forked from rancher/rancher
-
Notifications
You must be signed in to change notification settings - Fork 0
/
common.go
223 lines (206 loc) · 6.81 KB
/
common.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
package common
import (
"bytes"
"context"
"fmt"
"io/ioutil"
"math/rand"
"net"
"net/url"
"os"
"os/exec"
"path/filepath"
"strconv"
"strings"
"syscall"
"time"
"github.com/pkg/errors"
"github.com/rancher/rancher/pkg/jailer"
"github.com/rancher/rancher/pkg/namespace"
v3 "github.com/rancher/types/apis/project.cattle.io/v3"
"github.com/sirupsen/logrus"
)
const (
base = 32768
end = 61000
tillerName = "tiller"
helmName = "helm"
forceUpgradeStr = "--force"
)
type HelmPath struct {
// /opt/jail/<app-name>
FullPath string
// /
InJailPath string
// /opt/jail/<app-name>/.kubeconfig
KubeConfigFull string
// /.kubeconfig
KubeConfigInJail string
// /opt/jail/<app-name>/<app-sub>
AppDirFull string
// /<app-sub>
AppDirInJail string
}
func ParseExternalID(externalID string) (string, string, error) {
templateVersionNamespace, catalog, _, template, version, err := SplitExternalID(externalID)
if err != nil {
return "", "", err
}
return strings.Join([]string{catalog, template, version}, "-"), templateVersionNamespace, nil
}
func SplitExternalID(externalID string) (string, string, string, string, string, error) {
var templateVersionNamespace, catalog string
values, err := url.Parse(externalID)
if err != nil {
return "", "", "", "", "", err
}
catalogWithNamespace := values.Query().Get("catalog")
catalogType := values.Query().Get("type")
template := values.Query().Get("template")
version := values.Query().Get("version")
split := strings.SplitN(catalogWithNamespace, "/", 2)
if len(split) == 2 {
templateVersionNamespace = split[0]
catalog = split[1]
}
//pre-upgrade setups will have global catalogs, where externalId field on templateversions won't have namespace.
// since these are global catalogs, we can default to global namespace
if templateVersionNamespace == "" {
templateVersionNamespace = namespace.GlobalNamespace
catalog = catalogWithNamespace
}
return templateVersionNamespace, catalog, catalogType, template, version, nil
}
// StartTiller start tiller server and return the listening address of the grpc address
func StartTiller(context context.Context, tempDirs *HelmPath, port, namespace string) error {
probePort := GenerateRandomPort()
cmd := exec.Command(tillerName, "--listen", ":"+port, "--probe", ":"+probePort)
cmd.Env = []string{fmt.Sprintf("%s=%s", "KUBECONFIG", tempDirs.KubeConfigInJail), fmt.Sprintf("%s=%s", "TILLER_NAMESPACE", namespace), fmt.Sprintf("%s=%s", "TILLER_HISTORY_MAX", "1")}
cmd.Stdout = os.Stdout
cmd.Stderr = os.Stderr
cmd, err := JailCommand(cmd, tempDirs.FullPath)
if err != nil {
return err
}
if err := cmd.Start(); err != nil {
logrus.Warnf("START TILLER ERROR %v", err)
return err
}
defer cmd.Wait()
select {
case <-context.Done():
logrus.Debug("Stopping Tiller")
return cmd.Process.Kill()
}
}
func GenerateRandomPort() string {
s1 := rand.NewSource(time.Now().UnixNano())
r1 := rand.New(s1)
for {
port := base + r1.Intn(end-base+1)
ln, err := net.Listen("tcp", ":"+strconv.Itoa(port))
if err != nil {
continue
}
ln.Close()
return strconv.Itoa(port)
}
}
func InstallCharts(tempDirs *HelmPath, port string, obj *v3.App) error {
logrus.Debugf("InstallCharts - helm path info %+v\n", tempDirs)
extraArgs := GetExtraArgs(obj)
setValues, err := GenerateAnswerSetValues(obj, tempDirs, extraArgs)
if err != nil {
return err
}
commands := make([]string, 0)
commands = append([]string{"upgrade", "--install", "--namespace", obj.Spec.TargetNamespace, obj.Name}, setValues...)
