ingress: self.kubernetes.delete_custom_resource( "virtualservers.k8s.nginx.org") self.kubernetes.delete_custom_resource( "virtualserverroutes.k8s.nginx.org") self.kubernetes.delete_cluster_role("ingress-nginx-nginx-ingress") self.kubernetes.delete_cluster_role_binding( "ingress-nginx-nginx-ingress") self.kubernetes.create_namespace( name=self.settings.get("NGINX_INGRESS_NAMESPACE"), labels={"app": "ingress-nginx"}) self.kubernetes.delete_cluster_role( self.settings.get('NGINX_INGRESS_RELEASE_NAME') + "-nginx-ingress-controller") self.kubernetes.delete_cluster_role_binding( self.settings.get('NGINX_INGRESS_RELEASE_NAME') + "-nginx-ingress-controller") try: exec_cmd( "helm repo add ingress-nginx https://kubernetes.github.io/ingress-nginx" ) exec_cmd("helm repo add stable https://charts.helm.sh/stable") exec_cmd("helm repo update") except FileNotFoundError: logger.error( "Helm v3 is not installed. Please install it to continue " "https://helm.sh/docs/intro/install/") raise SystemExit(1) command = "helm install {} ingress-nginx/ingress-nginx --namespace={} ".format( self.settings.get('NGINX_INGRESS_RELEASE_NAME'), self.settings.get("NGINX_INGRESS_NAMESPACE")) if self.settings.get("DEPLOYMENT_ARCH") == "minikube": exec_cmd("minikube addons enable ingress") if self.settings.get("DEPLOYMENT_ARCH") == "eks": if self.settings.get("AWS_LB_TYPE") == "nlb": if install_ingress: nlb_override_values_file = Path( "./nginx/aws/aws-nlb-override-values.yaml").resolve() nlb_values = " --values {}".format( nlb_override_values_file) exec_cmd(command + nlb_values) else: if self.settings.get("USE_ARN") == "Y": if install_ingress: elb_override_values_file = Path( "./nginx/aws/aws-elb-override-values.yaml" ).resolve() elb_file_parser = Parser(elb_override_values_file, True) elb_file_parser["controller"]["service"][ "annotations"].update({ "service.beta.kubernetes.io/aws-load-balancer-ssl-cert": self.settings.get("ARN_AWS_IAM") }) elb_file_parser["controller"]["config"][ "proxy-real-ip-cidr"] = self.settings.get( "VPC_CIDR") elb_file_parser.dump_it() elb_values = " --values {}".format( elb_override_values_file) exec_cmd(command + elb_values) else: if install_ingress: exec_cmd(command) if self.settings.get("DEPLOYMENT_ARCH") in ("gke", "aks", "do"): if install_ingress: cloud_override_values_file = Path( "./nginx/cloud/cloud-override-values.yaml").resolve() cloud_values = " --values {}".format( cloud_override_values_file) exec_cmd(command + cloud_values) if self.settings.get("DEPLOYMENT_ARCH") == "local": if install_ingress: baremetal_override_values_file = Path( "./nginx/baremetal/baremetal-override-values.yaml" ).resolve() baremetal_values = " --values {}".format( baremetal_override_values_file) exec_cmd(command + baremetal_values) if self.settings.get("DEPLOYMENT_ARCH") not in ("microk8s", "minikube"): logger.info("Waiting for nginx to be prepared...") time.sleep(60) self.wait_for_nginx_add() def analyze_global_values(self): """ Parses Gluu values.yaml with the input information from prompts """ values_file_parser = Parser(self.values_file, True) if self.settings.get("DEPLOYMENT_ARCH") == "minikube": provisioner = "k8s.io/minikube-hostpath" elif self.settings.get("DEPLOYMENT_ARCH") == "eks": provisioner = "kubernetes.io/aws-ebs" elif self.settings.get("DEPLOYMENT_ARCH") == "gke": provisioner = "kubernetes.io/gce-pd" elif self.settings.get("DEPLOYMENT_ARCH") == "aks": provisioner = "kubernetes.io/azure-disk" elif self.settings.get("DEPLOYMENT_ARCH") == "do": provisioner = "dobs.csi.digitalocean.com" elif self.settings.get("DEPLOYMENT_ARCH") == "local": provisioner = "openebs.io/local" else: provisioner = "microk8s.io/hostpath" values_file_parser["global"]["provisioner"] = provisioner values_file_parser["global"]["lbIp"] = self.settings.get("HOST_EXT_IP") values_file_parser["global"]["domain"] = self.settings.get("CN_FQDN") values_file_parser["global"]["isDomainRegistered"] = "false" if self.settings.get("IS_CN_FQDN_REGISTERED") == "Y": values_file_parser["global"]["isDomainRegistered"] = "true" if self.settings.get("CN_CACHE_TYPE") == "REDIS": values_file_parser["config"]["configmap"][ "cnRedisUrl"] = self.settings.get("REDIS_URL") values_file_parser["config"]["configmap"][ "cnRedisType"] = self.settings.get("REDIS_TYPE") values_file_parser["config"]["configmap"][ "cnRedisUseSsl"] = self.settings.get("REDIS_USE_SSL") values_file_parser["config"]["configmap"]["cnRedisSslTruststore"] = \ self.settings.get("REDIS_SSL_TRUSTSTORE") values_file_parser["config"]["configmap"]["cnRedisSentinelGroup"] = \ self.settings.get("REDIS_SENTINEL_GROUP") values_file_parser["config"]["redisPass"] = self.settings.get( "REDIS_PW") if self.settings.get("DEPLOYMENT_ARCH") in ("microk8s", "minikube") \ or self.settings.get("TEST_ENVIRONMENT") == "Y": values_file_parser["global"]["cloud"]["testEnviroment"] = True values_file_parser["config"]["configmap"][ "lbAddr"] = self.settings.get("LB_ADD") values_file_parser["global"]["cnPersistenceType"] = self.settings.get( "PERSISTENCE_BACKEND") values_file_parser["config"]["configmap"][ "cnPersistenceType"] = self.settings.get("PERSISTENCE_BACKEND") values_file_parser["config"]["configmap"]["cnPersistenceLdapMapping"] = \ self.settings.get("HYBRID_LDAP_HELD_DATA") if self.settings.get("PERSISTENCE_BACKEND") != "ldap": values_file_parser["config"]["configmap"][ "cnCouchbaseUrl"] = self.settings.get("COUCHBASE_URL") values_file_parser["config"]["configmap"][ "cnCouchbaseUser"] = self.settings.get("COUCHBASE_USER") values_file_parser["config"]["configmap"][ "cnCouchbaseIndexNumReplica"] = self.settings.get( "COUCHBASE_INDEX_NUM_REPLICA") values_file_parser["config"]["configmap"]["cnCouchbaseSuperUser"] = \ self.settings.get("COUCHBASE_SUPERUSER") values_file_parser["config"]["configmap"][ "cnCouchbaseCrt"] = self.settings.get("COUCHBASE_CRT") values_file_parser["config"]["configmap"][ "cnCouchbasePass"] = self.settings.get("COUCHBASE_PASSWORD") values_file_parser["config"]["configmap"]["cnCouchbaseSuperUserPass"] = \ self.settings.get("COUCHBASE_SUPERUSER_PASSWORD") values_file_parser["global"]["auth-server"]["enabled"] = True values_file_parser["global"]["persistence"]["enabled"] = True values_file_parser["global"]["oxtrust"]["enabled"] = True values_file_parser["global"]["config"]["enabled"] = True values_file_parser["global"]["opendj"]["enabled"] = False values_file_parser["global"]["fido2"]["enabled"] = False if self.settings.get("ENABLE_FIDO2") == "Y": values_file_parser["global"]["fido2"]["enabled"] = True values_file_parser["global"]["scim"]["enabled"] = False if self.settings.get("ENABLE_SCIM") == "Y": values_file_parser["global"]["scim"]["enabled"] = True if