| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206 |
- package kubernetes
- import (
- "bufio"
- "bytes"
- "compress/gzip"
- "context"
- "encoding/base64"
- "encoding/json"
- "fmt"
- "io"
- "io/ioutil"
- "strings"
- "time"
- goerrors "errors"
- "github.com/porter-dev/porter/api/server/shared/websocket"
- "github.com/porter-dev/porter/internal/kubernetes/provisioner"
- "github.com/porter-dev/porter/internal/models"
- "github.com/porter-dev/porter/internal/registry"
- "github.com/porter-dev/porter/internal/repository"
- "golang.org/x/oauth2"
- errors2 "errors"
- "github.com/porter-dev/porter/internal/helm/grapher"
- appsv1 "k8s.io/api/apps/v1"
- batchv1 "k8s.io/api/batch/v1"
- batchv1beta1 "k8s.io/api/batch/v1beta1"
- v1 "k8s.io/api/core/v1"
- v1beta1 "k8s.io/api/extensions/v1beta1"
- "k8s.io/apimachinery/pkg/api/errors"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/fields"
- "k8s.io/apimachinery/pkg/runtime"
- "k8s.io/apimachinery/pkg/runtime/schema"
- "k8s.io/apimachinery/pkg/types"
- "k8s.io/apimachinery/pkg/watch"
- "k8s.io/cli-runtime/pkg/genericclioptions"
- "k8s.io/client-go/informers"
- "k8s.io/client-go/kubernetes"
- "k8s.io/client-go/rest"
- "k8s.io/client-go/tools/cache"
- "k8s.io/client-go/tools/remotecommand"
- rspb "helm.sh/helm/v3/pkg/release"
- )
- // Agent is a Kubernetes agent for performing operations that interact with the
- // api server
- type Agent struct {
- RESTClientGetter genericclioptions.RESTClientGetter
- Clientset kubernetes.Interface
- }
- type Message struct {
- EventType string `json:"event_type"`
- Object interface{}
- Kind string
- }
- type ListOptions struct {
- FieldSelector string
- }
- type AuthError struct{}
- func (e *AuthError) Error() string {
- return "Unauthorized error"
- }
- // UpdateClientset updates the Agent's Clientset (this refreshes auth tokens)
- func (a *Agent) UpdateClientset() error {
- restConf, err := a.RESTClientGetter.ToRESTConfig()
- if err != nil {
- return err
- }
- clientset, err := kubernetes.NewForConfig(restConf)
- if err != nil {
- return err
- }
- a.Clientset = clientset
- return nil
- }
- // CreateConfigMap creates the configmap given the key-value pairs and namespace
- func (a *Agent) CreateConfigMap(name string, namespace string, configMap map[string]string) (*v1.ConfigMap, error) {
- return a.Clientset.CoreV1().ConfigMaps(namespace).Create(
- context.TODO(),
- &v1.ConfigMap{
- ObjectMeta: metav1.ObjectMeta{
- Name: name,
- Namespace: namespace,
- Labels: map[string]string{
- "porter": "true",
- },
- },
- Data: configMap,
- },
- metav1.CreateOptions{},
- )
- }
- // CreateLinkedSecret creates a secret given the key-value pairs and namespace. Values are
- // base64 encoded
- func (a *Agent) CreateLinkedSecret(name, namespace, cmName string, data map[string][]byte) (*v1.Secret, error) {
- return a.Clientset.CoreV1().Secrets(namespace).Create(
- context.TODO(),
- &v1.Secret{
- ObjectMeta: metav1.ObjectMeta{
- Name: name,
- Namespace: namespace,
- Labels: map[string]string{
- "porter": "true",
- "configmap": cmName,
- },
- },
- Data: data,
- },
- metav1.CreateOptions{},
- )
- }
- type mergeConfigMapData struct {
- Data map[string]*string `json:"data"`
- }
- // UpdateConfigMap updates the configmap given its name and namespace
- func (a *Agent) UpdateConfigMap(name string, namespace string, configMap map[string]string) (*v1.ConfigMap, error) {
- cmData := make(map[string]*string)
- for key, val := range configMap {
- valCopy := val
- cmData[key] = &valCopy
- if len(val) == 0 {
