2021-04-11 14:10:16 +08:00
|
|
|
/*
|
|
|
|
Copyright 2021 The KubeVela Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package appfile
|
|
|
|
|
|
|
|
import (
|
2021-07-02 15:09:45 +08:00
|
|
|
"context"
|
2021-04-11 14:10:16 +08:00
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2021-09-12 10:12:46 +08:00
|
|
|
"reflect"
|
2021-04-11 14:10:16 +08:00
|
|
|
"strings"
|
|
|
|
|
|
|
|
"cuelang.org/go/cue"
|
|
|
|
"cuelang.org/go/cue/format"
|
|
|
|
json2cue "cuelang.org/go/encoding/json"
|
|
|
|
"github.com/crossplane/crossplane-runtime/pkg/fieldpath"
|
2021-04-30 16:28:00 +08:00
|
|
|
terraformapi "github.com/oam-dev/terraform-controller/api/v1beta1"
|
2021-04-11 14:10:16 +08:00
|
|
|
"github.com/pkg/errors"
|
2021-06-24 15:06:58 +08:00
|
|
|
corev1 "k8s.io/api/core/v1"
|
2021-04-30 16:28:00 +08:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
2021-04-11 14:10:16 +08:00
|
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
|
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
|
|
|
|
|
|
"github.com/oam-dev/kubevela/apis/core.oam.dev/common"
|
2021-11-05 17:29:05 +08:00
|
|
|
"github.com/oam-dev/kubevela/apis/core.oam.dev/v1alpha1"
|
2021-09-12 10:12:46 +08:00
|
|
|
"github.com/oam-dev/kubevela/apis/core.oam.dev/v1beta1"
|
2021-04-11 14:10:16 +08:00
|
|
|
"github.com/oam-dev/kubevela/apis/types"
|
|
|
|
"github.com/oam-dev/kubevela/pkg/appfile/helm"
|
2021-06-02 15:37:06 +08:00
|
|
|
"github.com/oam-dev/kubevela/pkg/cue/definition"
|
2021-09-12 10:12:46 +08:00
|
|
|
"github.com/oam-dev/kubevela/pkg/cue/model"
|
|
|
|
"github.com/oam-dev/kubevela/pkg/cue/model/value"
|
2021-06-02 15:37:06 +08:00
|
|
|
"github.com/oam-dev/kubevela/pkg/cue/process"
|
2021-04-11 14:10:16 +08:00
|
|
|
"github.com/oam-dev/kubevela/pkg/oam"
|
|
|
|
"github.com/oam-dev/kubevela/pkg/oam/util"
|
2021-11-08 23:11:50 +08:00
|
|
|
"github.com/oam-dev/kubevela/pkg/workflow/step"
|
2021-04-11 14:10:16 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
// constant error information
|
|
|
|
const (
|
2021-04-30 16:28:00 +08:00
|
|
|
errInvalidValueType = "require %q type parameter value"
|
|
|
|
errTerraformConfigurationIsNotSet = "terraform configuration is not set"
|
|
|
|
errFailToConvertTerraformComponentProperties = "failed to convert Terraform component properties"
|
|
|
|
errTerraformNameOfWriteConnectionSecretToRefNotSet = "the name of writeConnectionSecretToRef of terraform component is not set"
|
2021-04-11 14:10:16 +08:00
|
|
|
)
|
|
|
|
|
2021-04-30 16:28:00 +08:00
|
|
|
// WriteConnectionSecretToRefKey is used to create a secret for cloud resource connection
|
|
|
|
const WriteConnectionSecretToRefKey = "writeConnectionSecretToRef"
|
|
|
|
|
2021-04-11 14:10:16 +08:00
|
|
|
// Workload is component
|
|
|
|
type Workload struct {
|
|
|
|
Name string
|
|
|
|
Type string
|
2021-08-08 12:11:24 +08:00
|
|
|
ExternalRevision string
|
2021-04-11 14:10:16 +08:00
|
|
|
CapabilityCategory types.CapabilityCategory
|
|
|
|
Params map[string]interface{}
|
|
|
|
Traits []*Trait
|
|
|
|
Scopes []Scope
|
2021-09-12 10:12:46 +08:00
|
|
|
ScopeDefinition []*v1beta1.ScopeDefinition
|
2021-04-11 14:10:16 +08:00
|
|
|
FullTemplate *Template
|
2021-09-12 10:12:46 +08:00
|
|
|
Ctx process.Context
|
|
|
|
Patch *value.Value
|
2021-04-11 14:10:16 +08:00
|
|
|
engine definition.AbstractEngine
|
|
|
|
}
|
|
|
|
|
|
|
|
// EvalContext eval workload template and set result to context
|
|
|
|
func (wl *Workload) EvalContext(ctx process.Context) error {
|
|
|
|
return wl.engine.Complete(ctx, wl.FullTemplate.TemplateStr, wl.Params)
|
|
|
|
}
|
|
|
|
|
|
|
|
// EvalStatus eval workload status
|
|
|
|
func (wl *Workload) EvalStatus(ctx process.Context, cli client.Client, ns string) (string, error) {
|
2021-05-31 18:44:15 +08:00
|
|
|
return wl.engine.Status(ctx, cli, ns, wl.FullTemplate.CustomStatus, wl.Params)
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// EvalHealth eval workload health check
|
|
|
|
func (wl *Workload) EvalHealth(ctx process.Context, client client.Client, namespace string) (bool, error) {
|
2021-09-12 10:12:46 +08:00
|
|
|
if wl.FullTemplate.Health == "" {
|
|
|
|
return true, nil
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
2021-09-12 10:12:46 +08:00
|
|
|
return wl.engine.HealthCheck(ctx, client, namespace, wl.FullTemplate.Health)
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Scope defines the scope of workload
|
|
|
|
type Scope struct {
|
2021-09-12 10:12:46 +08:00
|
|
|
Name string
|
|
|
|
GVK metav1.GroupVersionKind
|
|
|
|
ResourceVersion string
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Trait is ComponentTrait
|
|
|
|
type Trait struct {
|
|
|
|
// The Name is name of TraitDefinition, actually it's a type of the trait instance
|
|
|
|
Name string
|
|
|
|
CapabilityCategory types.CapabilityCategory
|
|
|
|
Params map[string]interface{}
|
|
|
|
|
|
|
|
Template string
|
|
|
|
HealthCheckPolicy string
|
|
|
|
CustomStatusFormat string
|
|
|
|
|
2021-07-04 21:40:43 +08:00
|
|
|
// RequiredSecrets stores secret names which the trait needs from cloud resource component and its context
|
|
|
|
RequiredSecrets []process.RequiredSecrets
|
|
|
|
|
2021-04-11 14:10:16 +08:00
|
|
|
FullTemplate *Template
|
|
|
|
engine definition.AbstractEngine
|
|
|
|
}
|
|
|
|
|
|
|
|
// EvalContext eval trait template and set result to context
