agent.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476
  1. package helm
  2. import (
  3. "bytes"
  4. "context"
  5. "fmt"
  6. "strconv"
  7. "strings"
  8. "time"
  9. "github.com/pkg/errors"
  10. "github.com/porter-dev/porter/internal/helm/loader"
  11. "golang.org/x/oauth2"
  12. "helm.sh/helm/v3/pkg/action"
  13. "helm.sh/helm/v3/pkg/chart"
  14. "helm.sh/helm/v3/pkg/release"
  15. "helm.sh/helm/v3/pkg/storage/driver"
  16. corev1 "k8s.io/api/core/v1"
  17. v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  18. "k8s.io/helm/pkg/chartutil"
  19. "github.com/porter-dev/porter/api/types"
  20. "github.com/porter-dev/porter/internal/kubernetes"
  21. "github.com/porter-dev/porter/internal/models"
  22. "github.com/porter-dev/porter/internal/repository"
  23. )
  24. // Agent is a Helm agent for performing helm operations
  25. type Agent struct {
  26. ActionConfig *action.Configuration
  27. K8sAgent *kubernetes.Agent
  28. }
  29. // ListReleases lists releases based on a ListFilter
  30. func (a *Agent) ListReleases(
  31. namespace string,
  32. filter *types.ReleaseListFilter,
  33. ) ([]*release.Release, error) {
  34. lsel := fmt.Sprintf("owner=helm,status in (%s)", strings.Join(filter.StatusFilter, ","))
  35. // list secrets
  36. secretList, err := a.K8sAgent.Clientset.CoreV1().Secrets(namespace).List(
  37. context.Background(),
  38. v1.ListOptions{
  39. LabelSelector: lsel,
  40. },
  41. )
  42. if err != nil {
  43. return nil, err
  44. }
  45. // before decoding to helm release, only keep the latest releases for each chart
  46. latestMap := make(map[string]corev1.Secret)
  47. for _, secret := range secretList.Items {
  48. relName, relNameExists := secret.Labels["name"]
  49. if !relNameExists {
  50. continue
  51. }
  52. id := fmt.Sprintf("%s/%s", secret.Namespace, relName)
  53. if currLatest, exists := latestMap[id]; exists {
  54. // get version
  55. currVersionStr, currVersionExists := currLatest.Labels["version"]
  56. versionStr, versionExists := secret.Labels["version"]
  57. if versionExists && currVersionExists {
  58. currVersion, currErr := strconv.Atoi(currVersionStr)
  59. version, err := strconv.Atoi(versionStr)
  60. if currErr == nil && err == nil && currVersion < version {
  61. latestMap[id] = secret
  62. }
  63. }
  64. } else {
  65. latestMap[id] = secret
  66. }
  67. }
  68. chartList := []string{}
  69. res := make([]*release.Release, 0)
  70. for _, secret := range latestMap {
  71. rel, isErr, err := kubernetes.ParseSecretToHelmRelease(secret, chartList)
  72. if !isErr && err == nil {
  73. res = append(res, rel)
  74. }
  75. }
  76. return res, nil
  77. }
  78. // GetRelease returns the info of a release.
  79. func (a *Agent) GetRelease(
  80. name string,
  81. version int,
  82. getDeps bool,
  83. ) (*release.Release, error) {
  84. // Namespace is already known by the RESTClientGetter.