self.settings.get("ENABLE_CONFIG_API") == "Y": values_file_parser["global"]["config-api"]["enabled"] = True if self.settings.get("INSTALL_JACKRABBIT") == "Y": values_file_parser["global"]["jackrabbit"]["enabled"] = True values_file_parser["config"]["configmap"][ "cnJackrabbitUrl"] = self.settings.get("JACKRABBIT_URL") values_file_parser["jackrabbit"]["secrets"]["cnJackrabbitAdminPass"] = \ self.settings.get("JACKRABBIT_ADMIN_PASSWORD") values_file_parser["jackrabbit"]["secrets"]["cnJackrabbitPostgresPass"] = \ self.settings.get("JACKRABBIT_PG_PASSWORD") if self.settings.get("USE_ISTIO_INGRESS") == "Y": values_file_parser["global"]["istio"]["ingress"] = True values_file_parser["global"]["istio"]["enabled"] = True values_file_parser["global"]["istio"][ "namespace"] = self.settings.get("ISTIO_SYSTEM_NAMESPACE") elif self.settings.get("AWS_LB_TYPE") == "alb": values_file_parser["global"]["alb"]["ingress"] = True else: values_file_parser["nginx-ingress"]["ingress"]["enabled"] = True values_file_parser["nginx-ingress"]["ingress"]["hosts"] = [ self.settings.get("CN_FQDN") ] values_file_parser["nginx-ingress"]["ingress"]["tls"][0][ "hosts"] = [self.settings.get("CN_FQDN")] if self.settings.get("USE_ISTIO") == "Y": values_file_parser["global"]["istio"]["enabled"] = True values_file_parser["global"]["cnJackrabbitCluster"] = "false" if self.settings.get("JACKRABBIT_CLUSTER") == "Y": values_file_parser["global"]["cnJackrabbitCluster"] = "true" values_file_parser["config"]["configmap"]["cnJackrabbitAdminId"] = \ self.settings.get("JACKRABBIT_ADMIN_ID") values_file_parser["config"]["configmap"]["cnJackrabbitPostgresUser"] = \ self.settings.get("JACKRABBIT_PG_USER") values_file_parser["config"]["configmap"]["cnJackrabbitPostgresDatabaseName"] = \ self.settings.get("JACKRABBIT_DATABASE") values_file_parser["config"]["configmap"]["cnJackrabbitPostgresHost"] = \ self.settings.get("POSTGRES_URL") values_file_parser["config"]["configmap"]["cnJackrabbitPostgresUser"] = \ self.settings.get("JACKRABBIT_PG_USER") if self.settings.get("PERSISTENCE_BACKEND") == "hybrid" or \ self.settings.get("PERSISTENCE_BACKEND") == "ldap": values_file_parser["global"]["opendj"]["enabled"] = True values_file_parser["global"]["oxshibboleth"]["enabled"] = False if self.settings.get("ENABLE_OXSHIBBOLETH") == "Y": values_file_parser["global"]["oxshibboleth"]["enabled"] = True values_file_parser["config"]["configmap"][ "cnSyncShibManifests"] = True values_file_parser["global"]["client-api"]["enabled"] = False if self.settings.get("ENABLE_CLIENT_API") == "Y": values_file_parser["global"]["client-api"]["enabled"] = True values_file_parser["config"]["configmap"]["jansClientApiApplicationCertCn"] = \ self.settings.get("CLIENT_API_APPLICATION_KEYSTORE_CN") values_file_parser["config"]["configmap"][ "jansClientApiAdminCertCn"] = self.settings.get( "CLIENT_API_ADMIN_KEYSTORE_CN") values_file_parser["opendj"]["cnRedisEnabled"] = False if self.settings.get("CN_CACHE_TYPE") == "REDIS": values_file_parser["opendj"]["cnRedisEnabled"] = True values_file_parser["global"]["nginx-ingress"]["enabled"] = True values_file_parser["global"]["cr-rotate"]["enabled"] = False if self.settings.get("ENABLE_CACHE_REFRESH") == "Y": values_file_parser["global"]["cr-rotate"]["enabled"] = True values_file_parser["global"]["auth-server-key-rotation"][ "enabled"] = False if self.settings.get("ENABLE_AUTH_SERVER_KEY_ROTATE") == "Y": values_file_parser["global"]["auth-server-key-rotation"][ "enabled"] = True values_file_parser["auth-server-key-rotation"][ "keysLife"] = self.settings.get("AUTH_SERVER_KEYS_LIFE") values_file_parser["config"]["orgName"] = self.settings.get("ORG_NAME") values_file_parser["config"]["email"] = self.settings.get("EMAIL") values_file_parser["config"]["adminPass"] = self.settings.get( "ADMIN_PW") values_file_parser["config"]["ldapPass"] = self.settings.get("LDAP_PW") values_file_parser["config"]["countryCode"] = self.settings.get( "COUNTRY_CODE") values_file_parser["config"]["state"] = self.settings.get("STATE") values_file_parser["config"]["city"] = self.settings.get("CITY") values_file_parser["config"]["configmap"][ "cnCacheType"] = self.settings.get("CN_CACHE_TYPE") values_file_parser["opendj"]["replicas"] = self.settings.get( "LDAP_REPLICAS") values_file_parser["opendj"]["persistence"][ "size"] = self.settings.get("LDAP_STORAGE_SIZE") if self.settings.get("ENABLE_OXTRUST_API_BOOLEAN") == "true": values_file_parser["config"]["configmap"][ "cnOxtrustApiEnabled"] = True if self.settings.get("ENABLE_OXTRUST_TEST_MODE_BOOLEAN") == "true": values_file_parser["config"]["configmap"][ "cnOxtrustApiTestMode"] = True if self.settings.get("ENABLE_CASA_BOOLEAN") == "true": values_file_parser["config"]["configmap"]["cnCasaEnabled"] = True values_file_parser["config"]["configmap"][ "cnSyncCasaManifests"] = True if self.settings.get("ENABLE_OXPASSPORT_BOOLEAN") == "true": values_file_parser["config"]["configmap"][ "cnPassportEnabled"] = True if self.settings.get("ENABLE_RADIUS_BOOLEAN") == "true": values_file_parser["config"]["configmap"]["cnRadiusEnabled"] = True if self.settings.get("ENABLE_SAML_BOOLEAN") == "true": values_file_parser["config"]["configmap"]["cnSamlEnabled"] = True values_file_parser["oxpassport"]["resources"] = {} values_file_parser["casa"]["image"]["repository"] = self.settings.get( "CASA_IMAGE_NAME") values_file_parser["casa"]["image"]["tag"] = self.settings.get( "CASA_IMAGE_TAG") values_file_parser["config"]["image"][ "repository"] = self.settings.get("CONFIG_IMAGE_NAME") values_file_parser["config"]["image"]["tag"] = self.settings.get( "CONFIG_IMAGE_TAG") values_file_parser["cr-rotate"]["image"][ "repository"] = self.settings.get( "CACHE_REFRESH_ROTATE_IMAGE_NAME") values_file_parser["cr-rotate"]["image"]["tag"] = self.settings.get( "CACHE_REFRESH_ROTATE_IMAGE_TAG") values_file_parser["auth-server-key-rotation"]["image"][ "repository"] = self.settings.get("CERT_MANAGER_IMAGE_NAME") values_file_parser["auth-server-key-rotation"]["image"][ "tag"] = self.settings.get("CERT_MANAGER_IMAGE_TAG") values_file_parser["opendj"]["image"][ "repository"] = self.settings.get("LDAP_IMAGE_NAME") values_file_parser["opendj"]["image"]["tag"] = self.settings.get( "LDAP_IMAGE_TAG") values_file_parser["persistence"]["image"][ "repository"] = self.settings.get("PERSISTENCE_IMAGE_NAME") values_file_parser["persistence"]["image"]["tag"] = self.settings.get( "PERSISTENCE_IMAGE_TAG") values_file_parser["auth-server"]["image"][ "repository"] = self.settings.get("AUTH_SERVER_IMAGE_NAME") values_file_parser["auth-server"]["image"]["tag"] = self.settings.get( "AUTH_SERVER_IMAGE_TAG") values_file_parser["client-api"]["image"][ "repository"] = self.settings.get("CLIENT_API_IMAGE_NAME") values_file_parser["client-api"]["image"]["tag"] = self.settings.get( "CLIENT_API_IMAGE_TAG") values_file_parser["oxpassport"]["image"][ "repository"] = self.settings.get("OXPASSPORT_IMAGE_NAME") values_file_parser["oxpassport"]["image"]["tag"] = self.settings.get( "OXPASSPORT_IMAGE_TAG") values_file_parser["oxshibboleth"]["image"][ "repository"] = self.settings.get("OXSHIBBOLETH_IMAGE_NAME") values_file_parser["oxshibboleth"]["image"]["tag"] = self.settings.get( "OXSHIBBOLETH_IMAGE_TAG") values_file_parser["jackrabbit"]["image"][ "repository"] = self.settings.get("JACKRABBIT_IMAGE_NAME") values_file_parser["jackrabbit"]["image"]["tag"] = self.settings.get( "JACKRABBIT_IMAGE_TAG") values_file_parser["oxtrust"]["image"][ "repository"] = self.settings.get("OXTRUST_IMAGE_NAME") values_file_parser["oxtrust"]["image"]["tag"] = self.settings.get( "OXTRUST_IMAGE_TAG") values_file_parser["radius"]["image"][ "repository"] = self.settings.get("RADIUS_IMAGE_NAME") values_file_parser["radius"]["image"]["tag"] = self.settings.get( "RADIUS_IMAGE_TAG") values_file_parser.dump_it() def install_gluu(self, install_ingress=True): """ Helm install Gluu :param install_ingress: """ labels = {"app": "gluu"} if self.settings.get("USE_ISTIO") == "Y": labels = {"app": "gluu", "istio-injection": "enabled"} self.kubernetes.create_namespace( name=self.settings.get("CN_NAMESPACE"), labels=labels) if self.settings.get( "PERSISTENCE_BACKEND") != "ldap" and self.settings.get( "INSTALL_COUCHBASE") == "Y": couchbase_app = Couchbase() couchbase_app.uninstall() couchbase_app = Couchbase() couchbase_app.install() self.settings = SettingsHandler() if self.settings.get("AWS_LB_TYPE") == "alb": self.prepare_alb() self.deploy_alb() if self.settings.get("AWS_LB_TYPE") != "alb" and self.settings.get( "USE_ISTIO_INGRESS") != "Y": self.check_install_nginx_ingress(install_ingress) self.analyze_global_values() try: exec_cmd("helm install {} -f {} ./helm/gluu --namespace={}".format( self.settings.get('CN_HELM_RELEASE_NAME'), self.values_file, self.settings.get("CN_NAMESPACE"))) if self.settings.get("PERSISTENCE_BACKEND") == "hybrid" or \ self.settings.get("PERSISTENCE_BACKEND") == "ldap": values_file = Path("./helm/ldap-backup/values.yaml").resolve() values_file_parser = Parser(values_file, True) values_file_parser["ldapPass"] = self.settings.get("LDAP_PW") values_file_parser.dump_it() exec_cmd( "helm install {} -f ./helm/ldap-backup/values.yaml ./helm/ldap-backup --namespace={}" .format(self.ldap_backup_release_name, self.settings.get("CN_NAMESPACE"))) except FileNotFoundError: logger.error( "Helm v3 is not installed. Please install it to continue " "https://helm.sh/docs/intro/install/") raise SystemExit(1) def install_gluu_gateway_ui(self): self.uninstall_gluu_gateway_ui() self.kubernetes.create_namespace( name=self.settings.get("GLUU_GATEWAY_UI_NAMESPACE"), labels={"APP_NAME": "gluu-gateway-ui"}) try: # Try to get gluu cert + key ssl_cert = self.kubernetes.read_namespaced_secret( "gluu", self.settings.get("CN_NAMESPACE")).data["ssl_cert"] ssl_key = self.kubernetes.read_namespaced_secret( "gluu", self.settings.get("CN_NAMESPACE")).data["ssl_key"] self.kubernetes.patch_or_create_namespaced_secret( name="tls-certificate", namespace=self.settings.get("GLUU_GATEWAY_UI_NAMESPACE"), literal="tls.crt", value_of_literal=ssl_cert, secret_type="kubernetes.io/tls", second_literal="tls.key", value_of_second_literal=ssl_key) except (KeyError, Exception): logger.error( "Could not read Gluu secret. Please check config job pod logs. GG-UI will deploy but fail. " "Please mount crt and key inside gg-ui deployment") client_api_server_url = "https://{}.