- cmData[key] = nil
- }
- }
- mergeCM := &mergeConfigMapData{
- Data: cmData,
- }
- patchBytes, err := json.Marshal(mergeCM)
- if err != nil {
- return nil, err
- }
- return a.Clientset.CoreV1().ConfigMaps(namespace).Patch(
- context.Background(),
- name,
- types.MergePatchType,
- patchBytes,
- metav1.PatchOptions{},
- )
- }
- type mergeLinkedSecretData struct {
- Data map[string]*[]byte `json:"data"`
- }
- // UpdateLinkedSecret updates the secret given its name and namespace
- func (a *Agent) UpdateLinkedSecret(name, namespace, cmName string, data map[string][]byte) error {
- secretData := make(map[string]*[]byte)
- for key, val := range data {
- valCopy := val
- secretData[key] = &valCopy
- if len(val) == 0 {
- secretData[key] = nil
- }
- }
- mergeSecret := &mergeLinkedSecretData{
- Data: secretData,
- }
- patchBytes, err := json.Marshal(mergeSecret)
- if err != nil {
- return err
- }
- _, err = a.Clientset.CoreV1().Secrets(namespace).Patch(
- context.TODO(),
- name,
- types.MergePatchType,
- patchBytes,
- metav1.PatchOptions{},
- )
- return err
- }
- // DeleteConfigMap deletes the configmap given its name and namespace
- func (a *Agent) DeleteConfigMap(name string, namespace string) error {
- return a.Clientset.CoreV1().ConfigMaps(namespace).Delete(
- context.TODO(),
- name,
- metav1.DeleteOptions{},
- )
- }
- // DeleteLinkedSecret deletes the secret given its name and namespace
- func (a *Agent) DeleteLinkedSecret(name, namespace string) error {
- return a.Clientset.CoreV1().Secrets(namespace).Delete(
- context.TODO(),
- name,
- metav1.DeleteOptions{},
- )
- }
- // GetConfigMap retrieves the configmap given its name and namespace
- func (a *Agent) GetConfigMap(name string, namespace string) (*v1.ConfigMap, error) {
- return a.Clientset.CoreV1().ConfigMaps(namespace).Get(
- context.TODO(),
- name,
- metav1.GetOptions{},
- )
- }
- // GetSecret retrieves the secret given its name and namespace
- func (a *Agent) GetSecret(name string, namespace string) (*v1.Secret, error) {
- return a.Clientset.CoreV1().Secrets(namespace).Get(
- context.TODO(),
- name,
- metav1.GetOptions{},
- )
- }
- // ListConfigMaps simply lists namespaces
- func (a *Agent) ListConfigMaps(namespace string) (*v1.ConfigMapList, error) {
- return a.Clientset.CoreV1().ConfigMaps(namespace).List(
- context.TODO(),
- metav1.ListOptions{
- LabelSelector: "porter=true",
- },
- )
- }
- // ListEvents lists the events of a given object.
- func (a *Agent) ListEvents(name string, namespace string) (*v1.EventList, error) {
- return a.Clientset.CoreV1().Events(namespace).List(
- context.TODO(),
- metav1.ListOptions{
- FieldSelector: fmt.Sprintf("involvedObject.name=%s,involvedObject.namespace=%s", name, namespace),
- },
- )
- }
- // ListNamespaces simply lists namespaces
- func (a *Agent) ListNamespaces() (*v1.NamespaceList, error) {
- return a.Clientset.CoreV1().Namespaces().List(
- context.TODO(),
- metav1.ListOptions{},
- )
- }
- // CreateNamespace creates a namespace with the given name.
- func (a *Agent) CreateNamespace(name string) (*v1.Namespace, error) {
- // check if namespace exists
- checkNS, err := a.Clientset.CoreV1().Namespaces().Get(
- context.TODO(),
- name,
- metav1.GetOptions{},
- )
- if err == nil && checkNS != nil {
- return checkNS, nil
- }
- namespace := v1.Namespace{
- ObjectMeta: metav1.ObjectMeta{
- Name: name,
- },
- }
- return a.Clientset.CoreV1().Namespaces().Create(
- context.TODO(),
- &namespace,
- metav1.CreateOptions{},
- )
- }
- // DeleteNamespace deletes the namespace given the name.