  85. cmd := action.NewGet(a.ActionConfig)
  86. cmd.Version = version
  87. release, err := cmd.Run(name)
  88. if err != nil {
  89. return nil, err
  90. }
  91. if getDeps && release.Chart != nil && release.Chart.Metadata != nil {
  92. for _, dep := range release.Chart.Metadata.Dependencies {
  93. // only search for dependency if it passes the condition specified in Chart.yaml
  94. if dep.Enabled {
  95. depExists := false
  96. for _, currDep := range release.Chart.Dependencies() {
  97. // we just case on name for now -- there might be edge cases we're missing
  98. // but this will cover 99% of cases
  99. if dep != nil && currDep != nil && dep.Name == currDep.Name() {
  100. depExists = true
  101. break
  102. }
  103. }
  104. if !depExists {
  105. depChart, err := loader.LoadChartPublic(dep.Repository, dep.Name, dep.Version)
  106. if err != nil {
  107. return nil, fmt.Errorf("Error retrieving chart dependency %s/%s-%s: %s", dep.Repository, dep.Name, dep.Version, err.Error())
  108. }
  109. release.Chart.AddDependency(depChart)
  110. }
  111. }
  112. }
  113. }
  114. return release, err
  115. }
  116. // DeleteReleaseRevision deletes a specific revision of a release
  117. func (a *Agent) DeleteReleaseRevision(
  118. name string,
  119. version int,
  120. ) error {
  121. _, err := a.ActionConfig.Releases.Delete(name, version)
  122. return err
  123. }
  124. // GetReleaseHistory returns a list of charts for a specific release
  125. func (a *Agent) GetReleaseHistory(
  126. name string,
  127. ) ([]*release.Release, error) {
  128. cmd := action.NewHistory(a.ActionConfig)
  129. return cmd.Run(name)
  130. }
  131. type UpgradeReleaseConfig struct {
  132. Name string
  133. Values map[string]interface{}
  134. Cluster *models.Cluster
  135. Repo repository.Repository
  136. Registries []*models.Registry
  137. // Optional, if chart should be overriden
  138. Chart *chart.Chart
  139. // Optional, if chart is part of a Porter Stack
  140. StackName string
  141. StackRevision uint
  142. }
  143. // UpgradeRelease upgrades a specific release with new values.yaml
  144. func (a *Agent) UpgradeRelease(
  145. conf *UpgradeReleaseConfig,
  146. values string,
  147. doAuth *oauth2.Config,
  148. disablePullSecretsInjection bool,
  149. ) (*release.Release, error) {
  150. valuesYaml, err := chartutil.ReadValues([]byte(values))
  151. if err != nil {
  152. return nil, fmt.Errorf("Values could not be parsed: %v", err)
  153. }
  154. conf.Values = valuesYaml
  155. return a.UpgradeReleaseByValues(conf, doAuth, disablePullSecretsInjection)
  156. }
  157. // UpgradeReleaseByValues upgrades a release by unmarshaled yaml values
  158. func (a *Agent) UpgradeReleaseByValues(
  159. conf *UpgradeReleaseConfig,
  160. doAuth *oauth2.Config,
  161. disablePullSecretsInjection bool,
  162. ) (*release.Release, error) {
  163. // grab the latest release
  164. rel, err := a.GetRelease(conf.Name, 0, true)
  165. if err != nil {
  166. return nil, fmt.Errorf("Could not get release to be upgraded: %v", err)
  167. }
  168. ch := rel.Chart
  169. if conf.Chart != nil {
  170. ch = conf.Chart
  171. }
  172. cmd := action.NewUpgrade(a.ActionConfig)
  173. cmd.Namespace = rel.Namespace
  174. cmd.PostRenderer, err = NewPorterPostrenderer(
  175. conf.Cluster,
  176. conf.Repo,
  177. a.K8sAgent,
  178. rel.Namespace,
  179. conf.Registries,
  180. doAuth,
  181. disablePullSecretsInjection,
  182. )
  183. if err != nil {
  184. return nil, err
  185. }
  186. if conf.StackName != "" && conf.StackRevision > 0 {
  187. conf.Values["stack"] = map[string]interface{}{
  188. "enabled": true,
  189. "name": conf.StackName,
  190. "revision": conf.StackRevision,
