agent.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448
  1. package helm
  2. import (
  3. "bytes"
  4. "context"
  5. "fmt"
  6. "strconv"
  7. "strings"
  8. "time"
  9. "github.com/pkg/errors"
  10. "github.com/porter-dev/porter/internal/helm/loader"
  11. "golang.org/x/oauth2"
  12. "helm.sh/helm/v3/pkg/action"
  13. "helm.sh/helm/v3/pkg/chart"
  14. "helm.sh/helm/v3/pkg/release"
  15. "helm.sh/helm/v3/pkg/storage/driver"
  16. corev1 "k8s.io/api/core/v1"
  17. v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  18. "k8s.io/helm/pkg/chartutil"
  19. "github.com/porter-dev/porter/api/types"
  20. "github.com/porter-dev/porter/internal/kubernetes"
  21. "github.com/porter-dev/porter/internal/models"
  22. "github.com/porter-dev/porter/internal/repository"
  23. )
  24. // Agent is a Helm agent for performing helm operations
  25. type Agent struct {
  26. ActionConfig *action.Configuration
  27. K8sAgent *kubernetes.Agent
  28. }
  29. // ListReleases lists releases based on a ListFilter
  30. func (a *Agent) ListReleases(
  31. namespace string,
  32. filter *types.ReleaseListFilter,
  33. ) ([]*release.Release, error) {
  34. lsel := fmt.Sprintf("owner=helm,status in (%s)", strings.Join(filter.StatusFilter, ","))
  35. // list secrets
  36. secretList, err := a.K8sAgent.Clientset.CoreV1().Secrets(namespace).List(
  37. context.Background(),
  38. v1.ListOptions{
  39. LabelSelector: lsel,
  40. },
  41. )
  42. if err != nil {
  43. return nil, err
  44. }
  45. // before decoding to helm release, only keep the latest releases for each chart
  46. latestMap := make(map[string]corev1.Secret)
  47. for _, secret := range secretList.Items {
  48. relName, relNameExists := secret.Labels["name"]
  49. if !relNameExists {
  50. continue
  51. }
  52. id := fmt.Sprintf("%s/%s", secret.Namespace, relName)
  53. if currLatest, exists := latestMap[id]; exists {
  54. // get version
  55. currVersionStr, currVersionExists := currLatest.Labels["version"]
  56. versionStr, versionExists := secret.Labels["version"]
  57. if versionExists && currVersionExists {
  58. currVersion, currErr := strconv.Atoi(currVersionStr)
  59. version, err := strconv.Atoi(versionStr)
  60. if currErr == nil && err == nil && currVersion < version {
  61. latestMap[id] = secret
  62. }
  63. }
  64. } else {
  65. latestMap[id] = secret
  66. }
  67. }
  68. chartList := []string{}
  69. res := make([]*release.Release, 0)
  70. for _, secret := range latestMap {
  71. rel, isErr, err := kubernetes.ParseSecretToHelmRelease(secret, chartList)
  72. if !isErr && err == nil {
  73. res = append(res, rel)
  74. }
  75. }
  76. return res, nil
  77. }
  78. // GetRelease returns the info of a release.
  79. func (a *Agent) GetRelease(
  80. name string,
  81. version int,
  82. getDeps bool,
  83. ) (*release.Release, error) {
  84. // Namespace is already known by the RESTClientGetter.
  85. cmd := action.NewGet(a.ActionConfig)
  86. cmd.Version = version
  87. release, err := cmd.Run(name)
  88. if err != nil {
  89. return nil, err
  90. }
  91. if getDeps && release.Chart != nil && release.Chart.Metadata != nil {
  92. for _, dep := range release.Chart.Metadata.Dependencies {
  93. // only search for dependency if it passes the condition specified in Chart.yaml
  94. if dep.Enabled {
  95. depExists := false
  96. for _, currDep := range release.Chart.Dependencies() {
  97. // we just case on name for now -- there might be edge cases we're missing
  98. // but this will cover 99% of cases
  99. if dep != nil && currDep != nil && dep.Name == currDep.Name() {
  100. depExists = true
  101. break
  102. }
  103. }
  104. if !depExists {
  105. depChart, err := loader.LoadChartPublic(dep.Repository, dep.Name, dep.Version)
  106. if err != nil {
  107. return nil, fmt.Errorf("Error retrieving chart dependency %s/%s-%s: %s", dep.Repository, dep.Name, dep.Version, err.Error())
  108. }
  109. release.Chart.AddDependency(depChart)
  110. }
  111. }
  112. }
  113. }
  114. return release, err
  115. }
  116. // GetReleaseHistory returns a list of charts for a specific release
  117. func (a *Agent) GetReleaseHistory(
  118. name string,
  119. ) ([]*release.Release, error) {
  120. cmd := action.NewHistory(a.ActionConfig)
  121. return cmd.Run(name)
  122. }
  123. type UpgradeReleaseConfig struct {
  124. Name string
