agent.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483
  1. package helm
  2. import (
  3. "bytes"
  4. "context"
  5. "fmt"
  6. "runtime/debug"
  7. "strconv"
  8. "strings"
  9. "time"
  10. "github.com/pkg/errors"
  11. "github.com/porter-dev/porter/internal/helm/loader"
  12. "github.com/stefanmcshane/helm/pkg/action"
  13. "github.com/stefanmcshane/helm/pkg/chart"
  14. "github.com/stefanmcshane/helm/pkg/release"
  15. "github.com/stefanmcshane/helm/pkg/storage/driver"
  16. "golang.org/x/oauth2"
  17. corev1 "k8s.io/api/core/v1"
  18. v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  19. "k8s.io/helm/pkg/chartutil"
  20. "github.com/porter-dev/porter/api/types"
  21. "github.com/porter-dev/porter/internal/kubernetes"
  22. "github.com/porter-dev/porter/internal/models"
  23. "github.com/porter-dev/porter/internal/repository"
  24. )
  25. // Agent is a Helm agent for performing helm operations
  26. type Agent struct {
  27. ActionConfig *action.Configuration
  28. K8sAgent *kubernetes.Agent
  29. }
  30. // ListReleases lists releases based on a ListFilter
  31. func (a *Agent) ListReleases(
  32. namespace string,
  33. filter *types.ReleaseListFilter,
  34. ) ([]*release.Release, error) {
  35. lsel := fmt.Sprintf("owner=helm,status in (%s)", strings.Join(filter.StatusFilter, ","))
  36. // list secrets
  37. secretList, err := a.K8sAgent.Clientset.CoreV1().Secrets(namespace).List(
  38. context.Background(),
  39. v1.ListOptions{
  40. LabelSelector: lsel,
  41. },
  42. )
  43. if err != nil {
  44. return nil, err
  45. }
  46. // before decoding to helm release, only keep the latest releases for each chart
  47. latestMap := make(map[string]corev1.Secret)
  48. for _, secret := range secretList.Items {
  49. relName, relNameExists := secret.Labels["name"]
  50. if !relNameExists {
  51. continue
  52. }
  53. id := fmt.Sprintf("%s/%s", secret.Namespace, relName)
  54. if currLatest, exists := latestMap[id]; exists {
  55. // get version
  56. currVersionStr, currVersionExists := currLatest.Labels["version"]
  57. versionStr, versionExists := secret.Labels["version"]
  58. if versionExists && currVersionExists {
  59. currVersion, currErr := strconv.Atoi(currVersionStr)
  60. version, err := strconv.Atoi(versionStr)
  61. if currErr == nil && err == nil && currVersion < version {
  62. latestMap[id] = secret
  63. }
  64. }
  65. } else {
  66. latestMap[id] = secret
  67. }
  68. }
  69. chartList := []string{}
  70. res := make([]*release.Release, 0)
  71. for _, secret := range latestMap {
  72. rel, isErr, err := kubernetes.ParseSecretToHelmRelease(secret, chartList)
  73. if !isErr && err == nil {
  74. res = append(res, rel)
  75. }
  76. }
  77. return res, nil
  78. }
  79. // GetRelease returns the info of a release.
  80. func (a *Agent) GetRelease(
  81. name string,
  82. version int,
  83. getDeps bool,
  84. ) (*release.Release, error) {
  85. // Namespace is already known by the RESTClientGetter.