  191. }
  192. }
  193. res, err := cmd.Run(conf.Name, ch, conf.Values)
  194. if err != nil {
  195. // refer: https://github.com/helm/helm/blob/release-3.8/pkg/action/action.go#L62
  196. // issue tracker: https://github.com/helm/helm/issues/4558
  197. if err.Error() == "another operation (install/upgrade/rollback) is in progress" {
  198. secretList, err := a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace).List(
  199. context.Background(),
  200. v1.ListOptions{
  201. LabelSelector: fmt.Sprintf("owner=helm,status in (pending-install, pending-upgrade, pending-rollback),name=%s", rel.Name),
  202. },
  203. )
  204. if err != nil {
  205. return nil, fmt.Errorf("Upgrade failed: %w", err)
  206. }
  207. if len(secretList.Items) > 0 {
  208. mostRecentSecret := secretList.Items[0]
  209. for i := 1; i < len(secretList.Items); i += 1 {
  210. oldVersion, _ := strconv.Atoi(mostRecentSecret.Labels["version"])
  211. newVersion, _ := strconv.Atoi(secretList.Items[i].Labels["version"])
  212. if oldVersion < newVersion {
  213. mostRecentSecret = secretList.Items[i]
  214. }
  215. }
  216. if time.Since(mostRecentSecret.CreationTimestamp.Time) >= time.Minute {
  217. helmSecrets := driver.NewSecrets(a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace))
  218. rel.Info.Status = release.StatusFailed
  219. err = helmSecrets.Update(mostRecentSecret.GetName(), rel)
  220. if err != nil {
  221. return nil, fmt.Errorf("Upgrade failed: %w", err)
  222. }
  223. // retry upgrade
  224. res, err = cmd.Run(conf.Name, ch, conf.Values)
  225. if err != nil {
  226. return nil, fmt.Errorf("Upgrade failed: %w", err)
  227. }
  228. return res, nil
  229. } else {
  230. // ask the user to wait for about a minute before retrying for the above fix to kick in
  231. return nil, fmt.Errorf("another operation (install/upgrade/rollback) is in progress. If this error persists, please wait for 60 seconds to force an upgrade")
  232. }
  233. }
  234. } else if strings.Contains(err.Error(), "current release manifest contains removed kubernetes api(s)") || strings.Contains(err.Error(), "resource mapping not found for name") {
  235. // ref: https://helm.sh/docs/topics/kubernetes_apis/#updating-api-versions-of-a-release-manifest
  236. // in this case, we manually update the secret containing the new manifests
  237. secretList, err := a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace).List(
  238. context.Background(),
  239. v1.ListOptions{
  240. LabelSelector: fmt.Sprintf("owner=helm,name=%s", rel.Name),
  241. },
  242. )
  243. if err != nil {
  244. return nil, fmt.Errorf("Upgrade failed: %w", err)
  245. }
  246. if len(secretList.Items) > 0 {
  247. mostRecentSecret := secretList.Items[0]
  248. for i := 1; i < len(secretList.Items); i += 1 {
  249. oldVersion, _ := strconv.Atoi(mostRecentSecret.Labels["version"])
  250. newVersion, _ := strconv.Atoi(secretList.Items[i].Labels["version"])
  251. if oldVersion < newVersion {
  252. mostRecentSecret = secretList.Items[i]
  253. }
  254. }
  255. // run the equivalent of `helm template` to get the manifest string for the new release
  256. installCmd := action.NewInstall(a.ActionConfig)
  257. installCmd.ReleaseName = conf.Name
  258. installCmd.Namespace = rel.Namespace
  259. installCmd.DryRun = true
  260. installCmd.Replace = true
  261. installCmd.ClientOnly = false
  262. installCmd.IncludeCRDs = true
  263. newRelDryRun, err := installCmd.Run(ch, conf.Values)
  264. if err != nil {
  265. return nil, err
  266. }
  267. oldManifestBuffer := bytes.NewBufferString(rel.Manifest)
  268. newManifestBuffer := bytes.NewBufferString(newRelDryRun.Manifest)
  269. versionMapper := &DeprecatedAPIVersionMapper{}