  125. Values map[string]interface{}
  126. Cluster *models.Cluster
  127. Repo repository.Repository
  128. Registries []*models.Registry
  129. // Optional, if chart should be overriden
  130. Chart *chart.Chart
  131. }
  132. // UpgradeRelease upgrades a specific release with new values.yaml
  133. func (a *Agent) UpgradeRelease(
  134. conf *UpgradeReleaseConfig,
  135. values string,
  136. doAuth *oauth2.Config,
  137. ) (*release.Release, error) {
  138. valuesYaml, err := chartutil.ReadValues([]byte(values))
  139. if err != nil {
  140. return nil, fmt.Errorf("Values could not be parsed: %v", err)
  141. }
  142. conf.Values = valuesYaml
  143. return a.UpgradeReleaseByValues(conf, doAuth)
  144. }
  145. // UpgradeReleaseByValues upgrades a release by unmarshaled yaml values
  146. func (a *Agent) UpgradeReleaseByValues(
  147. conf *UpgradeReleaseConfig,
  148. doAuth *oauth2.Config,
  149. ) (*release.Release, error) {
  150. // grab the latest release
  151. rel, err := a.GetRelease(conf.Name, 0, true)
  152. if err != nil {
  153. return nil, fmt.Errorf("Could not get release to be upgraded: %v", err)
  154. }
  155. ch := rel.Chart
  156. if conf.Chart != nil {
  157. ch = conf.Chart
  158. }
  159. cmd := action.NewUpgrade(a.ActionConfig)
  160. cmd.Namespace = rel.Namespace
  161. cmd.PostRenderer, err = NewPorterPostrenderer(
  162. conf.Cluster,
  163. conf.Repo,
  164. a.K8sAgent,
  165. rel.Namespace,
  166. conf.Registries,
  167. doAuth,
  168. )
  169. if err != nil {
  170. return nil, err
  171. }
  172. res, err := cmd.Run(conf.Name, ch, conf.Values)
  173. if err != nil {
  174. // refer: https://github.com/helm/helm/blob/release-3.8/pkg/action/action.go#L62
  175. // issue tracker: https://github.com/helm/helm/issues/4558
  176. if err.Error() == "another operation (install/upgrade/rollback) is in progress" {
  177. secretList, err := a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace).List(
  178. context.Background(),
  179. v1.ListOptions{
  180. LabelSelector: fmt.Sprintf("owner=helm,status in (pending-install, pending-upgrade, pending-rollback),name=%s", rel.Name),
  181. },
  182. )
  183. if err != nil {
  184. return nil, fmt.Errorf("Upgrade failed: %w", err)
  185. }
  186. if len(secretList.Items) > 0 {
  187. mostRecentSecret := secretList.Items[0]
  188. for i := 1; i < len(secretList.Items); i += 1 {
  189. oldVersion, _ := strconv.Atoi(mostRecentSecret.Labels["version"])
  190. newVersion, _ := strconv.Atoi(secretList.Items[i].Labels["version"])
  191. if oldVersion < newVersion {
  192. mostRecentSecret = secretList.Items[i]
  193. }
  194. }
  195. if time.Since(mostRecentSecret.CreationTimestamp.Time) >= time.Minute {
  196. helmSecrets := driver.NewSecrets(a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace))
  197. rel.Info.Status = release.StatusFailed
  198. err = helmSecrets.Update(mostRecentSecret.GetName(), rel)
  199. if err != nil {
  200. return nil, fmt.Errorf("Upgrade failed: %w", err)
  201. }
  202. // retry upgrade
  203. res, err = cmd.Run(conf.Name, ch, conf.Values)
  204. if err != nil {
  205. return nil, fmt.Errorf("Upgrade failed: %w", err)
  206. }
  207. return res, nil
  208. } else {
  209. // ask the user to wait for about a minute before retrying for the above fix to kick in
  210. return nil, fmt.Errorf("another operation (install/upgrade/rollback) is in progress. If this error persists, please wait for 60 seconds to force an upgrade")
  211. }
  212. }
  213. } else if strings.Contains(err.Error(), "current release manifest contains removed kubernetes api(s)") {
  214. // ref: https://helm.sh/docs/topics/kubernetes_apis/#updating-api-versions-of-a-release-manifest
  215. // in this case, we manually update the secret containing the new manifests
  216. secretList, err := a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace).List(
  217. context.Background(),
  218. v1.ListOptions{
  219. LabelSelector: fmt.Sprintf("owner=helm,name=%s", rel.Name),
  220. },
  221. )
  222. if err != nil {
  223. return nil, fmt.Errorf("Upgrade failed: %w", err)
  224. }
  225. if len(secretList.Items) > 0 {
  226. mostRecentSecret := secretList.Items[0]
  227. for i := 1; i < len(secretList.Items); i += 1 {
  228. oldVersion, _ := strconv.Atoi(mostRecentSecret.Labels["version"])
  229. newVersion, _ := strconv.Atoi(secretList.Items[i].Labels["version"])