|
|
|
|
func (trait *Trait) EvalContext(ctx process.Context) error {
|
|
|
|
return trait.engine.Complete(ctx, trait.Template, trait.Params)
|
|
|
|
}
|
|
|
|
|
|
|
|
// EvalStatus eval trait status
|
|
|
|
func (trait *Trait) EvalStatus(ctx process.Context, cli client.Client, ns string) (string, error) {
|
2021-05-31 18:44:15 +08:00
|
|
|
return trait.engine.Status(ctx, cli, ns, trait.CustomStatusFormat, trait.Params)
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// EvalHealth eval trait health check
|
|
|
|
func (trait *Trait) EvalHealth(ctx process.Context, client client.Client, namespace string) (bool, error) {
|
2021-09-12 10:12:46 +08:00
|
|
|
if trait.FullTemplate.Health == "" {
|
|
|
|
return true, nil
|
2021-07-04 21:40:43 +08:00
|
|
|
}
|
2021-09-12 10:12:46 +08:00
|
|
|
return trait.engine.HealthCheck(ctx, client, namespace, trait.HealthCheckPolicy)
|
2021-07-04 21:40:43 +08:00
|
|
|
}
|
|
|
|
|
2021-04-11 14:10:16 +08:00
|
|
|
// Appfile describes application
|
|
|
|
type Appfile struct {
|
2021-09-12 10:12:46 +08:00
|
|
|
Name string
|
|
|
|
Namespace string
|
|
|
|
AppRevisionName string
|
|
|
|
Workloads []*Workload
|
|
|
|
|
|
|
|
AppRevisionHash string
|
|
|
|
AppLabels map[string]string
|
|
|
|
AppAnnotations map[string]string
|
|
|
|
|
|
|
|
RelatedTraitDefinitions map[string]*v1beta1.TraitDefinition
|
|
|
|
RelatedComponentDefinitions map[string]*v1beta1.ComponentDefinition
|
|
|
|
RelatedScopeDefinitions map[string]*v1beta1.ScopeDefinition
|
2021-06-15 13:40:12 +08:00
|
|
|
|
|
|
|
Policies []*Workload
|
2021-07-22 18:53:30 +08:00
|
|
|
WorkflowSteps []v1beta1.WorkflowStep
|
2021-08-04 18:58:57 +08:00
|
|
|
Components []common.ApplicationComponent
|
2021-08-29 09:11:10 +08:00
|
|
|
Artifacts []*types.ComponentManifest
|
2021-09-12 10:12:46 +08:00
|
|
|
WorkflowMode common.WorkflowMode
|
|
|
|
|
|
|
|
parser *Parser
|
2021-11-08 23:11:50 +08:00
|
|
|
app *v1beta1.Application
|
2021-09-12 10:12:46 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Handler handles reconcile
|
|
|
|
type Handler interface {
|
|
|
|
HandleComponentsRevision(ctx context.Context, compManifests []*types.ComponentManifest) error
|
|
|
|
Dispatch(ctx context.Context, manifests ...*unstructured.Unstructured) error
|
2021-06-15 13:40:12 +08:00
|
|
|
}
|
|
|
|
|
2021-09-12 10:12:46 +08:00
|
|
|
// PrepareWorkflowAndPolicy generates workflow steps and policies from an appFile
|
2021-11-24 15:38:13 +08:00
|
|
|
func (af *Appfile) PrepareWorkflowAndPolicy() ([]*Workload, []*unstructured.Unstructured, error) {
|
|
|
|
var externalPolicies []*unstructured.Unstructured
|
|
|
|
var builtInPolicies []*Workload
|
|
|
|
var err error
|
|
|
|
|
|
|
|
for _, policy := range af.Policies {
|
|
|
|
switch policy.Type {
|
|
|
|
case v1alpha1.GarbageCollectPolicyType:
|
|
|
|
builtInPolicies = append(builtInPolicies, policy)
|
|
|
|
case v1alpha1.EnvBindingPolicyType:
|
|
|
|
default:
|
|
|
|
un, err := af.generateUnstructured(policy)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
externalPolicies = append(externalPolicies, un)
|
|
|
|
}
|
2021-06-15 13:40:12 +08:00
|
|
|
}
|
2021-07-22 18:53:30 +08:00
|
|
|
|
2021-11-08 23:11:50 +08:00
|
|
|
af.WorkflowSteps, err = step.NewChainWorkflowStepGenerator(
|
|
|
|
&step.Deploy2EnvWorkflowStepGenerator{},
|
|
|
|
&step.ApplyComponentWorkflowStepGenerator{},
|
|
|
|
).Generate(af.app, af.WorkflowSteps)
|
|
|
|
|
2021-11-24 15:38:13 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
return builtInPolicies, externalPolicies, nil
|
2021-06-15 13:40:12 +08:00
|
|
|
}
|
|
|
|
|
2021-11-24 15:38:13 +08:00
|
|
|
func (af *Appfile) generateUnstructured(workload *Workload) (*unstructured.Unstructured, error) {
|
|
|
|
un, err := generateUnstructuredFromCUEModule(workload, af.Name, af.AppRevisionName, af.Namespace, af.Components, af.Artifacts)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
un.SetName(workload.Name)
|
|
|
|
if len(un.GetNamespace()) == 0 {
|
|
|
|
un.SetNamespace(af.Namespace)
|
2021-06-15 13:40:12 +08:00
|
|
|
}
|
2021-11-24 15:38:13 +08:00
|
|
|
return un, nil
|
2021-06-15 13:40:12 +08:00
|
|
|
}
|
|
|
|
|
2021-08-29 09:11:10 +08:00
|
|
|
func generateUnstructuredFromCUEModule(wl *Workload, appName, revision, ns string, components []common.ApplicationComponent, artifacts []*types.ComponentManifest) (*unstructured.Unstructured, error) {
|
2021-08-04 18:58:57 +08:00
|
|
|
pCtx := process.NewPolicyContext(ns, wl.Name, appName, revision, components)
|
2021-08-30 11:43:20 +08:00
|
|
|
pCtx.PushData(model.ContextDataArtifacts, prepareArtifactsData(artifacts))
|
2021-08-04 18:58:57 +08:00
|
|
|
if err := wl.EvalContext(pCtx); err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "evaluate base template app=%s in namespace=%s", appName, ns)
|
2021-06-15 13:40:12 +08:00
|
|
|
}
|
|
|
|
return makeWorkloadWithContext(pCtx, wl, ns, appName)
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
|
2021-09-12 10:12:46 +08:00
|
|
|
// artifacts contains resources in unstructured shape of all components
|
2021-08-29 09:11:10 +08:00
|
|
|
// it allows to access values of workloads and traits in CUE template, i.g.,
|
|
|
|
// `if context.artifacts.<compName>.ready` to determine whether it's ready to access
|
|
|
|
// `context.artifacts.<compName>.workload` to access a workload
|
|
|
|
