mirror of
https://github.com/kubevela/kubevela.git
synced 2026-02-14 10:00:06 +00:00
Some checks failed
Webhook Upgrade Validation / webhook-upgrade-check (push) Failing after 13m45s
- Remove trailing whitespace on dryrun outputs - Fixed the relevant plugin-test outputs - Refactor to avoid partial lines that codecov flags out Signed-off-by: Bryan Leong <leong.bryan@gmail.com>
341 lines
11 KiB
Go
341 lines
11 KiB
Go
/*
|
|
Copyright 2021 The KubeVela Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package dryrun
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
"github.com/pkg/errors"
|
|
corev1 "k8s.io/api/core/v1"
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
|
"k8s.io/client-go/rest"
|
|
k8scmdutil "k8s.io/kubectl/pkg/cmd/util"
|
|
"k8s.io/kubectl/pkg/validation"
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
"sigs.k8s.io/yaml"
|
|
|
|
"github.com/oam-dev/kubevela/apis/core.oam.dev/v1alpha1"
|
|
"github.com/oam-dev/kubevela/apis/core.oam.dev/v1beta1"
|
|
"github.com/oam-dev/kubevela/apis/types"
|
|
"github.com/oam-dev/kubevela/pkg/appfile"
|
|
"github.com/oam-dev/kubevela/pkg/cue/definition"
|
|
"github.com/oam-dev/kubevela/pkg/oam"
|
|
oamutil "github.com/oam-dev/kubevela/pkg/oam/util"
|
|
"github.com/oam-dev/kubevela/pkg/policy/envbinding"
|
|
"github.com/oam-dev/kubevela/pkg/utils"
|
|
"github.com/oam-dev/kubevela/pkg/utils/apply"
|
|
cmdutil "github.com/oam-dev/kubevela/pkg/utils/util"
|
|
"github.com/oam-dev/kubevela/pkg/workflow/step"
|
|
)
|
|
|
|
// DryRun executes dry-run on an application
|
|
type DryRun interface {
|
|
ExecuteDryRun(ctx context.Context, app *v1beta1.Application) ([]*types.ComponentManifest, []*unstructured.Unstructured, error)
|
|
}
|
|
|
|
// NewDryRunOption creates a dry-run option
|
|
func NewDryRunOption(c client.Client, cfg *rest.Config, as []*unstructured.Unstructured, serverSideDryRun bool) *Option {
|
|
parser := appfile.NewDryRunApplicationParser(c, as)
|
|
return &Option{c, parser, parser.GenerateAppFileFromApp, cfg, as, serverSideDryRun}
|
|
}
|
|
|
|
// GenerateAppFileFunc generate the app file model from an application
|
|
type GenerateAppFileFunc func(ctx context.Context, app *v1beta1.Application) (*appfile.Appfile, error)
|
|
|
|
// Option contains options to execute dry-run
|
|
type Option struct {
|
|
Client client.Client
|
|
Parser *appfile.Parser
|
|
GenerateAppFile GenerateAppFileFunc
|
|
cfg *rest.Config
|
|
// Auxiliaries are capability definitions used to parse application.
|
|
// DryRun will use capabilities in Auxiliaries as higher priority than
|
|
// getting one from cluster.
|
|
Auxiliaries []*unstructured.Unstructured
|
|
|
|
// serverSideDryRun If set to true, means will dry run via the apiserver.
|
|
serverSideDryRun bool
|
|
}
|
|
|
|
// validateObjectFromFile will read file into Unstructured object
|
|
func (d *Option) validateObjectFromFile(filename string) (*unstructured.Unstructured, error) {
|
|
fileContent, err := os.ReadFile(filepath.Clean(filename))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
fileType := filepath.Ext(filename)
|
|
switch fileType {
|
|
case ".yaml", ".yml":
|
|
fileContent, err = yaml.YAMLToJSON(fileContent)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
factory := k8scmdutil.NewFactory(cmdutil.NewRestConfigGetterByConfig(d.cfg, ""))
|
|
valids := validation.ConjunctiveSchema{validation.NewSchemaValidation(factory), validation.NoDoubleKeySchema{}}
|
|
if err = valids.ValidateBytes(fileContent); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
app := new(unstructured.Unstructured)
|
|
err = json.Unmarshal(fileContent, app)
|
|
return app, err
|
|
}
|
|
|
|
// ValidateApp will validate app with client schema check and server side dry-run
|
|
func (d *Option) ValidateApp(ctx context.Context, filename string) error {
|
|
app, err := d.validateObjectFromFile(filename)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
namespace := oamutil.GetDefinitionNamespaceWithCtx(ctx)
|
|
if namespace != "" {
|
|
// Verify if namespace exists in cluster
|
|
ns := &corev1.Namespace{}
|
|
if err := d.Client.Get(ctx, client.ObjectKey{Name: namespace}, ns); err != nil {
|
|
if client.IgnoreNotFound(err) != nil {
|
|
// Non-NotFound error (RBAC, connectivity, etc.) - return the error
|
|
return err
|
|
}
|
|
// Namespace doesn't exist, set default
|
|
app.SetNamespace(corev1.NamespaceDefault)
|
|
} else {
|
|
// Namespace exists, use it
|
|
app.SetNamespace(namespace)
|
|
}
|
|
} else {
|
|
// Namespace is empty, set default
|
|
app.SetNamespace(corev1.NamespaceDefault)
|
|
}
|
|
|
|
app2 := app.DeepCopy()
|
|
|
|
err = d.Client.Get(ctx, client.ObjectKey{Namespace: app.GetNamespace(), Name: app.GetName()}, app2)
|
|
if err == nil {
|
|
app.SetResourceVersion(app2.GetResourceVersion())
|
|
return d.Client.Update(ctx, app, client.DryRunAll)
|
|
}
|
|
return d.Client.Create(ctx, app, client.DryRunAll)
|
|
}
|
|
|
|
// ExecuteDryRun simulates applying an application into cluster and returns rendered
|
|
// resources but not persist them into cluster.