{}.svc.cluster.local:8443".format( self.settings.get("CLIENT_API_APPLICATION_KEYSTORE_CN"), self.settings.get("CN_NAMESPACE")) values_file = Path("./helm/gluu-gateway-ui/values.yaml").resolve() values_file_parser = Parser(values_file, True) values_file_parser["cloud"]["isDomainRegistered"] = "false" if self.settings.get("IS_CN_FQDN_REGISTERED") == "Y": values_file_parser["cloud"]["isDomainRegistered"] = "true" if self.settings.get( "DEPLOYMENT_ARCH") == "microk8s" or self.settings.get( "DEPLOYMENT_ARCH") == "minikube": values_file_parser["cloud"]["enabled"] = False values_file_parser["cloud"]["provider"] = self.settings.get( "DEPLOYMENT_ARCH") values_file_parser["dbUser"] = self.settings.get( "GLUU_GATEWAY_UI_PG_USER") values_file_parser[ "kongAdminUrl"] = "https://{}-kong-admin.{}.svc.cluster.local:8444".format( self.settings.get("KONG_HELM_RELEASE_NAME"), self.settings.get("KONG_NAMESPACE")) values_file_parser["dbHost"] = self.settings.get("POSTGRES_URL") values_file_parser["dbDatabase"] = self.settings.get( "GLUU_GATEWAY_UI_DATABASE") values_file_parser["clientApiServerUrl"] = client_api_server_url values_file_parser["image"]["repository"] = self.settings.get( "GLUU_GATEWAY_UI_IMAGE_NAME") values_file_parser["image"]["tag"] = self.settings.get( "GLUU_GATEWAY_UI_IMAGE_TAG") values_file_parser["loadBalancerIp"] = self.settings.get("HOST_EXT_IP") values_file_parser["dbPassword"] = self.settings.get( "GLUU_GATEWAY_UI_PG_PASSWORD") values_file_parser["opServerUrl"] = "https://" + self.settings.get( "CN_FQDN") values_file_parser["ggHost"] = self.settings.get("CN_FQDN") + "/gg-ui/" values_file_parser["ggUiRedirectUrlHost"] = self.settings.get( "CN_FQDN") + "/gg-ui/" # Register new client if one was not provided if not values_file_parser["clientApiId"] or \ not values_file_parser["clientId"] or \ not values_file_parser["clientSecret"]: client_api_id, client_id, client_secret = register_op_client( self.settings.get("CN_NAMESPACE"), "konga-client", self.settings.get("CN_FQDN"), client_api_server_url, self.settings.get('CN_HELM_RELEASE_NAME')) if not client_api_id: values_file_parser.dump_it() logger.error( "Due to a failure in konga client registration the installation has stopped." " Please register as suggested above manually and enter the values returned" " for clientApiId, clientId, " "and clientSecret inside ./helm/gluu-gateway-ui/values.yaml then run " "helm install {} -f ./helm/gluu-gateway-ui/values.yaml ./helm/gluu-gateway-ui " "--namespace={}".format( self.settings.get('GLUU_GATEWAY_UI_HELM_RELEASE_NAME'), self.settings.get("GLUU_GATEWAY_UI_NAMESPACE"))) raise SystemExit(1) values_file_parser["clientApiId"] = client_api_id values_file_parser["clientId"] = client_id values_file_parser["clientSecret"] = client_secret values_file_parser.dump_it() exec_cmd( "helm install {} -f ./helm/gluu-gateway-ui/values.yaml ./helm/gluu-gateway-ui --namespace={}" .format(self.settings.get('GLUU_GATEWAY_UI_HELM_RELEASE_NAME'), self.settings.get("GLUU_GATEWAY_UI_NAMESPACE"))) def