// `context.artifacts.<compName>.traits.<traitType>.<traitResource>` to access a trait
|
|
|
|
func prepareArtifactsData(comps []*types.ComponentManifest) map[string]interface{} {
|
|
|
|
artifacts := unstructured.Unstructured{Object: make(map[string]interface{})}
|
|
|
|
for _, pComp := range comps {
|
2021-09-12 10:12:46 +08:00
|
|
|
if pComp.StandardWorkload != nil {
|
|
|
|
_ = unstructured.SetNestedField(artifacts.Object, pComp.StandardWorkload.Object, pComp.Name, "workload")
|
2021-08-29 09:11:10 +08:00
|
|
|
}
|
|
|
|
for _, t := range pComp.Traits {
|
2021-09-12 10:12:46 +08:00
|
|
|
if t == nil {
|
|
|
|
continue
|
|
|
|
}
|
2021-08-29 09:11:10 +08:00
|
|
|
_ = unstructured.SetNestedField(artifacts.Object, t.Object, pComp.Name,
|
|
|
|
"traits",
|
|
|
|
t.GetLabels()[oam.TraitTypeLabel],
|
|
|
|
t.GetLabels()[oam.TraitResource])
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return artifacts.Object
|
|
|
|
}
|
|
|
|
|
2021-06-24 15:06:58 +08:00
|
|
|
// GenerateComponentManifests converts an appFile to a slice of ComponentManifest
|
|
|
|
func (af *Appfile) GenerateComponentManifests() ([]*types.ComponentManifest, error) {
|
|
|
|
compManifests := make([]*types.ComponentManifest, len(af.Workloads))
|
2021-08-29 09:11:10 +08:00
|
|
|
af.Artifacts = make([]*types.ComponentManifest, len(af.Workloads))
|
2021-06-24 15:06:58 +08:00
|
|
|
for i, wl := range af.Workloads {
|
2021-07-02 15:09:45 +08:00
|
|
|
cm, err := af.GenerateComponentManifest(wl)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
2021-09-12 10:12:46 +08:00
|
|
|
err = af.SetOAMContract(cm)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-07-02 15:09:45 +08:00
|
|
|
compManifests[i] = cm
|
2021-08-29 09:11:10 +08:00
|
|
|
af.Artifacts[i] = cm
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
2021-06-24 15:06:58 +08:00
|
|
|
return compManifests, nil
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
|
2021-07-02 15:09:45 +08:00
|
|
|
// GenerateComponentManifest generate only one ComponentManifest
|
|
|
|
func (af *Appfile) GenerateComponentManifest(wl *Workload) (*types.ComponentManifest, error) {
|
2021-08-20 13:43:04 +08:00
|
|
|
if af.Namespace == "" {
|
|
|
|
af.Namespace = corev1.NamespaceDefault
|
|
|
|
}
|
2021-11-07 11:50:27 +08:00
|
|
|
// generate context here to avoid nil pointer panic
|
|
|
|
wl.Ctx = NewBasicContext(af.Name, wl.Name, af.AppRevisionName, af.Namespace, wl.Params)
|
2021-07-02 15:09:45 +08:00
|
|
|
switch wl.CapabilityCategory {
|
|
|
|
case types.HelmCategory:
|
2021-09-12 10:12:46 +08:00
|
|
|
return generateComponentFromHelmModule(wl, af.Name, af.AppRevisionName, af.Namespace)
|
2021-07-02 15:09:45 +08:00
|
|
|
case types.KubeCategory:
|
2021-09-12 10:12:46 +08:00
|
|
|
return generateComponentFromKubeModule(wl, af.Name, af.AppRevisionName, af.Namespace)
|
2021-07-02 15:09:45 +08:00
|
|
|
case types.TerraformCategory:
|
2021-11-07 11:50:27 +08:00
|
|
|
return generateComponentFromTerraformModule(wl, af.Name, af.Namespace)
|
2021-07-02 15:09:45 +08:00
|
|
|
default:
|
2021-09-12 10:12:46 +08:00
|
|
|
return generateComponentFromCUEModule(wl, af.Name, af.AppRevisionName, af.Namespace)
|
2021-07-02 15:09:45 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-12 10:12:46 +08:00
|
|
|
// SetOAMContract will set OAM labels and annotations for resources as contract
|
|
|
|
func (af *Appfile) SetOAMContract(comp *types.ComponentManifest) error {
|
|
|
|
|
|
|
|
compName := comp.Name
|
|
|
|
commonLabels := af.generateAndFilterCommonLabels(compName)
|
|
|
|
af.assembleWorkload(comp.StandardWorkload, compName, commonLabels)
|
|
|
|
|
|
|
|
workloadRef := corev1.ObjectReference{
|
|
|
|
APIVersion: comp.StandardWorkload.GetAPIVersion(),
|
|
|
|
Kind: comp.StandardWorkload.GetKind(),
|
|
|
|
Name: comp.StandardWorkload.GetName(),
|
|
|
|
}
|
|
|
|
for _, trait := range comp.Traits {
|
|
|
|
af.assembleTrait(trait, compName, commonLabels)
|
|
|
|
if err := af.setWorkloadRefToTrait(workloadRef, trait); err != nil {
|
|
|
|
return errors.WithMessagef(err, "cannot set workload reference to trait %q", trait.GetName())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// workload and trait in the same component both have these labels, except componentRevision which should be evaluated with input/output
|
|
|
|
func (af *Appfile) generateAndFilterCommonLabels(compName string) map[string]string {
|
|
|
|
filter := func(labels map[string]string, notAllowedKey []string) {
|
|
|
|
for _, l := range notAllowedKey {
|
|
|
|
delete(labels, strings.TrimSpace(l))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Labels := map[string]string{
|
|
|
|
oam.LabelAppName: af.Name,
|
|
|
|
oam.LabelAppRevision: af.AppRevisionName,
|
|
|
|
oam.LabelAppComponent: compName,
|
|
|
|
}
|
|
|
|
// merge application's all labels
|
|
|
|
finalLabels := util.MergeMapOverrideWithDst(Labels, af.AppLabels)
|
|
|
|
filterLabels, ok := af.AppAnnotations[oam.AnnotationFilterLabelKeys]
|
|
|
|
if ok {
|
|
|
|
filter(finalLabels, strings.Split(filterLabels, ","))
|
|
|
|
}
|
|
|
|
return finalLabels
|
|
|
|
}
|
|
|
|
|
|
|
|
// workload and trait both have these annotations
|
|
|
|
func (af *Appfile) filterAndSetAnnotations(obj *unstructured.Unstructured) {
|
|
|
|
var allFilterAnnotation []string
|
|
|
|
allFilterAnnotation = append(allFilterAnnotation, types.DefaultFilterAnnots...)