|
|
func (d *Option) ExecuteDryRun(ctx context.Context, application *v1beta1.Application) ([]*types.ComponentManifest, []*unstructured.Unstructured, error) {
|
|
app := application.DeepCopy()
|
|
if app.Namespace != "" {
|
|
ctx = oamutil.SetNamespaceInCtx(ctx, app.Namespace)
|
|
}
|
|
appFile, err := d.GenerateAppFile(ctx, app)
|
|
if err != nil {
|
|
return nil, nil, errors.WithMessage(err, "cannot generate appFile from application")
|
|
}
|
|
if appFile.Namespace == "" {
|
|
appFile.Namespace = corev1.NamespaceDefault
|
|
}
|
|
|
|
comps, err := appFile.GenerateComponentManifests()
|
|
if err != nil {
|
|
return nil, nil, errors.WithMessage(err, "cannot generate manifests from components and traits")
|
|
}
|
|
policyManifests, err := appFile.GeneratePolicyManifests(ctx)
|
|
if err != nil {
|
|
return nil, nil, errors.WithMessage(err, "cannot generate manifests from policies")
|
|
}
|
|
if d.serverSideDryRun {
|
|
applyUtil := apply.NewAPIApplicator(d.Client)
|
|
if err := applyUtil.Apply(ctx, app, apply.DryRunAll()); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
}
|
|
return comps, policyManifests, nil
|
|
}
|
|
|
|
// PrintDryRun will print the result of dry-run
|
|
func (d *Option) PrintDryRun(buff *bytes.Buffer, appName string, comps []*types.ComponentManifest, policies []*unstructured.Unstructured) error {
|
|
var components = make(map[string]*unstructured.Unstructured)
|
|
for _, comp := range comps {
|
|
components[comp.Name] = comp.ComponentOutput
|
|
}
|
|
for _, c := range comps {
|
|
_, err := fmt.Fprintf(buff, "---\n# Application(%s) -- Component(%s)\n---\n\n", appName, c.Name)
|
|
if err != nil {
|
|
return errors.Wrap(err, "fail to write buff")
|
|
}
|
|
result, err := yaml.Marshal(components[c.Name])
|
|
if err != nil {
|
|
return errors.New("marshal result for component " + c.Name + " object in yaml format")
|
|
}
|
|
buff.Write(result)
|
|
buff.WriteString("\n---\n")
|
|
for _, t := range c.ComponentOutputsAndTraits {
|
|
traitType := t.GetLabels()[oam.TraitTypeLabel]
|
|
switch {
|
|
case traitType == definition.AuxiliaryWorkload:
|
|
buff.WriteString("## From the auxiliary workload\n")
|
|
case traitType != "":
|
|
fmt.Fprintf(buff, "## From the trait %s\n", traitType)
|
|
}
|
|
result, err := yaml.Marshal(t)
|
|
if err != nil {
|
|
return errors.New("marshal result for Component " + c.Name + " trait " + t.GetName() + " object in yaml format")
|
|
}
|
|
buff.Write(result)
|
|
buff.WriteString("\n---\n")
|
|
}
|
|
buff.WriteString("\n")
|
|
}
|
|
for _, plc := range policies {
|
|
_, err := fmt.Fprintf(buff, "---\n# Application(%s) -- Policy(%s)\n---\n\n", appName, plc.GetName())
|
|
if err != nil {
|
|
return errors.Wrap(err, "fail to write buff")
|
|
}
|
|
result, err := yaml.Marshal(plc)
|
|
if err != nil {
|
|
return errors.New("marshal result for policy " + plc.GetName() + " object in yaml format")
|
|
}
|
|
buff.Write(result)
|
|
buff.WriteString("\n---\n")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// ExecuteDryRunWithPolicies is similar to ExecuteDryRun func, but considers deploy workflow step and topology+override policies
|
|
func (d *Option) ExecuteDryRunWithPolicies(ctx context.Context, application *v1beta1.Application, buff *bytes.Buffer) error {
|
|
|
|
app := application.DeepCopy()
|
|
appNs := ctx.Value(oamutil.AppDefinitionNamespace)
|
|
if appNs == nil {
|
|
if app.Namespace == "" {
|
|
app.Namespace = corev1.NamespaceDefault
|
|
}
|
|
} else {
|
|
