Rainbond/worker/appm/controller/upgrade.go
2020-02-06 11:40:49 +08:00

258 lines
9.5 KiB
Go

// RAINBOND, Application Management Platform
// Copyright (C) 2014-2017 Goodrain Co., Ltd.
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version. For any non-GPL usage of Rainbond,
// one or multiple Commercial Licenses authorized by Goodrain Co., Ltd.
// must be obtained first.
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
package controller
import (
"fmt"
"sync"
"time"
"github.com/Sirupsen/logrus"
"github.com/goodrain/rainbond/event"
"github.com/goodrain/rainbond/util"
"github.com/goodrain/rainbond/worker/appm/f"
v1 "github.com/goodrain/rainbond/worker/appm/types/v1"
workerutil "github.com/goodrain/rainbond/worker/util"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
)
type upgradeController struct {
stopChan chan struct{}
controllerID string
appService []v1.AppService
manager *Manager
}
func (s *upgradeController) Begin() {
var wait sync.WaitGroup
for _, service := range s.appService {
go func(service v1.AppService) {
wait.Add(1)
defer wait.Done()
service.Logger.Info("App runtime begin upgrade app service "+service.ServiceAlias, event.GetLoggerOption("starting"))
if err := s.upgradeOne(service); err != nil {
if err != ErrWaitTimeOut {
service.Logger.Error(util.Translation("upgrade service error"), event.GetCallbackLoggerOption())
logrus.Errorf("upgrade service %s failure %s", service.ServiceAlias, err.Error())
} else {
service.Logger.Error(util.Translation("upgrade service timeout"), event.GetTimeoutLoggerOption())
}
} else {
service.Logger.Info(fmt.Sprintf("upgrade service %s success", service.ServiceAlias), event.GetLastLoggerOption())
}
}(service)
}
wait.Wait()
s.manager.callback(s.controllerID, nil)
}
func (s *upgradeController) Stop() error {
return nil
}
func (s *upgradeController) upgradeConfigMap(newapp v1.AppService) {
nowApp := s.manager.store.GetAppService(newapp.ServiceID)
nowConfigMaps := nowApp.GetConfigMaps()
newConfigMaps := newapp.GetConfigMaps()
var nowConfigMapMaps = make(map[string]*corev1.ConfigMap, len(nowConfigMaps))
for i, now := range nowConfigMaps {
nowConfigMapMaps[now.Name] = nowConfigMaps[i]
}
for _, new := range newConfigMaps {
if nowConfig, ok := nowConfigMapMaps[new.Name]; ok {
new.UID = nowConfig.UID
newc, err := s.manager.client.CoreV1().ConfigMaps(nowApp.TenantID).Update(new)
if err != nil {
logrus.Errorf("update config map failure %s", err.Error())
}
nowApp.SetConfigMap(newc)
nowConfigMapMaps[new.Name] = nil
logrus.Debugf("update configmap %s for service %s", new.Name, newapp.ServiceID)
} else {
newc, err := s.manager.client.CoreV1().ConfigMaps(nowApp.TenantID).Create(new)
if err != nil {
logrus.Errorf("update config map failure %s", err.Error())
}
nowApp.SetConfigMap(newc)
logrus.Debugf("create configmap %s for service %s", new.Name, newapp.ServiceID)
}
}
for name, handle := range nowConfigMapMaps {
if handle != nil {
if err := s.manager.client.CoreV1().ConfigMaps(nowApp.TenantID).Delete(name, &metav1.DeleteOptions{}); err != nil {
logrus.Errorf("delete config map failure %s", err.Error())
}
logrus.Debugf("delete configmap %s for service %s", name, newapp.ServiceID)
}
}
}
func (s *upgradeController) upgradeService(newapp v1.AppService) {
nowApp := s.manager.store.GetAppService(newapp.ServiceID)
nowServices := nowApp.GetServices(true)
newService := newapp.GetServices(true)
var nowServiceMaps = make(map[string]*corev1.Service, len(nowServices))
for i, now := range nowServices {
nowServiceMaps[now.Name] = nowServices[i]
}
for i := range newService {
new := newService[i]
if nowConfig, ok := nowServiceMaps[new.Name]; ok {
nowConfig.Spec.Ports = new.Spec.Ports
nowConfig.Spec.Type = new.Spec.Type
nowConfig.Labels = new.Labels
newc, err := s.manager.client.CoreV1().Services(nowApp.TenantID).Update(nowConfig)
if err != nil {
logrus.Errorf("update service failure %s", err.Error())
}
nowApp.SetService(newc)
nowServiceMaps[new.Name] = nil
logrus.Debugf("update service %s for service %s", new.Name, newapp.ServiceID)
} else {
err := CreateKubeService(s.manager.client, nowApp.TenantID, new)
if err != nil {
logrus.Errorf("update service failure %s", err.Error())
}
nowApp.SetService(new)
logrus.Debugf("create service %s for service %s", new.Name, newapp.ServiceID)
}
}
for name, handle := range nowServiceMaps {
if handle != nil {
