|
214 | 214 | kubectl apply -f gitpod-certificate.yaml
|
215 | 215 | rm gitpod-certificate.yaml
|
216 | 216 |
|
| 217 | + kubectl rollout restart deployment/server |
| 218 | + |
217 | 219 | echo "Gitpod successfully installed to ${DOMAIN}..."
|
218 | 220 | }
|
219 | 221 |
|
@@ -390,28 +392,36 @@ function setup_mysql_database() {
|
390 | 392 | }
|
391 | 393 |
|
392 | 394 | function setup_storage() {
|
393 |
| -# @todo use Minio as Azure facade https://docs.min.io/docs/minio-gateway-for-azure.html |
394 |
| -# |
395 |
| -# if [ "$(az storage account show --name ${STORAGE_ACCOUNT_NAME} --resource-group ${RESOURCE_GROUP} --query "name == '${STORAGE_ACCOUNT_NAME}'" || echo "empty")" == "true" ]; then |
396 |
| -# echo "Storage account exists..." |
397 |
| -# else |
398 |
| -# echo "Create storage account..." |
399 |
| -# az storage account create \ |
400 |
| -# --access-tier Hot \ |
401 |
| -# --kind StorageV2 \ |
402 |
| -# --name "${STORAGE_ACCOUNT_NAME}" \ |
403 |
| -# --resource-group "${RESOURCE_GROUP}" \ |
404 |
| -# --sku Standard_LRS |
405 |
| -# fi |
406 |
| - |
407 |
| - export MINIO_ACCESS_KEY=$(openssl rand -base64 20) |
408 |
| - export MINIO_SECRET_KEY=$(openssl rand -base64 20) |
409 |
| - |
410 |
| -# export STORAGE_ACCOUNT_KEY=$(az storage account keys list \ |
411 |
| -# --account-name "${STORAGE_ACCOUNT_NAME}" \ |
412 |
| -# --resource-group "${RESOURCE_GROUP}" \ |
413 |
| -# --output json \ |
414 |
| -# | jq -r '.[] | select(.keyName == "key1") | .value') |
| 395 | + if [ "$(az storage account show --name ${STORAGE_ACCOUNT_NAME} --resource-group ${RESOURCE_GROUP} --query "name == '${STORAGE_ACCOUNT_NAME}'" || echo "empty")" == "true" ]; then |
| 396 | + echo "Storage account exists..." |
| 397 | + else |
| 398 | + echo "Create storage account..." |
| 399 | + az storage account create \ |
| 400 | + --access-tier Hot \ |
| 401 | + --kind StorageV2 \ |
| 402 | + --name "${1}" \ |
| 403 | + --resource-group "${RESOURCE_GROUP}" \ |
| 404 | + --sku Standard_LRS |
| 405 | + fi |
| 406 | + |
| 407 | + PRINCIPAL_ID=$(az aks show --name "${CLUSTER_NAME}" --resource-group "${RESOURCE_GROUP}" --query "identityProfile.kubeletidentity.objectId" -o tsv) |
| 408 | + STORAGE_ACCOUNT_ID=$(az storage account show \ |
| 409 | + --name "${STORAGE_ACCOUNT_NAME}" \ |
| 410 | + --output tsv \ |
| 411 | + --query id \ |
| 412 | + --resource-group "${RESOURCE_GROUP}" ) |
| 413 | + |
| 414 | + echo "Allow Kubernetes managed identity to access the storage account..." |
| 415 | + az role assignment create \ |
| 416 | + --assignee "${PRINCIPAL_ID}" \ |
| 417 | + --role "Storage Blob Data Contributor" \ |
| 418 | + --scope "${STORAGE_ACCOUNT_ID}" |
| 419 | + |
| 420 | + export STORAGE_ACCOUNT_KEY=$(az storage account keys list \ |
| 421 | + --account-name "${STORAGE_ACCOUNT_NAME}" \ |
| 422 | + --resource-group "${RESOURCE_GROUP}" \ |
| 423 | + --output json \ |
| 424 | + | jq -r '.[] | select(.keyName == "key1") | .value') |
415 | 425 | }
|
416 | 426 |
|
417 | 427 | function uninstall() {
|
|
0 commit comments