app.Namespace = appNs.(string)
|
|
}
|
|
ctx = oamutil.SetNamespaceInCtx(ctx, app.Namespace)
|
|
parser := appfile.NewDryRunApplicationParser(d.Client, d.Auxiliaries)
|
|
af, err := parser.GenerateAppFileFromApp(ctx, app)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
deployWorkflowCount := 0
|
|
for _, wfs := range af.WorkflowSteps {
|
|
if wfs.Type == step.DeployWorkflowStep {
|
|
deployWorkflowCount++
|
|
deployWorkflowStepSpec := &step.DeployWorkflowStepSpec{}
|
|
if err := utils.StrictUnmarshal(wfs.Properties.Raw, deployWorkflowStepSpec); err != nil {
|
|
return err
|
|
}
|
|
|
|
topologyPolicies, overridePolicies, err := filterPolicies(af.Policies, deployWorkflowStepSpec.Policies)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if len(topologyPolicies) > 0 {
|
|
for _, tp := range topologyPolicies {
|
|
patchedApp, err := patchApp(app, overridePolicies)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
comps, pms, err := d.ExecuteDryRun(ctx, patchedApp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = d.PrintDryRun(buff, fmt.Sprintf("%s with topology %s", patchedApp.Name, tp.Name), comps, pms)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
} else {
|
|
patchedApp, err := patchApp(app, overridePolicies)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
comps, pms, err := d.ExecuteDryRun(ctx, patchedApp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = d.PrintDryRun(buff, fmt.Sprintf("%s only with override policies", patchedApp.Name), comps, pms)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if deployWorkflowCount == 0 {
|
|
comps, pms, err := d.ExecuteDryRun(ctx, app)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = d.PrintDryRun(buff, app.Name, comps, pms)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func filterPolicies(policies []v1beta1.AppPolicy, policyNames []string) ([]v1beta1.AppPolicy, []v1beta1.AppPolicy, error) {
|
|
policyMap := make(map[string]v1beta1.AppPolicy)
|
|
for _, policy := range policies {
|
|
policyMap[policy.Name] = policy
|
|
}
|
|
var topologyPolicies []v1beta1.AppPolicy
|
|
var overridePolicies []v1beta1.AppPolicy
|
|
for _, policyName := range policyNames {
|
|
if policy, found := policyMap[policyName]; found {
|
|
switch policy.Type {
|
|
case v1alpha1.TopologyPolicyType:
|
|
topologyPolicies = append(topologyPolicies, policy)
|
|
case v1alpha1.OverridePolicyType:
|
|
overridePolicies = append(overridePolicies, policy)
|
|
}
|
|
} else {
|
|
return nil, nil, errors.Errorf("policy %s not found", policyName)
|
|
}
|
|
}
|
|
return topologyPolicies, overridePolicies, nil
|
|
}
|
|
|
|
func patchApp(application *v1beta1.Application, overridePolicies []v1beta1.AppPolicy) (*v1beta1.Application, error) {
|
|
app := application.DeepCopy()
|
|
for _, policy := range overridePolicies {
|
|
|
|
if policy.Properties == nil {
|
|
return nil, fmt.Errorf("override policy %s must not have empty properties", policy.Name)
|
|
}
|
|
overrideSpec := &v1alpha1.OverridePolicySpec{}
|
|
if err := utils.StrictUnmarshal(policy.Properties.Raw, overrideSpec); err != nil {
|
|
return nil, errors.Wrapf(err, "failed to parse override policy %s", policy.Name)
|
|
}
|
|
overrideComps, err := envbinding.PatchComponents(app.Spec.Components, overrideSpec.Components, overrideSpec.Selector)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "failed to apply override policy %s", policy.Name)
|
|
}
|
|
app.Spec.Components = overrideComps
|
|
}
|
|
|
|
return app, nil
|
|
}
|