- func (a *Agent) DeleteNamespace(name string) error {
- return a.Clientset.CoreV1().Namespaces().Delete(
- context.TODO(),
- name,
- metav1.DeleteOptions{},
- )
- }
- func (a *Agent) GetPorterAgent() (*appsv1.Deployment, error) {
- depl, err := a.Clientset.AppsV1().Deployments("porter-agent-system").Get(
- context.TODO(),
- "porter-agent-controller-manager",
- metav1.GetOptions{},
- )
- if err != nil && errors.IsNotFound(err) {
- return nil, IsNotFoundError
- }
- return depl, err
- }
- // ListJobsByLabel lists jobs in a namespace matching a label
- type Label struct {
- Key string
- Val string
- }
- func (a *Agent) ListJobsByLabel(namespace string, labels ...Label) ([]batchv1.Job, error) {
- selectors := make([]string, 0)
- for _, label := range labels {
- selectors = append(selectors, fmt.Sprintf("%s=%s", label.Key, label.Val))
- }
- resp, err := a.Clientset.BatchV1().Jobs(namespace).List(
- context.TODO(),
- metav1.ListOptions{
- LabelSelector: strings.Join(selectors, ","),
- },
- )
- if err != nil {
- return nil, err
- }
- return resp.Items, nil
- }
- // DeleteJob deletes the job in the given name and namespace.
- func (a *Agent) DeleteJob(name, namespace string) error {
- return a.Clientset.BatchV1().Jobs(namespace).Delete(
- context.TODO(),
- name,
- metav1.DeleteOptions{},
- )
- }
- // GetJobPods lists all pods belonging to a job in a namespace
- func (a *Agent) GetJobPods(namespace, jobName string) ([]v1.Pod, error) {
- resp, err := a.Clientset.CoreV1().Pods(namespace).List(
- context.TODO(),
- metav1.ListOptions{
- LabelSelector: fmt.Sprintf("%s=%s", "job-name", jobName),
- },
- )
- if err != nil {
- return nil, err
- }
- return resp.Items, nil
- }
- // GetIngress gets ingress given the name and namespace
- func (a *Agent) GetIngress(namespace string, name string) (*v1beta1.Ingress, error) {
- resp, err := a.Clientset.ExtensionsV1beta1().Ingresses(namespace).Get(
- context.TODO(),
- name,
- metav1.GetOptions{},
- )
- if err != nil && errors.IsNotFound(err) {
- return nil, IsNotFoundError
- } else if err != nil {
- return nil, err
- }
- return resp, nil
- }
- var IsNotFoundError = fmt.Errorf("not found")
- type BadRequestError struct {
- msg string
- }
- func (e *BadRequestError) Error() string {
- return e.msg
- }
- // GetDeployment gets the deployment given the name and namespace
- func (a *Agent) GetDeployment(c grapher.Object) (*appsv1.Deployment, error) {
- res, err := a.Clientset.AppsV1().Deployments(c.Namespace).Get(
- context.TODO(),
- c.Name,
- metav1.GetOptions{},
- )
- if err != nil && errors.IsNotFound(err) {
- return nil, IsNotFoundError
- } else if err != nil {
- return nil, err
- }
- res.Kind = c.Kind
- return res, nil
- }
- // GetStatefulSet gets the statefulset given the name and namespace
- func (a *Agent) GetStatefulSet(c grapher.Object) (*appsv1.StatefulSet, error) {
- res, err := a.Clientset.AppsV1().StatefulSets(c.Namespace).Get(
- context.TODO(),
- c.Name,
- metav1.GetOptions{},
- )
- if err != nil && errors.IsNotFound(err) {
- return nil, IsNotFoundError
- } else if err != nil {
- return nil, err
- }
- res.Kind = c.Kind
- return res, nil
- }
- // GetReplicaSet gets the replicaset given the name and namespace
- func (a *Agent) GetReplicaSet(c grapher.Object) (*appsv1.ReplicaSet, error) {