  86. cmd := action.NewGet(a.ActionConfig)
  87. cmd.Version = version
  88. release, err := cmd.Run(name)
  89. if err != nil {
  90. return nil, err
  91. }
  92. if getDeps && release.Chart != nil && release.Chart.Metadata != nil {
  93. for _, dep := range release.Chart.Metadata.Dependencies {
  94. // only search for dependency if it passes the condition specified in Chart.yaml
  95. if dep.Enabled {
  96. depExists := false
  97. for _, currDep := range release.Chart.Dependencies() {
  98. // we just case on name for now -- there might be edge cases we're missing
  99. // but this will cover 99% of cases
  100. if dep != nil && currDep != nil && dep.Name == currDep.Name() {
  101. depExists = true
  102. break
  103. }
  104. }
  105. if !depExists {
  106. depChart, err := loader.LoadChartPublic(dep.Repository, dep.Name, dep.Version)
  107. if err != nil {
  108. return nil, fmt.Errorf("Error retrieving chart dependency %s/%s-%s: %s", dep.Repository, dep.Name, dep.Version, err.Error())
  109. }
  110. release.Chart.AddDependency(depChart)
  111. }
  112. }
  113. }
  114. }
  115. return release, err
  116. }
  117. // DeleteReleaseRevision deletes a specific revision of a release
  118. func (a *Agent) DeleteReleaseRevision(
  119. name string,
  120. version int,
  121. ) error {
  122. _, err := a.ActionConfig.Releases.Delete(name, version)
  123. return err
  124. }
  125. // GetReleaseHistory returns a list of charts for a specific release
  126. func (a *Agent) GetReleaseHistory(
  127. name string,
  128. ) ([]*release.Release, error) {
  129. cmd := action.NewHistory(a.ActionConfig)
  130. return cmd.Run(name)
  131. }
  132. type UpgradeReleaseConfig struct {
  133. Name string
  134. Values map[string]interface{}
  135. Cluster *models.Cluster
  136. Repo repository.Repository
  137. Registries []*models.Registry
  138. // Optional, if chart should be overriden
  139. Chart *chart.Chart
  140. // Optional, if chart is part of a Porter Stack
  141. StackName string
  142. StackRevision uint
  143. }
  144. // UpgradeRelease upgrades a specific release with new values.yaml
  145. func (a *Agent) UpgradeRelease(
  146. conf *UpgradeReleaseConfig,
  147. values string,
  148. doAuth *oauth2.Config,
  149. disablePullSecretsInjection bool,
  150. ) (*release.Release, error) {
  151. valuesYaml, err := chartutil.ReadValues([]byte(values))
  152. if err != nil {
  153. return nil, fmt.Errorf("Values could not be parsed: %v", err)
  154. }
  155. conf.Values = valuesYaml
  156. return a.UpgradeReleaseByValues(conf, doAuth, disablePullSecretsInjection)
  157. }
  158. // UpgradeReleaseByValues upgrades a release by unmarshaled yaml values
  159. func (a *Agent) UpgradeReleaseByValues(
  160. conf *UpgradeReleaseConfig,
  161. doAuth *oauth2.Config,
  162. disablePullSecretsInjection bool,
  163. ) (*release.Release, error) {
  164. // grab the latest release
  165. rel, err := a.GetRelease(conf.Name, 0, true)
  166. if err != nil {
  167. return nil, fmt.Errorf("Could not get release to be upgraded: %v", err)
  168. }
  169. ch := rel.Chart
  170. if conf.Chart != nil {
  171. ch = conf.Chart
  172. }
  173. cmd := action.NewUpgrade(a.ActionConfig)
  174. cmd.Namespace = rel.Namespace
  175. cmd.PostRenderer, err = NewPorterPostrenderer(
  176. conf.Cluster,
  177. conf.Repo,
  178. a.K8sAgent,
  179. rel.Namespace,
  180. conf.Registries,
  181. doAuth,
  182. disablePullSecretsInjection,
  183. )
  184. if err != nil {
  185. return nil, err
  186. }
  187. if conf.StackName != "" && conf.StackRevision > 0 {
  188. conf.Values["stack"] = map[string]interface{}{
  189. "enabled": true,
  190. "name": conf.StackName,
  191. "revision": conf.StackRevision,
  192. }
  193. }
  194. res, err := cmd.Run(conf.Name, ch, conf.Values)