|
|
|
|
|
|
|
|
passedFilterAnnotation, ok := af.AppAnnotations[oam.AnnotationFilterAnnotationKeys]
|
|
|
|
if ok {
|
|
|
|
allFilterAnnotation = append(allFilterAnnotation, strings.Split(passedFilterAnnotation, ",")...)
|
|
|
|
}
|
|
|
|
|
|
|
|
// pass application's all annotations
|
|
|
|
util.AddAnnotations(obj, af.AppAnnotations)
|
|
|
|
// remove useless annotations for workload/trait
|
|
|
|
util.RemoveAnnotations(obj, allFilterAnnotation)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (af *Appfile) setNamespace(obj *unstructured.Unstructured) {
|
|
|
|
|
|
|
|
// we should not set namespace for namespace resources
|
|
|
|
gvk := obj.GetObjectKind().GroupVersionKind()
|
|
|
|
if gvk == corev1.SchemeGroupVersion.WithKind(reflect.TypeOf(corev1.Namespace{}).Name()) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// only set app's namespace when namespace is unspecified
|
|
|
|
// it's by design to set arbitrary namespace in render phase
|
|
|
|
if len(obj.GetNamespace()) == 0 {
|
|
|
|
obj.SetNamespace(af.Namespace)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (af *Appfile) assembleWorkload(wl *unstructured.Unstructured, compName string, labels map[string]string) {
|
2021-09-23 15:05:25 +08:00
|
|
|
// use component name as workload name if workload name is not specified
|
|
|
|
// don't override the name set in render phase if exist
|
|
|
|
if len(wl.GetName()) == 0 {
|
|
|
|
wl.SetName(compName)
|
|
|
|
}
|
2021-09-13 14:17:12 +08:00
|
|
|
af.setNamespace(wl)
|
2021-09-12 10:12:46 +08:00
|
|
|
af.setWorkloadLabels(wl, labels)
|
|
|
|
af.filterAndSetAnnotations(wl)
|
|
|
|
}
|
|
|
|
|
|
|
|
/* NOTE a workload has these possible labels
|
|
|
|
app.oam.dev/app-revision-hash: ce053923e2fb403f
|
|
|
|
app.oam.dev/appRevision: myapp-v2
|
|
|
|
app.oam.dev/component: mycomp
|
|
|
|
app.oam.dev/name: myapp
|
|
|
|
app.oam.dev/resourceType: WORKLOAD
|
|
|
|
app.oam.dev/revision: mycomp-v2
|
|
|
|
workload.oam.dev/type: kube-worker
|
|
|
|
// Component Revision name was not added here (app.oam.dev/revision: mycomp-v2)
|
|
|
|
*/
|
|
|
|
func (af *Appfile) setWorkloadLabels(wl *unstructured.Unstructured, commonLabels map[string]string) {
|
|
|
|
// add more workload-specific labels here
|
|
|
|
util.AddLabels(wl, map[string]string{oam.LabelOAMResourceType: oam.ResourceTypeWorkload})
|
|
|
|
util.AddLabels(wl, commonLabels)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (af *Appfile) assembleTrait(trait *unstructured.Unstructured, compName string, labels map[string]string) {
|
|
|
|
traitType := trait.GetLabels()[oam.TraitTypeLabel]
|
|
|
|
// only set generated name when name is unspecified
|
|
|
|
// it's by design to set arbitrary name in render phase
|
|
|
|
if len(trait.GetName()) == 0 {
|
|
|
|
cpTrait := trait.DeepCopy()
|
|
|
|
// remove labels that should not be calculate into hash
|
|
|
|
util.RemoveLabels(cpTrait, []string{oam.LabelAppRevision})
|
|
|
|
traitName := util.GenTraitNameCompatible(compName, cpTrait, traitType)
|
|
|
|
trait.SetName(traitName)
|
|
|
|
}
|
|
|
|
af.setTraitLabels(trait, labels)
|
|
|
|
af.filterAndSetAnnotations(trait)
|
|
|
|
af.setNamespace(trait)
|
|
|
|
}
|
|
|
|
|
|
|
|
/* NOTE a trait has these possible labels
|
|
|
|
app.oam.dev/app-revision-hash: ce053923e2fb403f
|
|
|
|
app.oam.dev/appRevision: myapp-v2
|
|
|
|
app.oam.dev/component: mycomp
|
|
|
|
app.oam.dev/name: myapp
|
|
|
|
app.oam.dev/resourceType: TRAIT
|
|
|
|
trait.oam.dev/resource: service
|
|
|
|
trait.oam.dev/type: ingress // already added in render phase
|
|
|
|
// Component Revision name was not added here (app.oam.dev/revision: mycomp-v2)
|
|
|
|
*/
|
|
|
|
func (af *Appfile) setTraitLabels(trait *unstructured.Unstructured, commonLabels map[string]string) {
|
|
|
|
// add more trait-specific labels here
|
|
|
|
util.AddLabels(trait, map[string]string{oam.LabelOAMResourceType: oam.ResourceTypeTrait})
|
|
|
|
util.AddLabels(trait, commonLabels)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (af *Appfile) setWorkloadRefToTrait(wlRef corev1.ObjectReference, trait *unstructured.Unstructured) error {
|
|
|
|
traitType := trait.GetLabels()[oam.TraitTypeLabel]
|
|
|
|
if traitType == definition.AuxiliaryWorkload {
|
|
|
|
return nil
|
|
|
|
}
|
2021-09-14 10:26:57 +08:00
|
|
|
if strings.Contains(traitType, "-") {
|
|
|
|
splitName := traitType[0:strings.LastIndex(traitType, "-")]
|
|
|
|
_, ok := af.RelatedTraitDefinitions[splitName]
|
|
|
|
if ok {
|
|
|
|
traitType = splitName
|
|
|
|
}
|
|
|
|
}
|
2021-09-12 10:12:46 +08:00
|
|
|
traitDef, ok := af.RelatedTraitDefinitions[traitType]
|
|
|
|
if !ok {
|
|
|
|
return errors.Errorf("TraitDefinition %s not found in appfile", traitType)
|
|
|
|
}
|
|
|
|
workloadRefPath := traitDef.Spec.WorkloadRefPath
|
|
|
|
// only add workload reference to the trait if it asks for it
|
|
|
|
if len(workloadRefPath) != 0 {
|
|
|
|
tmpWLRef := corev1.ObjectReference{
|
|
|
|
APIVersion: wlRef.APIVersion,
|
|
|