- res, err := a.Clientset.AppsV1().ReplicaSets(c.Namespace).Get(
- context.TODO(),
- c.Name,
- metav1.GetOptions{},
- )
- if err != nil && errors.IsNotFound(err) {
- return nil, IsNotFoundError
- } else if err != nil {
- return nil, err
- }
- res.Kind = c.Kind
- return res, nil
- }
- // GetDaemonSet gets the daemonset by name and namespace
- func (a *Agent) GetDaemonSet(c grapher.Object) (*appsv1.DaemonSet, error) {
- res, err := a.Clientset.AppsV1().DaemonSets(c.Namespace).Get(
- context.TODO(),
- c.Name,
- metav1.GetOptions{},
- )
- if err != nil && errors.IsNotFound(err) {
- return nil, IsNotFoundError
- } else if err != nil {
- return nil, err
- }
- res.Kind = c.Kind
- return res, nil
- }
- // GetJob gets the job by name and namespace
- func (a *Agent) GetJob(c grapher.Object) (*batchv1.Job, error) {
- res, err := a.Clientset.BatchV1().Jobs(c.Namespace).Get(
- context.TODO(),
- c.Name,
- metav1.GetOptions{},
- )
- if err != nil && errors.IsNotFound(err) {
- return nil, IsNotFoundError
- } else if err != nil {
- return nil, err
- }
- res.Kind = c.Kind
- return res, nil
- }
- // GetCronJob gets the CronJob by name and namespace
- func (a *Agent) GetCronJob(c grapher.Object) (*batchv1beta1.CronJob, error) {
- res, err := a.Clientset.BatchV1beta1().CronJobs(c.Namespace).Get(
- context.TODO(),
- c.Name,
- metav1.GetOptions{},
- )
- if err != nil && errors.IsNotFound(err) {
- return nil, IsNotFoundError
- } else if err != nil {
- return nil, err
- }
- res.Kind = c.Kind
- return res, nil
- }
- // GetPodsByLabel retrieves pods with matching labels
- func (a *Agent) GetPodsByLabel(selector string, namespace string) (*v1.PodList, error) {
- // Search in all namespaces for matching pods
- return a.Clientset.CoreV1().Pods(namespace).List(
- context.TODO(),
- metav1.ListOptions{
- LabelSelector: selector,
- },
- )
- }
- // GetPodByName retrieves a single instance of pod with given name
- func (a *Agent) GetPodByName(name string, namespace string) (*v1.Pod, error) {
- // Get pod by name
- pod, err := a.Clientset.CoreV1().Pods(namespace).Get(
- context.TODO(),
- name,
- metav1.GetOptions{},
- )
- if err != nil && errors.IsNotFound(err) {
- return nil, IsNotFoundError
- }
- if err != nil {
- return nil, err
- }
- return pod, nil
- }
- // DeletePod deletes a pod by name and namespace
- func (a *Agent) DeletePod(namespace string, name string) error {
- err := a.Clientset.CoreV1().Pods(namespace).Delete(
- context.TODO(),
- name,
- metav1.DeleteOptions{},
- )
- if err != nil && errors.IsNotFound(err) {
- return IsNotFoundError
- }
- return err
- }
- // GetPodLogs streams real-time logs from a given pod.
- func (a *Agent) GetPodLogs(namespace string, name string, showPreviousLogs bool, selectedContainer string, rw *websocket.WebsocketSafeReadWriter) error {
- // get the pod to read in the list of contains
- pod, err := a.Clientset.CoreV1().Pods(namespace).Get(
- context.Background(),
- name,
- metav1.GetOptions{},
- )
- if err != nil && errors.IsNotFound(err) {
- return IsNotFoundError
- } else if err != nil {
- return fmt.Errorf("Cannot get logs from pod %s: %s", name, err.Error())
- }
- // see if container is ready and able to open a stream. If not, wait for container
- // to be ready.