commands = append(commands, tempDirs.AppDirInJail)
if v3.AppConditionForceUpgrade.IsUnknown(obj) {
commands = append(commands, forceUpgradeStr)
// don't leave force recreate on the object
v3.AppConditionForceUpgrade.True(obj)
}
// switch userTriggeredAction back
v3.AppConditionUserTriggeredAction.Unknown(obj)
cmd := exec.Command(helmName, commands...)
cmd.Env = []string{fmt.Sprintf("%s=%s", "HELM_HOST", "127.0.0.1:"+port)}
stderrBuf := &bytes.Buffer{}
cmd.Stdout = os.Stdout
cmd.Stderr = stderrBuf
cmd, err = JailCommand(cmd, tempDirs.FullPath)
if err != nil {
return err
}
if err := cmd.Start(); err != nil {
logrus.Warn("FAILED TO START COMMAND")
return errors.Errorf("failed to install app %s. %s", obj.Name, stderrBuf.String())
}
if err := cmd.Wait(); err != nil {
// if the first install failed, the second install would have error message like `has no deployed releases`, then the
// original error is masked. We need to filter out the message and always return the last one if error matches this pattern
if strings.Contains(stderrBuf.String(), "has no deployed releases") {
if !v3.AppConditionForceUpgrade.IsUnknown(obj) {
v3.AppConditionForceUpgrade.Unknown(obj)
}
return errors.New(v3.AppConditionInstalled.GetMessage(obj))
}
return errors.Errorf("failed to install app %s. %s", obj.Name, stderrBuf.String())
}
return nil
}
func GenerateAnswerSetValues(app *v3.App, tempDir *HelmPath, extraArgs map[string]string) ([]string, error) {
setValues := []string{}
// a user-supplied values file will overridden default values.yaml
if app.Spec.ValuesYaml != "" {
custom := "custom-values.yaml"
valuesYaml := filepath.Join(tempDir.FullPath, custom)
if err := ioutil.WriteFile(valuesYaml, []byte(app.Spec.ValuesYaml), 0755); err != nil {
return setValues, err
}
setValues = append(setValues, "--values", filepath.Join(tempDir.InJailPath, custom))
}
// `--set` values will overridden the user-supplied values.yaml file
if app.Spec.Answers != nil || extraArgs != nil {
answers := app.Spec.Answers
var values = []string{}
for k, v := range answers {
if _, ok := extraArgs[k]; ok {
continue
}
values = append(values, fmt.Sprintf("%s=%s", k, v))
}
for k, v := range extraArgs {
values = append(values, fmt.Sprintf("%s=%s", k, v))
}
setValues = append(setValues, "--set", strings.Join(values, ","))
}
return setValues, nil
}
func DeleteCharts(tempDirs *HelmPath, port string, obj *v3.App) error {
cmd := exec.Command(helmName, "delete", "--purge", obj.Name)
cmd.Env = []string{fmt.Sprintf("%s=%s", "HELM_HOST", "127.0.0.1:"+port)}
cmd, err := JailCommand(cmd, tempDirs.FullPath)
if err != nil {
return err
}
combinedOutput, err := cmd.CombinedOutput()
if err != nil && combinedOutput != nil && strings.Contains(string(combinedOutput), fmt.Sprintf("Error: release: \"%s\" not found", obj.Name)) {
return nil
}
return errors.New(string(combinedOutput))
}
func JailCommand(cmd *exec.Cmd, jailPath string) (*exec.Cmd, error) {
if os.Getenv("CATTLE_DEV_MODE") != "" {
return cmd, nil
}
cred, err := jailer.GetUserCred()
if err != nil {
return nil, errors.WithMessage(err, "get user cred error")
}
cmd.SysProcAttr = &syscall.SysProcAttr{}
cmd.SysProcAttr.Credential = cred
cmd.SysProcAttr.Chroot = jailPath
cmd.Env = jailer.WhitelistEnvvars(cmd.Env)
return cmd, nil
}