install_gluu_gateway_dbmode(self): self.uninstall_gluu_gateway_dbmode() self.kubernetes.create_namespace( name=self.settings.get("KONG_NAMESPACE"), labels={"app": "ingress-kong"}) encoded_kong_pass_bytes = base64.b64encode( self.settings.get("KONG_PG_PASSWORD").encode("utf-8")) encoded_kong_pass_string = str(encoded_kong_pass_bytes, "utf-8") self.kubernetes.patch_or_create_namespaced_secret( name="kong-postgres-pass", namespace=self.settings.get("KONG_NAMESPACE"), literal="KONG_PG_PASSWORD", value_of_literal=encoded_kong_pass_string) exec_cmd("helm repo add kong https://charts.konghq.com") exec_cmd("helm repo update") exec_cmd( "helm install {} kong/kong " "--set ingressController.installCRDs=false " "--set image.repository={} " "--set image.tag={} " "--set env.database=postgres " "--set env.pg_user={} " "--set env.pg_password.valueFrom.secretKeyRef.name=kong-postgres-pass " "--set env.pg_password.valueFrom.secretKeyRef.key=KONG_PG_PASSWORD " "--set env.pg_host={} " "--set admin.enabled=true " "--set admin.type=ClusterIP " "--namespace={}".format( self.settings.get("KONG_HELM_RELEASE_NAME"), self.settings.get("GLUU_GATEWAY_IMAGE_NAME"), self.settings.get("GLUU_GATEWAY_IMAGE_TAG"), self.settings.get("KONG_PG_USER"), self.settings.get("POSTGRES_URL"), self.settings.get("KONG_NAMESPACE"))) def install_kubedb(self): self.uninstall_kubedb() self.kubernetes.create_namespace(name="gluu-kubedb", labels={"app": "kubedb"}) try: exec_cmd( "helm repo add appscode https://charts.appscode.com/stable/") exec_cmd("helm repo update") exec_cmd( "helm install kubedb-operator appscode/kubedb --version v0.13.0-rc.0 " "--namespace gluu-kubedb") self.kubernetes.check_pods_statuses("gluu-kubedb", "app=kubedb") exec_cmd( "helm install kubedb-catalog appscode/kubedb-catalog --version v0.13.0-rc.0 " "--namespace gluu-kubedb") except FileNotFoundError: logger.error( "Helm v3 is not installed. Please install it to continue " "https://helm.sh/docs/intro/install/") raise SystemExit(1) def uninstall_gluu_gateway_dbmode(self): exec_cmd("helm delete {} --namespace={}".format( self.settings.get('KONG_HELM_RELEASE_NAME'), self.settings.get("KONG_NAMESPACE"))) def uninstall_gluu_gateway_ui(self): exec_cmd("helm delete {} --namespace={}".format( self.settings.get('GLUU_GATEWAY_UI_HELM_RELEASE_NAME'), self.settings.get("GLUU_GATEWAY_UI_NAMESPACE"))) def uninstall_kubedb(self): logger.info("Deleting KubeDB...This may take a little while.") try: exec_cmd( "helm repo add appscode https://charts.appscode.com/stable/") exec_cmd("helm repo update") exec_cmd("helm delete kubedb-operator --namespace gluu-kubedb") exec_cmd("helm delete kubedb-catalog --namespace gluu-kubedb") time.sleep(20) except FileNotFoundError: logger.error( "Helm v3 is not installed. Please install it to continue " "https://helm.sh/docs/intro/install/") raise SystemExit(1) def uninstall_gluu(self): exec_cmd("helm delete {} --namespace={}".format( self.settings.get('CN_HELM_RELEASE_NAME'), self.settings.get("CN_NAMESPACE"))) exec_cmd("helm delete {} --namespace={}".format( self.ldap_backup_release_name, self.settings.get("CN_NAMESPACE"))) def uninstall_nginx_ingress(self): exec_cmd("helm delete {} --namespace={}".format( self.settings.get('NGINX_INGRESS_RELEASE_NAME'), self.settings.get("NGINX_INGRESS_NAMESPACE")))