- err, _ = a.waitForPod(pod)
- if err != nil && goerrors.Is(err, IsNotFoundError) {
- return IsNotFoundError
- } else if err != nil {
- return fmt.Errorf("Cannot get logs from pod %s: %s", name, err.Error())
- }
- container := pod.Spec.Containers[0].Name
- if len(selectedContainer) > 0 {
- container = selectedContainer
- }
- tails := int64(400)
- // follow logs
- podLogOpts := v1.PodLogOptions{
- Follow: true,
- TailLines: &tails,
- Container: container,
- Previous: showPreviousLogs,
- }
- req := a.Clientset.CoreV1().Pods(namespace).GetLogs(name, &podLogOpts)
- podLogs, err := req.Stream(context.TODO())
- // in the case of bad request errors, such as if the pod is stuck in "ContainerCreating",
- // we'd like to pass this through to the client.
- if err != nil && errors.IsBadRequest(err) {
- return &BadRequestError{err.Error()}
- } else if err != nil {
- return fmt.Errorf("Cannot open log stream for pod %s: %s", name, err.Error())
- }
- defer podLogs.Close()
- r := bufio.NewReader(podLogs)
- errorchan := make(chan error)
- go func() {
- // listens for websocket closing handshake
- for {
- if _, _, err := rw.ReadMessage(); err != nil {
- errorchan <- nil
- return
- }
- }
- }()
- go func() {
- for {
- select {
- case <-errorchan:
- defer close(errorchan)
- return
- default:
- }
- bytes, err := r.ReadBytes('\n')
- if _, writeErr := rw.Write(bytes); writeErr != nil {
- errorchan <- writeErr
- return
- }
- if err != nil {
- if err != io.EOF {
- errorchan <- err
- return
- }
- errorchan <- nil
- return
- }
- }
- }()
- for {
- select {
- case err = <-errorchan:
- return err
- }
- }
- }
- // StopJobWithJobSidecar sends a termination signal to a job running with a sidecar
- func (a *Agent) StopJobWithJobSidecar(namespace, name string) error {
- jobPods, err := a.GetJobPods(namespace, name)
- if err != nil {
- return err
- }
- podName := jobPods[0].ObjectMeta.Name
- restConf, err := a.RESTClientGetter.ToRESTConfig()
- restConf.GroupVersion = &schema.GroupVersion{
- Group: "api",
- Version: "v1",
- }
- restConf.NegotiatedSerializer = runtime.NewSimpleNegotiatedSerializer(runtime.SerializerInfo{})
- restClient, err := rest.RESTClientFor(restConf)
- if err != nil {
- return err
- }
- req := restClient.Post().
- Resource("pods").
- Name(podName).
- Namespace(namespace).
- SubResource("exec")
- req.Param("command", "./signal.sh")
- req.Param("container", "sidecar")
- req.Param("stdin", "true")
- req.Param("stdout", "false")
- req.Param("tty", "false")
- exec, err := remotecommand.NewSPDYExecutor(restConf, "POST", req.URL())
- if err != nil {
- return err
- }
- return exec.Stream(remotecommand.StreamOptions{
- Tty: false,
- Stdin: strings.NewReader("./signal.sh"),
- })
- }
- // RunWebsocketTask will run a websocket task. If the websocket returns an anauthorized error, it will restart
- // the task some number of times until failing
- func (a *Agent) RunWebsocketTask(task func() error) error {
- lastTime := int64(0)
- for {
- if err := a.UpdateClientset(); err != nil {
- return err
- }
- err := task()
- if err == nil {
- return nil
- }
- if !errors2.Is(err, &AuthError{}) {
- return err
- }
- if time.Now().Unix()-lastTime < 60 { // don't regenerate connection if too many unauthorized errors
- return err
- }
- lastTime = time.Now().Unix()
- }
- }
- // StreamControllerStatus streams controller status. Supports Deployment, StatefulSet, ReplicaSet, and DaemonSet
- // TODO: Support Jobs
- func (a *Agent) StreamControllerStatus(kind string, selectors string, rw *websocket.WebsocketSafeReadWriter) error {
- run := func() error {
- // selectors is an array of max length 1. StreamControllerStatus accepts calls without the selectors argument.
