2017-04-11 13:47:10 +08:00
|
|
|
/*
|
2018-08-25 03:03:55 +08:00
|
|
|
Copyright The Helm Authors.
|
2017-04-11 13:47:10 +08:00
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
|
limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
2024-12-27 05:33:51 +08:00
|
|
|
package kube // import "helm.sh/helm/v4/pkg/kube"
|
2017-04-11 13:47:10 +08:00
|
|
|
|
|
|
|
|
import (
|
2020-04-13 23:40:38 +08:00
|
|
|
"context"
|
2019-05-16 03:31:47 +08:00
|
|
|
"fmt"
|
2023-07-14 00:46:03 +08:00
|
|
|
"net/http"
|
2017-04-11 13:47:10 +08:00
|
|
|
"time"
|
|
|
|
|
|
2019-05-16 03:31:47 +08:00
|
|
|
"github.com/pkg/errors"
|
2018-01-06 04:30:26 +08:00
|
|
|
appsv1 "k8s.io/api/apps/v1"
|
2017-10-12 06:05:27 +08:00
|
|
|
appsv1beta1 "k8s.io/api/apps/v1beta1"
|
|
|
|
|
appsv1beta2 "k8s.io/api/apps/v1beta2"
|
2019-05-16 03:31:47 +08:00
|
|
|
batchv1 "k8s.io/api/batch/v1"
|
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
|
|
|
|
extensionsv1beta1 "k8s.io/api/extensions/v1beta1"
|
2021-05-16 01:40:19 +08:00
|
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
2017-04-11 13:47:10 +08:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
|
"k8s.io/apimachinery/pkg/labels"
|
2019-05-16 03:31:47 +08:00
|
|
|
"k8s.io/apimachinery/pkg/runtime"
|
2023-02-03 22:02:12 +08:00
|
|
|
"k8s.io/cli-runtime/pkg/resource"
|
2022-10-12 07:53:14 +08:00
|
|
|
|
2021-02-27 04:10:26 +08:00
|
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
2017-04-11 13:47:10 +08:00
|
|
|
)
|
|
|
|
|
|
2019-04-25 08:18:42 +08:00
|
|
|
type waiter struct {
|
2021-02-27 04:10:26 +08:00
|
|
|
c ReadyChecker
|
2019-04-25 08:18:42 +08:00
|
|
|
timeout time.Duration
|
|
|
|
|
log func(string, ...interface{})
|
|
|
|
|
}
|
|
|
|
|
|
2024-12-27 00:09:54 +08:00
|
|
|
func (w *waiter) Wait(resources ResourceList, timeout time.Duration) error {
|
|
|
|
|
w.timeout = timeout
|
|
|
|
|
return w.waitForResources(resources)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (w *waiter) WaitWithJobs(resources ResourceList, timeout time.Duration) error {
|
|
|
|
|
// Implementation
|
2024-12-30 02:39:09 +08:00
|
|
|
// TODO this function doesn't make sense unless you pass a readyChecker to it
|
2024-12-27 00:09:54 +08:00
|
|
|
// TODO pass context instead
|
2024-12-30 02:39:09 +08:00
|
|
|
// checker := NewReadyChecker(cs, w.c.Log, PausedAsReady(true), CheckJobs(true))
|
2024-12-27 00:09:54 +08:00
|
|
|
w.timeout = timeout
|
|
|
|
|
return w.waitForResources(resources)
|
|
|
|
|
}
|
|
|
|
|
|
2023-07-14 00:46:03 +08:00
|
|
|
// waitForResources polls to get the current status of all pods, PVCs, Services and
|
|
|
|
|
// Jobs(optional) until all are ready or a timeout is reached
|
|
|
|
|
func (w *waiter) waitForResources(created ResourceList) error {
|
|
|
|
|
w.log("beginning wait for %d resources with timeout of %v", len(created), w.timeout)
|
2017-04-12 13:53:34 +08:00
|
|
|
|
2021-02-27 04:10:26 +08:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), w.timeout)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
2023-02-03 22:02:12 +08:00
|
|
|
numberOfErrors := make([]int, len(created))
|
|
|
|
|
for i := range numberOfErrors {
|
|
|
|
|
numberOfErrors[i] = 0
|
|
|
|
|
}
|
|
|
|
|
|
2023-04-13 16:48:42 +08:00
|
|
|
return wait.PollUntilContextCancel(ctx, 2*time.Second, true, func(ctx context.Context) (bool, error) {
|
2023-07-14 00:46:03 +08:00
|
|
|
waitRetries := 30
|
2023-02-03 22:02:12 +08:00
|
|
|
for i, v := range created {
|
2021-02-27 04:10:26 +08:00
|
|
|
ready, err := w.c.IsReady(ctx, v)
|
2023-02-03 22:02:12 +08:00
|
|
|
|
|
|
|
|
if waitRetries > 0 && w.isRetryableError(err, v) {
|
|
|
|
|
numberOfErrors[i]++
|
|
|
|
|
if numberOfErrors[i] > waitRetries {
|
|
|
|
|
w.log("Max number of retries reached")
|
|
|
|
|
return false, err
|
|
|
|
|
}
|
|
|
|
|
w.log("Retrying as current number of retries %d less than max number of retries %d", numberOfErrors[i]-1, waitRetries)
|
|
|
|
|
return false, nil
|
|
|
|
|
}
|
|
|
|
|
numberOfErrors[i] = 0
|
|
|
|
|
if !ready {
|
2019-05-16 03:31:47 +08:00
|
|
|
return false, err
|
2017-04-11 13:47:10 +08:00
|
|
|
}
|
|
|
|
|
}
|
2019-05-16 03:31:47 +08:00
|
|
|
return true, nil
|
2023-04-13 16:48:42 +08:00
|
|
|
})
|
2017-04-11 13:47:10 +08:00