  230. if oldVersion < newVersion {
  231. mostRecentSecret = secretList.Items[i]
  232. }
  233. }
  234. // run the equivalent of `helm template` to get the manifest string for the new release
  235. installCmd := action.NewInstall(a.ActionConfig)
  236. installCmd.ReleaseName = conf.Name
  237. installCmd.Namespace = rel.Namespace
  238. installCmd.DryRun = true
  239. installCmd.Replace = true
  240. installCmd.ClientOnly = false
  241. installCmd.IncludeCRDs = true
  242. newRelDryRun, err := installCmd.Run(ch, conf.Values)
  243. if err != nil {
  244. return nil, err
  245. }
  246. oldManifestBuffer := bytes.NewBufferString(rel.Manifest)
  247. newManifestBuffer := bytes.NewBufferString(newRelDryRun.Manifest)
  248. versionMapper := &DeprecatedAPIVersionMapper{}
  249. updatedManifestBuffer, err := versionMapper.Run(oldManifestBuffer, newManifestBuffer)
  250. if err != nil {
  251. return nil, err
  252. }
  253. rel.Manifest = updatedManifestBuffer.String()
  254. helmSecrets := driver.NewSecrets(a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace))
  255. err = helmSecrets.Update(mostRecentSecret.GetName(), rel)
  256. if err != nil {
  257. return nil, fmt.Errorf("Upgrade failed: %w", err)
  258. }
  259. res, err := cmd.Run(conf.Name, ch, conf.Values)
  260. if err != nil {
  261. return nil, fmt.Errorf("Upgrade failed: %w", err)
  262. }
  263. return res, nil
  264. }
  265. }
  266. return nil, fmt.Errorf("Upgrade failed: %w", err)
  267. }
  268. return res, nil
  269. }
  270. // InstallChartConfig is the config required to install a chart
  271. type InstallChartConfig struct {
  272. Chart *chart.Chart
  273. Name string
  274. Namespace string
  275. Values map[string]interface{}
  276. Cluster *models.Cluster
  277. Repo repository.Repository
  278. Registries []*models.Registry
  279. }
  280. // InstallChartFromValuesBytes reads the raw values and calls Agent.InstallChart
  281. func (a *Agent) InstallChartFromValuesBytes(
  282. conf *InstallChartConfig,
  283. values []byte,
  284. doAuth *oauth2.Config,
  285. ) (*release.Release, error) {
  286. valuesYaml, err := chartutil.ReadValues(values)
  287. if err != nil {
  288. return nil, fmt.Errorf("Values could not be parsed: %v", err)
  289. }
  290. conf.Values = valuesYaml
  291. return a.InstallChart(conf, doAuth)
  292. }
  293. // InstallChart installs a new chart
  294. func (a *Agent) InstallChart(
  295. conf *InstallChartConfig,
  296. doAuth *oauth2.Config,
  297. ) (*release.Release, error) {
  298. cmd := action.NewInstall(a.ActionConfig)
  299. if cmd.Version == "" && cmd.Devel {
  300. cmd.Version = ">0.0.0-0"
  301. }
  302. cmd.ReleaseName = conf.Name
  303. cmd.Namespace = conf.Namespace
  304. cmd.Timeout = 300 * time.Second
  305. if err := checkIfInstallable(conf.Chart); err != nil {
  306. return nil, err
  307. }
  308. var err error
  309. cmd.PostRenderer, err = NewPorterPostrenderer(
  310. conf.Cluster,
  311. conf.Repo,
  312. a.K8sAgent,
  313. conf.Namespace,
  314. conf.Registries,
  315. doAuth,
  316. )
  317. if err != nil {
  318. return nil, err
  319. }
  320. if req := conf.Chart.Metadata.Dependencies; req != nil {
  321. if err := action.CheckDependencies(conf.Chart, req); err != nil {
  322. // TODO: Handle dependency updates.
  323. return nil, err
  324. }
  325. }
  326. return cmd.Run(conf.Chart, conf.Values)
  327. }
  328. // UninstallChart uninstalls a chart
  329. func (a *Agent) UninstallChart(
  330. name string,
  331. ) (*release.UninstallReleaseResponse, error) {
  332. cmd := action.NewUninstall(a.ActionConfig)
  333. return cmd.Run(name)
  334. }
  335. // RollbackRelease rolls a release back to a specified revision/version
  336. func (a *Agent) RollbackRelease(
  337. name string,
  338. version int,
  339. ) error {
  340. cmd := action.NewRollback(a.ActionConfig)
  341. cmd.Version = version
  342. return cmd.Run(name)
  343. }
  344. // ------------------------ Helm agent helper functions ------------------------ //
  345. // checkIfInstallable validates if a chart can be installed
  346. // Application chart type is only installable
  347. func checkIfInstallable(ch *chart.Chart) error {
  348. switch ch.Metadata.Type {
  349. case "", "application":
  350. return nil
  351. }
  352. return errors.Errorf("%s charts are not installable", ch.Metadata.Type)
  353. }