|
Kind: wlRef.Kind,
|
|
|
|
Name: wlRef.Name,
|
|
|
|
}
|
|
|
|
if err := fieldpath.Pave(trait.UnstructuredContent()).SetValue(workloadRefPath, tmpWLRef); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-04-11 14:10:16 +08:00
|
|
|
// PrepareProcessContext prepares a DSL process Context
|
|
|
|
func PrepareProcessContext(wl *Workload, applicationName, revision, namespace string) (process.Context, error) {
|
2021-11-07 11:50:27 +08:00
|
|
|
if wl.Ctx == nil {
|
|
|
|
wl.Ctx = NewBasicContext(applicationName, wl.Name, revision, namespace, wl.Params)
|
|
|
|
}
|
|
|
|
if err := wl.EvalContext(wl.Ctx); err != nil {
|
2021-04-30 16:28:00 +08:00
|
|
|
return nil, errors.Wrapf(err, "evaluate base template app=%s in namespace=%s", applicationName, namespace)
|
|
|
|
}
|
2021-11-07 11:50:27 +08:00
|
|
|
return wl.Ctx, nil
|
2021-04-30 16:28:00 +08:00
|
|
|
}
|
|
|
|
|
2021-05-13 21:46:45 +08:00
|
|
|
// NewBasicContext prepares a basic DSL process Context
|
2021-11-07 11:50:27 +08:00
|
|
|
func NewBasicContext(applicationName, workloadName, revision, namespace string, params map[string]interface{}) process.Context {
|
|
|
|
pCtx := process.NewContext(namespace, workloadName, applicationName, revision)
|
|
|
|
if params != nil {
|
|
|
|
pCtx.SetParameters(params)
|
2021-08-06 10:48:00 +08:00
|
|
|
}
|
2021-04-30 16:28:00 +08:00
|
|
|
return pCtx
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
|
2021-06-24 15:06:58 +08:00
|
|
|
func generateComponentFromCUEModule(wl *Workload, appName, revision, ns string) (*types.ComponentManifest, error) {
|
2021-04-30 16:28:00 +08:00
|
|
|
pCtx, err := PrepareProcessContext(wl, appName, revision, ns)
|
|
|
|
if err != nil {
|
2021-06-24 15:06:58 +08:00
|
|
|
return nil, err
|
2021-04-30 16:28:00 +08:00
|
|
|
}
|
|
|
|
return baseGenerateComponent(pCtx, wl, appName, ns)
|
|
|
|
}
|
|
|
|
|
2021-11-07 11:50:27 +08:00
|
|
|
func generateComponentFromTerraformModule(wl *Workload, appName, ns string) (*types.ComponentManifest, error) {
|
|
|
|
return baseGenerateComponent(wl.Ctx, wl, appName, ns)
|
2021-04-30 16:28:00 +08:00
|
|
|
}
|
|
|
|
|
2021-06-24 15:06:58 +08:00
|
|
|
func baseGenerateComponent(pCtx process.Context, wl *Workload, appName, ns string) (*types.ComponentManifest, error) {
|
2021-09-12 10:12:46 +08:00
|
|
|
var err error
|
2021-04-11 14:10:16 +08:00
|
|
|
for _, tr := range wl.Traits {
|
|
|
|
if err := tr.EvalContext(pCtx); err != nil {
|
2021-06-24 15:06:58 +08:00
|
|
|
return nil, errors.Wrapf(err, "evaluate template trait=%s app=%s", tr.Name, wl.Name)
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
}
|
2021-09-12 10:12:46 +08:00
|
|
|
if patcher := wl.Patch; patcher != nil {
|
|
|
|
workload, auxiliaries := pCtx.Output()
|
|
|
|
if p, err := patcher.LookupValue("workload"); err == nil {
|
|
|
|
pi, err := model.NewOther(p.CueValue())
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.WithMessage(err, "patch workload")
|
|
|
|
}
|
|
|
|
if err := workload.Unify(pi); err != nil {
|
|
|
|
return nil, errors.WithMessage(err, "patch workload")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for _, aux := range auxiliaries {
|
2021-09-12 22:45:14 +08:00
|
|
|
if p, err := patcher.LookupByScript(fmt.Sprintf("traits[\"%s\"]", aux.Name)); err == nil && p.CueValue().Err() == nil {
|
2021-09-12 10:12:46 +08:00
|
|
|
pi, err := model.NewOther(p.CueValue())
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.WithMessagef(err, "patch outputs.%s", aux.Name)
|
|
|
|
}
|
|
|
|
if err := aux.Ins.Unify(pi); err != nil {
|
|
|
|
return nil, errors.WithMessagef(err, "patch outputs.%s", aux.Name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-06-24 15:06:58 +08:00
|
|
|
compManifest, err := evalWorkloadWithContext(pCtx, wl, ns, appName, wl.Name)
|
2021-04-11 14:10:16 +08:00
|
|
|
if err != nil {
|
2021-06-24 15:06:58 +08:00
|
|
|
return nil, err
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
2021-06-24 15:06:58 +08:00
|
|
|
compManifest.Name = wl.Name
|
2021-08-20 13:43:04 +08:00
|
|
|
compManifest.Namespace = ns
|
2021-08-08 12:11:24 +08:00
|
|
|
// we record the external revision name in ExternalRevision field
|
|
|
|
compManifest.ExternalRevision = wl.ExternalRevision
|
2021-04-11 14:10:16 +08:00
|
|
|
|
2021-06-24 15:06:58 +08:00
|
|
|
compManifest.Scopes = make([]*corev1.ObjectReference, len(wl.Scopes))
|
|
|
|
for i, s := range wl.Scopes {
|
|
|
|
compManifest.Scopes[i] = &corev1.ObjectReference{
|
2021-09-12 10:12:46 +08:00
|
|
|
APIVersion: metav1.GroupVersion{
|
|
|
|
Group: s.GVK.Group,
|
|
|
|
Version: s.GVK.Version,
|
|
|
|
}.String(),
|
|
|
|
Kind: s.GVK.Kind,
|
|
|
|
Name: s.Name,
|
2021-06-24 15:06:58 +08:00
|
|
|
}
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
2021-06-24 15:06:58 +08:00
|
|
|
return compManifest, nil
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
|
2021-05-30 22:57:03 +08:00
|
|
|
// makeWorkloadWithContext evaluate the workload's template to unstructured resource.