  270. updatedManifestBuffer, err := versionMapper.Run(oldManifestBuffer, newManifestBuffer)
  271. if err != nil {
  272. return nil, err
  273. }
  274. rel.Manifest = updatedManifestBuffer.String()
  275. helmSecrets := driver.NewSecrets(a.K8sAgent.Clientset.CoreV1().Secrets(rel.Namespace))
  276. err = helmSecrets.Update(mostRecentSecret.GetName(), rel)
  277. if err != nil {
  278. return nil, fmt.Errorf("Upgrade failed: %w", err)
  279. }
  280. res, err := cmd.Run(conf.Name, ch, conf.Values)
  281. if err != nil {
  282. return nil, fmt.Errorf("Upgrade failed: %w", err)
  283. }
  284. return res, nil
  285. }
  286. }
  287. return nil, fmt.Errorf("Upgrade failed: %w", err)
  288. }
  289. return res, nil
  290. }
  291. // InstallChartConfig is the config required to install a chart
  292. type InstallChartConfig struct {
  293. Chart *chart.Chart
  294. Name string
  295. Namespace string
  296. Values map[string]interface{}
  297. Cluster *models.Cluster
  298. Repo repository.Repository
  299. Registries []*models.Registry
  300. }
  301. // InstallChartFromValuesBytes reads the raw values and calls Agent.InstallChart
  302. func (a *Agent) InstallChartFromValuesBytes(
  303. conf *InstallChartConfig,
  304. values []byte,
  305. doAuth *oauth2.Config,
  306. disablePullSecretsInjection bool,
  307. ) (*release.Release, error) {
  308. valuesYaml, err := chartutil.ReadValues(values)
  309. if err != nil {
  310. return nil, fmt.Errorf("Values could not be parsed: %v", err)
  311. }
  312. conf.Values = valuesYaml
  313. return a.InstallChart(conf, doAuth, disablePullSecretsInjection)
  314. }
  315. // InstallChart installs a new chart
  316. func (a *Agent) InstallChart(
  317. conf *InstallChartConfig,
  318. doAuth *oauth2.Config,
  319. disablePullSecretsInjection bool,
  320. ) (*release.Release, error) {
  321. cmd := action.NewInstall(a.ActionConfig)
  322. if cmd.Version == "" && cmd.Devel {
  323. cmd.Version = ">0.0.0-0"
  324. }
  325. cmd.ReleaseName = conf.Name
  326. cmd.Namespace = conf.Namespace
  327. cmd.Timeout = 300 * time.Second
  328. if err := checkIfInstallable(conf.Chart); err != nil {
  329. return nil, err
  330. }
  331. var err error
  332. cmd.PostRenderer, err = NewPorterPostrenderer(
  333. conf.Cluster,
  334. conf.Repo,
  335. a.K8sAgent,
  336. conf.Namespace,
  337. conf.Registries,
  338. doAuth,
  339. disablePullSecretsInjection,
  340. )
  341. if err != nil {
  342. return nil, err
  343. }
  344. if req := conf.Chart.Metadata.Dependencies; req != nil {
  345. if err := action.CheckDependencies(conf.Chart, req); err != nil {
  346. // TODO: Handle dependency updates.
  347. return nil, err
  348. }
  349. }
  350. return cmd.Run(conf.Chart, conf.Values)
  351. }
  352. // UninstallChart uninstalls a chart
  353. func (a *Agent) UninstallChart(
  354. name string,
  355. ) (*release.UninstallReleaseResponse, error) {
  356. cmd := action.NewUninstall(a.ActionConfig)
  357. return cmd.Run(name)
  358. }
  359. // RollbackRelease rolls a release back to a specified revision/version
  360. func (a *Agent) RollbackRelease(
  361. name string,
  362. version int,
  363. ) error {
  364. cmd := action.NewRollback(a.ActionConfig)
  365. cmd.Version = version
  366. return cmd.Run(name)
  367. }
  368. // ------------------------ Helm agent helper functions ------------------------ //
  369. // checkIfInstallable validates if a chart can be installed
  370. // Application chart type is only installable
  371. func checkIfInstallable(ch *chart.Chart) error {
  372. switch ch.Metadata.Type {
  373. case "", "application":
  374. return nil
  375. }
  376. return errors.Errorf("%s charts are not installable", ch.Metadata.Type)
  377. }