  195. if err != nil {
  196. // refer: https://github.com/helm/helm/blob/release-3.8/pkg/action/action.go#L62
  197. // issue tracker: https://github.com/helm/helm/issues/4558
  198. if err.Error() == "another operation (install/upgrade/rollback) is in progress" {
  199. secretList, err := a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace).List(
  200. context.Background(),
  201. v1.ListOptions{
  202. LabelSelector: fmt.Sprintf("owner=helm,status in (pending-install, pending-upgrade, pending-rollback),name=%s", rel.Name),
  203. },
  204. )
  205. if err != nil {
  206. return nil, fmt.Errorf("Upgrade failed: %w", err)
  207. }
  208. if len(secretList.Items) > 0 {
  209. mostRecentSecret := secretList.Items[0]
  210. for i := 1; i < len(secretList.Items); i += 1 {
  211. oldVersion, _ := strconv.Atoi(mostRecentSecret.Labels["version"])
  212. newVersion, _ := strconv.Atoi(secretList.Items[i].Labels["version"])
  213. if oldVersion < newVersion {
  214. mostRecentSecret = secretList.Items[i]
  215. }
  216. }
  217. if time.Since(mostRecentSecret.CreationTimestamp.Time) >= time.Minute {
  218. helmSecrets := driver.NewSecrets(a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace))
  219. rel.Info.Status = release.StatusFailed
  220. err = helmSecrets.Update(mostRecentSecret.GetName(), rel)
  221. if err != nil {
  222. return nil, fmt.Errorf("Upgrade failed: %w", err)
  223. }
  224. // retry upgrade
  225. res, err = cmd.Run(conf.Name, ch, conf.Values)
  226. if err != nil {
  227. return nil, fmt.Errorf("Upgrade failed: %w", err)
  228. }
  229. return res, nil
  230. } else {
  231. // ask the user to wait for about a minute before retrying for the above fix to kick in
  232. return nil, fmt.Errorf("another operation (install/upgrade/rollback) is in progress. If this error persists, please wait for 60 seconds to force an upgrade")
  233. }
  234. }
  235. } else if strings.Contains(err.Error(), "current release manifest contains removed kubernetes api(s)") || strings.Contains(err.Error(), "resource mapping not found for name") {
  236. // ref: https://helm.sh/docs/topics/kubernetes_apis/#updating-api-versions-of-a-release-manifest
  237. // in this case, we manually update the secret containing the new manifests
  238. secretList, err := a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace).List(
  239. context.Background(),
  240. v1.ListOptions{
  241. LabelSelector: fmt.Sprintf("owner=helm,name=%s", rel.Name),
  242. },
  243. )
  244. if err != nil {
  245. return nil, fmt.Errorf("Upgrade failed: %w", err)
  246. }
  247. if len(secretList.Items) > 0 {
  248. mostRecentSecret := secretList.Items[0]
  249. for i := 1; i < len(secretList.Items); i += 1 {
  250. oldVersion, _ := strconv.Atoi(mostRecentSecret.Labels["version"])
  251. newVersion, _ := strconv.Atoi(secretList.Items[i].Labels["version"])
  252. if oldVersion < newVersion {
  253. mostRecentSecret = secretList.Items[i]
  254. }
  255. }
  256. // run the equivalent of `helm template` to get the manifest string for the new release
  257. installCmd := action.NewInstall(a.ActionConfig)
  258. installCmd.ReleaseName = conf.Name
  259. installCmd.Namespace = rel.Namespace
  260. installCmd.DryRun = true
  261. installCmd.Replace = true
  262. installCmd.ClientOnly = false
  263. installCmd.IncludeCRDs = true
  264. newRelDryRun, err := installCmd.Run(ch, conf.Values)
  265. if err != nil {
  266. return nil, err
  267. }
  268. oldManifestBuffer := bytes.NewBufferString(rel.Manifest)
  269. newManifestBuffer := bytes.NewBufferString(newRelDryRun.Manifest)
  270. versionMapper := &DeprecatedAPIVersionMapper{}
  271. updatedManifestBuffer, err := versionMapper.Run(oldManifestBuffer, newManifestBuffer)
  272. if err != nil {