|
|
|
|
func makeWorkloadWithContext(pCtx process.Context, wl *Workload, ns, appName string) (*unstructured.Unstructured, error) {
|
2021-04-30 16:28:00 +08:00
|
|
|
var (
|
2021-05-30 22:57:03 +08:00
|
|
|
workload *unstructured.Unstructured
|
|
|
|
err error
|
2021-04-30 16:28:00 +08:00
|
|
|
)
|
2021-05-30 22:57:03 +08:00
|
|
|
base, _ := pCtx.Output()
|
2021-04-30 16:28:00 +08:00
|
|
|
switch wl.CapabilityCategory {
|
|
|
|
case types.TerraformCategory:
|
2021-05-30 22:57:03 +08:00
|
|
|
workload, err = generateTerraformConfigurationWorkload(wl, ns)
|
2021-04-30 16:28:00 +08:00
|
|
|
if err != nil {
|
2021-05-30 22:57:03 +08:00
|
|
|
return nil, errors.Wrapf(err, "failed to generate Terraform Configuration workload for workload %s", wl.Name)
|
2021-04-30 16:28:00 +08:00
|
|
|
}
|
|
|
|
default:
|
2021-05-30 22:57:03 +08:00
|
|
|
workload, err = base.Unstructured()
|
2021-04-30 16:28:00 +08:00
|
|
|
if err != nil {
|
2021-05-30 22:57:03 +08:00
|
|
|
return nil, errors.Wrapf(err, "evaluate base template component=%s app=%s", wl.Name, appName)
|
2021-04-30 16:28:00 +08:00
|
|
|
}
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
2021-05-30 22:57:03 +08:00
|
|
|
commonLabels := definition.GetCommonLabels(pCtx.BaseContextLabels())
|
|
|
|
util.AddLabels(workload, util.MergeMapOverrideWithDst(commonLabels, map[string]string{oam.WorkloadTypeLabel: wl.Type}))
|
|
|
|
return workload, nil
|
|
|
|
}
|
|
|
|
|
2021-06-24 15:06:58 +08:00
|
|
|
// evalWorkloadWithContext evaluate the workload's template to generate component manifest
|
|
|
|
func evalWorkloadWithContext(pCtx process.Context, wl *Workload, ns, appName, compName string) (*types.ComponentManifest, error) {
|
|
|
|
compManifest := &types.ComponentManifest{}
|
|
|
|
workload, err := makeWorkloadWithContext(pCtx, wl, ns, appName)
|
2021-05-30 22:57:03 +08:00
|
|
|
if err != nil {
|
2021-06-24 15:06:58 +08:00
|
|
|
return nil, err
|
2021-05-30 22:57:03 +08:00
|
|
|
}
|
2021-06-24 15:06:58 +08:00
|
|
|
compManifest.StandardWorkload = workload
|
2021-04-11 14:10:16 +08:00
|
|
|
|
2021-05-30 22:57:03 +08:00
|
|
|
_, assists := pCtx.Output()
|
2021-06-24 15:06:58 +08:00
|
|
|
compManifest.Traits = make([]*unstructured.Unstructured, len(assists))
|
2021-05-30 22:57:03 +08:00
|
|
|
commonLabels := definition.GetCommonLabels(pCtx.BaseContextLabels())
|
2021-06-24 15:06:58 +08:00
|
|
|
for i, assist := range assists {
|
2021-04-11 14:10:16 +08:00
|
|
|
tr, err := assist.Ins.Unstructured()
|
|
|
|
if err != nil {
|
2021-06-24 15:06:58 +08:00
|
|
|
return nil, errors.Wrapf(err, "evaluate trait=%s template for component=%s app=%s", assist.Name, compName, appName)
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
labels := util.MergeMapOverrideWithDst(commonLabels, map[string]string{oam.TraitTypeLabel: assist.Type})
|
|
|
|
if assist.Name != "" {
|
|
|
|
labels[oam.TraitResource] = assist.Name
|
|
|
|
}
|
|
|
|
util.AddLabels(tr, labels)
|
2021-06-24 15:06:58 +08:00
|
|
|
compManifest.Traits[i] = tr
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
2021-06-24 15:06:58 +08:00
|
|
|
return compManifest, nil
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
|
2021-07-08 15:16:55 +08:00
|
|
|
// GenerateCUETemplate generate CUE Template from Kube module and Helm module
|
|
|
|
func GenerateCUETemplate(wl *Workload) (string, error) {
|
|
|
|
var templateStr string
|
|
|
|
switch wl.CapabilityCategory {
|
|
|
|
case types.KubeCategory:
|
|
|
|
kubeObj := &unstructured.Unstructured{}
|
2021-04-11 14:10:16 +08:00
|
|
|
|
2021-07-08 15:16:55 +08:00
|
|
|
err := json.Unmarshal(wl.FullTemplate.Kube.Template.Raw, kubeObj)
|
|
|
|
if err != nil {
|
|
|
|
return templateStr, errors.Wrap(err, "cannot decode Kube template into K8s object")
|
|
|
|
}
|
2021-04-11 14:10:16 +08:00
|
|
|
|
2021-07-08 15:16:55 +08:00
|
|
|
paramValues, err := resolveKubeParameters(wl.FullTemplate.Kube.Parameters, wl.Params)
|
|
|
|
if err != nil {
|
|
|
|
return templateStr, errors.WithMessage(err, "cannot resolve parameter settings")
|
|
|
|
}
|
|
|
|
if err := setParameterValuesToKubeObj(kubeObj, paramValues); err != nil {
|
|
|
|
return templateStr, errors.WithMessage(err, "cannot set parameters value")
|
|
|
|
}
|
|
|
|
|
|
|
|
// convert structured kube obj into CUE (go ==marshal==> json ==decoder==> cue)
|
|
|
|
objRaw, err := kubeObj.MarshalJSON()
|
|
|
|
if err != nil {
|
|
|
|
return templateStr, errors.Wrap(err, "cannot marshal kube object")
|
|
|
|
}
|
|
|
|
ins, err := json2cue.Decode(&cue.Runtime{}, "", objRaw)
|
|
|
|
if err != nil {
|
|
|
|
return templateStr, errors.Wrap(err, "cannot decode object into CUE")
|
|
|
|
}
|
|
|
|
cueRaw, err := format.Node(ins.Value().Syntax())
|
|
|
|
if err != nil {
|
|
|
|
return templateStr, errors.Wrap(err, "cannot format CUE")
|
|
|
|
}
|
2021-04-11 14:10:16 +08:00
|
|
|
|
2021-07-08 15:16:55 +08:00
|
|
|