- // selectors argument is a single string with comma separated key=value pairs. (e.g. "app=porter,porter=true")
- tweakListOptionsFunc := func(options *metav1.ListOptions) {
- options.LabelSelector = selectors
- }
- factory := informers.NewSharedInformerFactoryWithOptions(
- a.Clientset,
- 0,
- informers.WithTweakListOptions(tweakListOptionsFunc),
- )
- var informer cache.SharedInformer
- // Spins up an informer depending on kind. Convert to lowercase for robustness
- switch strings.ToLower(kind) {
- case "deployment":
- informer = factory.Apps().V1().Deployments().Informer()
- case "statefulset":
- informer = factory.Apps().V1().StatefulSets().Informer()
- case "replicaset":
- informer = factory.Apps().V1().ReplicaSets().Informer()
- case "daemonset":
- informer = factory.Apps().V1().DaemonSets().Informer()
- case "job":
- informer = factory.Batch().V1().Jobs().Informer()
- case "cronjob":
- informer = factory.Batch().V1beta1().CronJobs().Informer()
- case "namespace":
- informer = factory.Core().V1().Namespaces().Informer()
- case "pod":
- informer = factory.Core().V1().Pods().Informer()
- }
- stopper := make(chan struct{})
- errorchan := make(chan error)
- defer close(stopper)
- informer.SetWatchErrorHandler(func(r *cache.Reflector, err error) {
- if strings.HasSuffix(err.Error(), ": Unauthorized") {
- errorchan <- &AuthError{}
- }
- })
- informer.AddEventHandler(cache.ResourceEventHandlerFuncs{
- UpdateFunc: func(oldObj, newObj interface{}) {
- msg := Message{
- EventType: "UPDATE",
- Object: newObj,
- Kind: strings.ToLower(kind),
- }
- rw.WriteJSONWithChannel(msg, errorchan)
- },
- AddFunc: func(obj interface{}) {
- msg := Message{
- EventType: "ADD",
- Object: obj,
- Kind: strings.ToLower(kind),
- }
- rw.WriteJSONWithChannel(msg, errorchan)
- },
- DeleteFunc: func(obj interface{}) {
- msg := Message{
- EventType: "DELETE",
- Object: obj,
- Kind: strings.ToLower(kind),
- }
- rw.WriteJSONWithChannel(msg, errorchan)
- },
- })
- go func() {
- // listens for websocket closing handshake
- for {
- if _, _, err := rw.ReadMessage(); err != nil {
- errorchan <- nil
- return
- }
- }
- }()
- go informer.Run(stopper)
- for {
- select {
- case err := <-errorchan:
- return err
- }
- }
- }
- return a.RunWebsocketTask(run)
- }
- var b64 = base64.StdEncoding
- var magicGzip = []byte{0x1f, 0x8b, 0x08}
- func decodeRelease(data string) (*rspb.Release, error) {
- // base64 decode string
- b, err := b64.DecodeString(data)
- if err != nil {
- return nil, err
- }
- // For backwards compatibility with releases that were stored before
- // compression was introduced we skip decompression if the
- // gzip magic header is not found
- if bytes.Equal(b[0:3], magicGzip) {
- r, err := gzip.NewReader(bytes.NewReader(b))
- if err != nil {
- return nil, err
- }
- defer r.Close()
- b2, err := ioutil.ReadAll(r)
- if err != nil {
- return nil, err
- }
- b = b2
- }
- var rls rspb.Release
- // unmarshal release object bytes
- if err := json.Unmarshal(b, &rls); err != nil {
- return nil, err
- }
- return &rls, nil
- }
- func contains(s []string, str string) bool {
- for _, v := range s {
- if v == str {
- return true
- }
- }
- return false
- }
- func ParseSecretToHelmRelease(secret v1.Secret, chartList []string) (*rspb.Release, bool, error) {
- if secret.Type != "helm.sh/release.v1" {
- return nil, true, nil
- }