|
|
|
}
|
2019-05-16 03:31:47 +08:00
|
|
|
|
2023-02-03 22:02:12 +08:00
|
|
|
func (w *waiter) isRetryableError(err error, resource *resource.Info) bool {
|
|
|
|
|
if err == nil {
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
w.log("Error received when checking status of resource %s. Error: '%s', Resource details: '%s'", resource.Name, err, resource)
|
|
|
|
|
if ev, ok := err.(*apierrors.StatusError); ok {
|
|
|
|
|
statusCode := ev.Status().Code
|
2023-07-14 00:46:03 +08:00
|
|
|
retryable := w.isRetryableHTTPStatusCode(statusCode)
|
2023-02-03 22:02:12 +08:00
|
|
|
w.log("Status code received: %d. Retryable error? %t", statusCode, retryable)
|
|
|
|
|
return retryable
|
|
|
|
|
}
|
|
|
|
|
w.log("Retryable error? %t", true)
|
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
|
2023-07-14 00:46:03 +08:00
|
|
|
func (w *waiter) isRetryableHTTPStatusCode(httpStatusCode int32) bool {
|
|
|
|
|
return httpStatusCode == 0 || httpStatusCode == http.StatusTooManyRequests || (httpStatusCode >= 500 && httpStatusCode != http.StatusNotImplemented)
|
|
|
|
|
}
|
|
|
|
|
|
2021-05-16 01:40:19 +08:00
|
|
|
// waitForDeletedResources polls to check if all the resources are deleted or a timeout is reached
|
|
|
|
|
func (w *waiter) waitForDeletedResources(deleted ResourceList) error {
|
|
|
|
|
w.log("beginning wait for %d resources to be deleted with timeout of %v", len(deleted), w.timeout)
|
|
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), w.timeout)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
2024-03-12 05:13:34 +08:00
|
|
|
return wait.PollUntilContextCancel(ctx, 2*time.Second, true, func(_ context.Context) (bool, error) {
|
2021-05-16 01:40:19 +08:00
|
|
|
for _, v := range deleted {
|
|
|
|
|
err := v.Get()
|
|
|
|
|
if err == nil || !apierrors.IsNotFound(err) {
|
|
|
|
|
return false, err
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return true, nil
|
2023-04-13 16:48:42 +08:00
|
|
|
})
|
2021-05-16 01:40:19 +08:00
|
|
|
}
|
|
|
|
|
|
2019-07-25 04:24:32 +08:00
|
|
|
// SelectorsForObject returns the pod label selector for a given object
|
2019-05-16 03:31:47 +08:00
|
|
|
//
|
|
|
|
|
// Modified version of https://github.com/kubernetes/kubernetes/blob/v1.14.1/pkg/kubectl/polymorphichelpers/helpers.go#L84
|
2019-07-25 04:24:32 +08:00
|
|
|
func SelectorsForObject(object runtime.Object) (selector labels.Selector, err error) {
|
2019-05-16 03:31:47 +08:00
|
|
|
switch t := object.(type) {
|
|
|
|
|
case *extensionsv1beta1.ReplicaSet:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *appsv1.ReplicaSet:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *appsv1beta2.ReplicaSet:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *corev1.ReplicationController:
|
|
|
|
|
selector = labels.SelectorFromSet(t.Spec.Selector)
|
|
|
|
|
case *appsv1.StatefulSet:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *appsv1beta1.StatefulSet:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *appsv1beta2.StatefulSet:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *extensionsv1beta1.DaemonSet:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *appsv1.DaemonSet:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *appsv1beta2.DaemonSet:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *extensionsv1beta1.Deployment:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *appsv1.Deployment:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *appsv1beta1.Deployment:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *appsv1beta2.Deployment:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *batchv1.Job:
|
|
|
|
|
selector, err = metav1.LabelSelectorAsSelector(t.Spec.Selector)
|
|
|
|
|
case *corev1.Service:
|
2024-12-19 23:27:38 +08:00
|
|
|
if len(t.Spec.Selector) == 0 {
|
2019-05-16 03:31:47 +08:00
|
|
|
return nil, fmt.Errorf("invalid service '%s': Service is defined without a selector", t.Name)
|
|
|
|
|
}
|
|
|
|
|
selector = labels.SelectorFromSet(t.Spec.Selector)
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
return nil, fmt.Errorf("selector for %T not implemented", object)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return selector, errors.Wrap(err, "invalid label selector")
|
|
|
|
|
}
|