// NOTE a hack way to enable using CUE capabilities on KUBE schematic workload
|
|
|
|
templateStr = fmt.Sprintf(`
|
2021-04-11 14:10:16 +08:00
|
|
|
output: {
|
2021-07-08 15:16:55 +08:00
|
|
|
%s
|
2021-04-11 14:10:16 +08:00
|
|
|
}`, string(cueRaw))
|
2021-07-08 15:16:55 +08:00
|
|
|
case types.HelmCategory:
|
|
|
|
gv, err := schema.ParseGroupVersion(wl.FullTemplate.Reference.Definition.APIVersion)
|
|
|
|
if err != nil {
|
|
|
|
return templateStr, err
|
|
|
|
}
|
|
|
|
targetWorkloadGVK := gv.WithKind(wl.FullTemplate.Reference.Definition.Kind)
|
|
|
|
// NOTE this is a hack way to enable using CUE module capabilities on Helm module workload
|
|
|
|
// construct an empty base workload according to its GVK
|
|
|
|
templateStr = fmt.Sprintf(`
|
|
|
|
output: {
|
|
|
|
apiVersion: "%s"
|
|
|
|
kind: "%s"
|
|
|
|
}`, targetWorkloadGVK.GroupVersion().String(), targetWorkloadGVK.Kind)
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
return templateStr, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func generateComponentFromKubeModule(wl *Workload, appName, revision, ns string) (*types.ComponentManifest, error) {
|
|
|
|
templateStr, err := GenerateCUETemplate(wl)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
wl.FullTemplate.TemplateStr = templateStr
|
2021-04-11 14:10:16 +08:00
|
|
|
|
|
|
|
// re-use the way CUE module generates comp & acComp
|
2021-06-24 15:06:58 +08:00
|
|
|
compManifest, err := generateComponentFromCUEModule(wl, appName, revision, ns)
|
2021-04-11 14:10:16 +08:00
|
|
|
if err != nil {
|
2021-06-24 15:06:58 +08:00
|
|
|
return nil, err
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
2021-06-24 15:06:58 +08:00
|
|
|
return compManifest, nil
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
|
2021-04-30 16:28:00 +08:00
|
|
|
func generateTerraformConfigurationWorkload(wl *Workload, ns string) (*unstructured.Unstructured, error) {
|
2021-10-08 11:35:52 +08:00
|
|
|
if wl.FullTemplate == nil || wl.FullTemplate.Terraform == nil || wl.FullTemplate.Terraform.Configuration == "" {
|
2021-04-30 16:28:00 +08:00
|
|
|
return nil, errors.New(errTerraformConfigurationIsNotSet)
|
|
|
|
}
|
|
|
|
params, err := json.Marshal(wl.Params)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, errFailToConvertTerraformComponentProperties)
|
|
|
|
}
|
|
|
|
|
|
|
|
configuration := terraformapi.Configuration{
|
2021-11-28 17:21:12 +08:00
|
|
|
TypeMeta: metav1.TypeMeta{APIVersion: "terraform.core.oam.dev/v1beta1", Kind: "Configuration"},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: wl.Name,
|
|
|
|
Namespace: ns,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if wl.FullTemplate.ComponentDefinition != nil {
|
|
|
|
configuration.ObjectMeta.Annotations = wl.FullTemplate.ComponentDefinition.Annotations
|
2021-04-30 16:28:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
switch wl.FullTemplate.Terraform.Type {
|
|
|
|
case "hcl":
|
|
|
|
configuration.Spec.HCL = wl.FullTemplate.Terraform.Configuration
|
|
|
|
case "json":
|
|
|
|
configuration.Spec.JSON = wl.FullTemplate.Terraform.Configuration
|
2021-09-29 14:58:27 +08:00
|
|
|
case "remote":
|
|
|
|
configuration.Spec.Remote = wl.FullTemplate.Terraform.Configuration
|
2021-10-24 10:02:39 +08:00
|
|
|
configuration.Spec.Path = wl.FullTemplate.Terraform.Path
|
2021-04-30 16:28:00 +08:00
|
|
|
}
|
|
|
|
|
2021-10-08 11:35:52 +08:00
|
|
|
if wl.FullTemplate.Terraform.ProviderReference != nil {
|
|
|
|
configuration.Spec.ProviderReference = wl.FullTemplate.Terraform.ProviderReference
|
|
|
|
}
|
|
|
|
|
2021-04-30 16:28:00 +08:00
|
|
|
// 1. parse writeConnectionSecretToRef
|
|
|
|
if err := json.Unmarshal(params, &configuration.Spec); err != nil {
|
|
|
|
return nil, errors.Wrap(err, errFailToConvertTerraformComponentProperties)
|
|
|
|
}
|
|
|
|
|
|
|
|
if configuration.Spec.WriteConnectionSecretToReference != nil {
|
|
|
|
if configuration.Spec.WriteConnectionSecretToReference.Name == "" {
|
|
|
|
return nil, errors.New(errTerraformNameOfWriteConnectionSecretToRefNotSet)
|
|
|
|
}
|
|
|
|
// set namespace for writeConnectionSecretToRef, developer needn't manually set it
|
|
|
|
if configuration.Spec.WriteConnectionSecretToReference.Namespace == "" {
|
|
|
|
configuration.Spec.WriteConnectionSecretToReference.Namespace = ns
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// 2. parse variable
|
|
|
|
variableRaw := &runtime.RawExtension{}
|
|
|
|
if err := json.Unmarshal(params, &variableRaw); err != nil {
|
|
|
|
return nil, errors.Wrap(err, errFailToConvertTerraformComponentProperties)
|
|
|
|
}
|
|
|
|
|
|
|
|
variableMap, err := util.RawExtension2Map(variableRaw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, errFailToConvertTerraformComponentProperties)
|
|
|
|
}
|
|
|
|
delete(variableMap, WriteConnectionSecretToRefKey)
|
|
|
|
|
|
|
|
data, err := json.Marshal(variableMap)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, errFailToConvertTerraformComponentProperties)