- releaseData, ok := secret.Data["release"]
- if !ok {
- return nil, true, fmt.Errorf("release field not found")
- }
- helm_object, err := decodeRelease(string(releaseData))
- if err != nil {
- return nil, true, err
- }
- if len(chartList) > 0 && !contains(chartList, helm_object.Name) {
- return nil, true, nil
- }
- return helm_object, false, nil
- }
- func (a *Agent) StreamHelmReleases(namespace string, chartList []string, selectors string, rw *websocket.WebsocketSafeReadWriter) error {
- run := func() error {
- tweakListOptionsFunc := func(options *metav1.ListOptions) {
- options.LabelSelector = selectors
- }
- factory := informers.NewSharedInformerFactoryWithOptions(
- a.Clientset,
- 0,
- informers.WithTweakListOptions(tweakListOptionsFunc),
- informers.WithNamespace(namespace),
- )
- informer := factory.Core().V1().Secrets().Informer()
- stopper := make(chan struct{})
- errorchan := make(chan error)
- defer close(stopper)
- informer.SetWatchErrorHandler(func(r *cache.Reflector, err error) {
- if strings.HasSuffix(err.Error(), ": Unauthorized") {
- errorchan <- &AuthError{}
- }
- })
- informer.AddEventHandler(cache.ResourceEventHandlerFuncs{
- UpdateFunc: func(oldObj, newObj interface{}) {
- secretObj, ok := newObj.(*v1.Secret)
- if !ok {
- errorchan <- fmt.Errorf("could not cast to secret")
- return
- }
- helm_object, isNotHelmRelease, err := ParseSecretToHelmRelease(*secretObj, chartList)
- if isNotHelmRelease && err == nil {
- return
- }
- if err != nil {
- errorchan <- err
- return
- }
- msg := Message{
- EventType: "UPDATE",
- Object: helm_object,
- }
- rw.WriteJSONWithChannel(msg, errorchan)
- },
- AddFunc: func(obj interface{}) {
- secretObj, ok := obj.(*v1.Secret)
- if !ok {
- errorchan <- fmt.Errorf("could not cast to secret")
- return
- }
- helm_object, isNotHelmRelease, err := ParseSecretToHelmRelease(*secretObj, chartList)
- if isNotHelmRelease && err == nil {
- return
- }
- if err != nil {
- errorchan <- err
- return
- }
- msg := Message{
- EventType: "ADD",
- Object: helm_object,
- }
- rw.WriteJSONWithChannel(msg, errorchan)
- },
- DeleteFunc: func(obj interface{}) {
- secretObj, ok := obj.(*v1.Secret)
- if !ok {
- errorchan <- fmt.Errorf("could not cast to secret")
- return
- }
- helm_object, isNotHelmRelease, err := ParseSecretToHelmRelease(*secretObj, chartList)
- if isNotHelmRelease && err == nil {
- return
- }
- if err != nil {
- errorchan <- err
- return
- }
- msg := Message{
- EventType: "DELETE",
- Object: helm_object,
- }
- rw.WriteJSONWithChannel(msg, errorchan)
- },
- })
- go func() {
- // listens for websocket closing handshake
- for {
- if _, _, err := rw.ReadMessage(); err != nil {
- errorchan <- nil
- return
- }
- }
- }()
- go informer.Run(stopper)
- for {
- select {
- case err := <-errorchan:
- return err
- }
- }
- }
- return a.RunWebsocketTask(run)
- }
- func (a *Agent) Provision(
- opts *provisioner.ProvisionOpts,
- ) error {
- // get the provisioner job template
- job, err := provisioner.GetProvisionerJobTemplate(opts)
- if err != nil {
- return err
- }
- // apply the provisioner job template
- _, err = a.Clientset.BatchV1().Jobs(opts.ProvJobNamespace).Create(
- context.TODO(),
- job,
- metav1.CreateOptions{},
- )
- return err
- }
- // CreateImagePullSecrets will create the required image pull secrets and
- // return a map from the registry name to the name of the secret.