  273. return nil, err
  274. }
  275. rel.Manifest = updatedManifestBuffer.String()
  276. helmSecrets := driver.NewSecrets(a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace))
  277. err = helmSecrets.Update(mostRecentSecret.GetName(), rel)
  278. if err != nil {
  279. return nil, fmt.Errorf("Upgrade failed: %w", err)
  280. }
  281. res, err := cmd.Run(conf.Name, ch, conf.Values)
  282. if err != nil {
  283. return nil, fmt.Errorf("Upgrade failed: %w", err)
  284. }
  285. return res, nil
  286. }
  287. }
  288. return nil, fmt.Errorf("Upgrade failed: %w", err)
  289. }
  290. return res, nil
  291. }
  292. // InstallChartConfig is the config required to install a chart
  293. type InstallChartConfig struct {
  294. Chart *chart.Chart
  295. Name string
  296. Namespace string
  297. Values map[string]interface{}
  298. Cluster *models.Cluster
  299. Repo repository.Repository
  300. Registries []*models.Registry
  301. }
  302. // InstallChartFromValuesBytes reads the raw values and calls Agent.InstallChart
  303. func (a *Agent) InstallChartFromValuesBytes(
  304. conf *InstallChartConfig,
  305. values []byte,
  306. doAuth *oauth2.Config,
  307. disablePullSecretsInjection bool,
  308. ) (*release.Release, error) {
  309. valuesYaml, err := chartutil.ReadValues(values)
  310. if err != nil {
  311. return nil, fmt.Errorf("Values could not be parsed: %v", err)
  312. }
  313. conf.Values = valuesYaml
  314. return a.InstallChart(conf, doAuth, disablePullSecretsInjection)
  315. }
  316. // InstallChart installs a new chart
  317. func (a *Agent) InstallChart(
  318. conf *InstallChartConfig,
  319. doAuth *oauth2.Config,
  320. disablePullSecretsInjection bool,
  321. ) (*release.Release, error) {
  322. defer func() {
  323. if r := recover(); r != nil {
  324. fmt.Println("stacktrace from panic: \n" + string(debug.Stack()))
  325. }
  326. }()
  327. cmd := action.NewInstall(a.ActionConfig)
  328. if cmd.Version == "" && cmd.Devel {
  329. cmd.Version = ">0.0.0-0"
  330. }
  331. cmd.ReleaseName = conf.Name
  332. cmd.Namespace = conf.Namespace
  333. cmd.Timeout = 300 * time.Second
  334. if err := checkIfInstallable(conf.Chart); err != nil {
  335. return nil, err
  336. }
  337. var err error
  338. cmd.PostRenderer, err = NewPorterPostrenderer(
  339. conf.Cluster,
  340. conf.Repo,
  341. a.K8sAgent,
  342. conf.Namespace,
  343. conf.Registries,
  344. doAuth,
  345. disablePullSecretsInjection,
  346. )
  347. if err != nil {
  348. return nil, err
  349. }
  350. if req := conf.Chart.Metadata.Dependencies; req != nil {
  351. if err := action.CheckDependencies(conf.Chart, req); err != nil {
  352. // TODO: Handle dependency updates.
  353. return nil, err
  354. }
  355. }
  356. return cmd.Run(conf.Chart, conf.Values)
  357. }
  358. // UninstallChart uninstalls a chart
  359. func (a *Agent) UninstallChart(
  360. name string,
  361. ) (*release.UninstallReleaseResponse, error) {
  362. cmd := action.NewUninstall(a.ActionConfig)
  363. return cmd.Run(name)
  364. }
  365. // RollbackRelease rolls a release back to a specified revision/version
  366. func (a *Agent) RollbackRelease(
  367. name string,
  368. version int,
  369. ) error {
  370. cmd := action.NewRollback(a.ActionConfig)
  371. cmd.Version = version
  372. return cmd.Run(name)
  373. }
  374. // ------------------------ Helm agent helper functions ------------------------ //
  375. // checkIfInstallable validates if a chart can be installed
  376. // Application chart type is only installable
  377. func checkIfInstallable(ch *chart.Chart) error {
  378. switch ch.Metadata.Type {
  379. case "", "application":
  380. return nil
  381. }
  382. return errors.Errorf("%s charts are not installable", ch.Metadata.Type)
  383. }