if err := s.manager.client.CoreV1().Services(nowApp.TenantID).Delete(name, &metav1.DeleteOptions{}); err != nil {
logrus.Errorf("delete service failure %s", err.Error())
}
logrus.Debugf("delete service %s for service %s", name, newapp.ServiceID)
}
}
}
func (s *upgradeController) upgradeClaim(newapp v1.AppService) {
nowApp := s.manager.store.GetAppService(newapp.ServiceID)
nowClaims := nowApp.GetClaims()
newClaims := newapp.GetClaims()
var nowClaimMaps = make(map[string]*corev1.PersistentVolumeClaim, len(nowClaims))
for i, now := range nowClaims {
nowClaimMaps[now.Name] = nowClaims[i]
}
for _, n := range newClaims {
if o, ok := nowClaimMaps[n.Name]; ok {
n.UID = o.UID
n.ResourceVersion = o.ResourceVersion
claim, err := s.manager.client.CoreV1().PersistentVolumeClaims(n.Namespace).Update(n)
if err != nil {
logrus.Errorf("update claim[%s] error: %s", n.GetName(), err.Error())
continue
}
nowApp.SetClaim(claim)
delete(nowClaimMaps, o.Name)
logrus.Debugf("ServiceID: %s; successfully update claim: %s", nowApp.ServiceID, n.Name)
} else {
claim, err := s.manager.client.CoreV1().PersistentVolumeClaims(n.Namespace).Create(n)
if err != nil {
logrus.Errorf("error create claim: %+v: err: %v", claim.GetName(), err)
continue
}
logrus.Debugf("ServiceID: %s; successfully create claim: %s", nowApp.ServiceID, claim.Name)
nowApp.SetClaim(claim)
}
}
}
func (s *upgradeController) upgradeOne(app v1.AppService) error {
//first: check and create namespace
_, err := s.manager.client.CoreV1().Namespaces().Get(app.TenantID, metav1.GetOptions{})
if err != nil {
if errors.IsNotFound(err) {
_, err = s.manager.client.CoreV1().Namespaces().Create(app.GetTenant())
}
if err != nil {
return fmt.Errorf("create or check namespace failure %s", err.Error())
}
}
s.upgradeConfigMap(app)
podDNSConfig := workerutil.MakePodDNSConfig(s.manager.client, app.TenantID, s.manager.rbdNamespace, s.manager.rbdDNSName)
if deployment := app.GetDeployment(); deployment != nil {
if podDNSConfig != nil {
deployment.Spec.Template.Spec.DNSConfig = podDNSConfig
deployment.Spec.Template.Spec.DNSPolicy = "None"
}
_, err = s.manager.client.AppsV1().Deployments(deployment.Namespace).Patch(deployment.Name, types.MergePatchType, app.UpgradePatch["deployment"])
if err != nil {
app.Logger.Error(fmt.Sprintf("upgrade deployment %s failure %s", app.ServiceAlias, err.Error()), event.GetLoggerOption("failure"))
return fmt.Errorf("upgrade deployment %s failure %s", app.ServiceAlias, err.Error())
}
}
if statefulset := app.GetStatefulSet(); statefulset != nil {
if podDNSConfig != nil {
statefulset.Spec.Template.Spec.DNSConfig = podDNSConfig
statefulset.Spec.Template.Spec.DNSPolicy = "None"
}
_, err = s.manager.client.AppsV1().StatefulSets(statefulset.Namespace).Patch(statefulset.Name, types.MergePatchType, app.UpgradePatch["statefulset"])
if err != nil {
logrus.Errorf("patch statefulset error : %s", err.Error())
app.Logger.Error(fmt.Sprintf("upgrade statefulset %s failure %s", app.ServiceAlias, err.Error()), event.GetLoggerOption("failure"))
return fmt.Errorf("upgrade statefulset %s failure %s", app.ServiceAlias, err.Error())
}
}
oldApp := s.manager.store.GetAppService(app.ServiceID)
s.upgradeService(app)
handleErr := func(msg string, err error) error {
// ignore ingress and secret error
logrus.Warning(msg)
return nil
}
_ = f.UpgradeSecrets(s.manager.client, &app, oldApp.GetSecrets(true), app.GetSecrets(true), handleErr)
_ = f.UpgradeIngress(s.manager.client, &app, oldApp.GetIngress(true), app.GetIngress(true), handleErr)
return s.WaitingReady(app)
}
//WaitingReady wait app start or upgrade ready
func (s *upgradeController) WaitingReady(app v1.AppService) error {
storeAppService := s.manager.store.GetAppService(app.ServiceID)
var initTime int32
if podt := app.GetPodTemplate(); podt != nil {
for _, c := range podt.Spec.Containers {
if c.ReadinessProbe != nil {
initTime = c.ReadinessProbe.InitialDelaySeconds
break
}
if c.LivenessProbe != nil {
initTime = c.LivenessProbe.InitialDelaySeconds
break
}
}
}
//at least waiting time is 40 second
timeout := time.Second * time.Duration(40+initTime)
if storeAppService != nil && storeAppService.Replicas >= 0 {
timeout = timeout * time.Duration((storeAppService.Replicas)*2)
}
if err := WaitUpgradeReady(s.manager.store, storeAppService, timeout, app.Logger, s.stopChan); err != nil {
return err
}
return nil
}