- func (a *Agent) CreateImagePullSecrets(
- repo repository.Repository,
- namespace string,
- linkedRegs map[string]*models.Registry,
- doAuth *oauth2.Config,
- ) (map[string]string, error) {
- res := make(map[string]string)
- for key, val := range linkedRegs {
- _reg := registry.Registry(*val)
- data, err := _reg.GetDockerConfigJSON(repo, doAuth)
- if err != nil {
- return nil, err
- }
- secretName := fmt.Sprintf("porter-%s-%d", val.ToRegistryType().Service, val.ID)
- secret, err := a.Clientset.CoreV1().Secrets(namespace).Get(
- context.TODO(),
- secretName,
- metav1.GetOptions{},
- )
- // if not found, create the secret
- if err != nil && errors.IsNotFound(err) {
- _, err = a.Clientset.CoreV1().Secrets(namespace).Create(
- context.TODO(),
- &v1.Secret{
- ObjectMeta: metav1.ObjectMeta{
- Name: secretName,
- },
- Data: map[string][]byte{
- string(v1.DockerConfigJsonKey): data,
- },
- Type: v1.SecretTypeDockerConfigJson,
- },
- metav1.CreateOptions{},
- )
- if err != nil {
- return nil, err
- }
- // add secret name to the map
- res[key] = secretName
- continue
- } else if err != nil {
- return nil, err
- }
- // otherwise, check that the secret contains the correct data: if
- // if doesn't, update it
- if !bytes.Equal(secret.Data[v1.DockerConfigJsonKey], data) {
- _, err := a.Clientset.CoreV1().Secrets(namespace).Update(
- context.TODO(),
- &v1.Secret{
- ObjectMeta: metav1.ObjectMeta{
- Name: secretName,
- },
- Data: map[string][]byte{
- string(v1.DockerConfigJsonKey): data,
- },
- Type: v1.SecretTypeDockerConfigJson,
- },
- metav1.UpdateOptions{},
- )
- if err != nil {
- return nil, err
- }
- }
- // add secret name to the map
- res[key] = secretName
- }
- return res, nil
- }
- // helper that waits for pod to be ready
- func (a *Agent) waitForPod(pod *v1.Pod) (error, bool) {
- var (
- w watch.Interface
- err error
- ok bool
- )
- // immediately after creating a pod, the API may return a 404. heuristically 1
- // second seems to be plenty.
- watchRetries := 3
- for i := 0; i < watchRetries; i++ {
- selector := fields.OneTermEqualSelector("metadata.name", pod.Name).String()
- w, err = a.Clientset.CoreV1().
- Pods(pod.Namespace).
- Watch(context.Background(), metav1.ListOptions{FieldSelector: selector})
- if err == nil {
- break
- }
- time.Sleep(time.Second)
- }
- if err != nil {
- return err, false
- }
- defer w.Stop()
- for {
- select {
- case <-time.After(time.Second * 30):
- return goerrors.New("timed out waiting for pod"), false
- case <-time.Tick(time.Second):
- // poll every second in case we already missed the ready event while
- // creating the listener.
- pod, err = a.Clientset.CoreV1().
- Pods(pod.Namespace).
- Get(context.Background(), pod.Name, metav1.GetOptions{})
- if err != nil && errors.IsNotFound(err) {
- return IsNotFoundError, false
- } else if err != nil {
- return err, false
- }
- if isExited := isPodExited(pod); isExited || isPodReady(pod) {
- return nil, isExited
- }
- case evt := <-w.ResultChan():
- pod, ok = evt.Object.(*v1.Pod)
- if !ok {
- return fmt.Errorf("unexpected object type: %T", evt.Object), false
- }
- if isExited := isPodExited(pod); isExited || isPodReady(pod) {
- return nil, isExited
- }
- }
- }
- }
- func isPodReady(pod *v1.Pod) bool {
- ready := false
- conditions := pod.Status.Conditions
- for i := range conditions {
- if conditions[i].Type == v1.PodReady {
- ready = pod.Status.Conditions[i].Status == v1.ConditionTrue
- }
- }
- return ready
- }
- func isPodExited(pod *v1.Pod) bool {
- return pod.Status.Phase == v1.PodSucceeded || pod.Status.Phase == v1.PodFailed
- }
|