|
|
|
|
}
|
|
|
|
configuration.Spec.Variable = &runtime.RawExtension{Raw: data}
|
|
|
|
raw := util.Object2RawExtension(&configuration)
|
2021-10-13 16:16:53 +08:00
|
|
|
return util.RawExtension2Unstructured(raw)
|
2021-04-30 16:28:00 +08:00
|
|
|
}
|
|
|
|
|
2021-04-11 14:10:16 +08:00
|
|
|
// a helper map whose key is parameter name
|
|
|
|
type paramValueSettings map[string]paramValueSetting
|
|
|
|
type paramValueSetting struct {
|
|
|
|
Value interface{}
|
|
|
|
ValueType common.ParameterValueType
|
|
|
|
FieldPaths []string
|
|
|
|
}
|
|
|
|
|
|
|
|
func resolveKubeParameters(params []common.KubeParameter, settings map[string]interface{}) (paramValueSettings, error) {
|
|
|
|
supported := map[string]*common.KubeParameter{}
|
|
|
|
for _, p := range params {
|
|
|
|
supported[p.Name] = p.DeepCopy()
|
|
|
|
}
|
|
|
|
|
|
|
|
values := make(paramValueSettings)
|
|
|
|
for name, v := range settings {
|
|
|
|
// check unsupported parameter setting
|
|
|
|
if supported[name] == nil {
|
|
|
|
return nil, errors.Errorf("unsupported parameter %q", name)
|
|
|
|
}
|
|
|
|
// construct helper map
|
|
|
|
values[name] = paramValueSetting{
|
|
|
|
Value: v,
|
|
|
|
ValueType: supported[name].ValueType,
|
|
|
|
FieldPaths: supported[name].FieldPaths,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// check required parameter
|
|
|
|
for _, p := range params {
|
|
|
|
if p.Required != nil && *p.Required {
|
|
|
|
if _, ok := values[p.Name]; !ok {
|
|
|
|
return nil, errors.Errorf("require parameter %q", p.Name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return values, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func setParameterValuesToKubeObj(obj *unstructured.Unstructured, values paramValueSettings) error {
|
|
|
|
paved := fieldpath.Pave(obj.Object)
|
|
|
|
for paramName, v := range values {
|
|
|
|
for _, f := range v.FieldPaths {
|
|
|
|
switch v.ValueType {
|
|
|
|
case common.StringType:
|
|
|
|
vString, ok := v.Value.(string)
|
|
|
|
if !ok {
|
|
|
|
return errors.Errorf(errInvalidValueType, v.ValueType)
|
|
|
|
}
|
|
|
|
if err := paved.SetString(f, vString); err != nil {
|
|
|
|
return errors.Wrapf(err, "cannot set parameter %q to field %q", paramName, f)
|
|
|
|
}
|
|
|
|
case common.NumberType:
|
|
|
|
switch v.Value.(type) {
|
|
|
|
case int, int8, int16, int32, int64, uint, uint8, uint16, uint32, uint64, float32, float64:
|
|
|
|
if err := paved.SetValue(f, v.Value); err != nil {
|
|
|
|
return errors.Wrapf(err, "cannot set parameter %q to field %q", paramName, f)
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return errors.Errorf(errInvalidValueType, v.ValueType)
|
|
|
|
}
|
|
|
|
case common.BooleanType:
|
|
|
|
vBoolean, ok := v.Value.(bool)
|
|
|
|
if !ok {
|
|
|
|
return errors.Errorf(errInvalidValueType, v.ValueType)
|
|
|
|
}
|
|
|
|
if err := paved.SetValue(f, vBoolean); err != nil {
|
|
|
|
return errors.Wrapf(err, "cannot set parameter %q to field %q", paramName, f)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-06-24 15:06:58 +08:00
|
|
|
func generateComponentFromHelmModule(wl *Workload, appName, revision, ns string) (*types.ComponentManifest, error) {
|
2021-07-08 15:16:55 +08:00
|
|
|
templateStr, err := GenerateCUETemplate(wl)
|
2021-04-11 14:10:16 +08:00
|
|
|
if err != nil {
|
2021-06-24 15:06:58 +08:00
|
|
|
return nil, err
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
2021-07-08 15:16:55 +08:00
|
|
|
wl.FullTemplate.TemplateStr = templateStr
|
2021-04-11 14:10:16 +08:00
|
|
|
|
|
|
|
// re-use the way CUE module generates comp & acComp
|
2021-06-24 15:06:58 +08:00
|
|
|
compManifest := &types.ComponentManifest{
|
2021-08-08 12:11:24 +08:00
|
|
|
Name: wl.Name,
|
2021-08-20 13:43:04 +08:00
|
|
|
Namespace: ns,
|
2021-08-08 12:11:24 +08:00
|
|
|
ExternalRevision: wl.ExternalRevision,
|
2021-09-12 10:12:46 +08:00
|
|
|
StandardWorkload: &unstructured.Unstructured{},
|
2021-06-24 15:06:58 +08:00
|
|
|
}
|
2021-09-13 14:17:12 +08:00
|
|
|
|
2021-05-24 23:32:02 +08:00
|
|
|
if wl.FullTemplate.Reference.Type != types.AutoDetectWorkloadDefinition {
|
2021-06-24 15:06:58 +08:00
|
|
|
compManifest, err = generateComponentFromCUEModule(wl, appName, revision, ns)
|
2021-05-24 23:32:02 +08:00
|
|
|
if err != nil {
|
2021-06-24 15:06:58 +08:00
|
|
|
return nil, err
|
2021-05-24 23:32:02 +08:00
|
|
|
}
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
|
|
|
|
2021-06-24 15:06:58 +08:00
|
|
|
rls, repo, err := helm.RenderHelmReleaseAndHelmRepo(wl.FullTemplate.Helm, wl.Name, appName, ns, wl.Params)
|
2021-04-11 14:10:16 +08:00
|
|
|
if err != nil {
|
2021-06-24 15:06:58 +08:00
|
|
|
return nil, err
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|
2021-06-24 15:06:58 +08:00
|
|
|
compManifest.PackagedWorkloadResources = []*unstructured.Unstructured{rls, repo}
|
|
|
|
return compManifest, nil
|
2021-04-11 14:10:16 +08:00
|
|
|
}
|