mirror of https://github.com/helm/helm
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
242 lines
7.2 KiB
242 lines
7.2 KiB
/*
|
|
Copyright The Helm Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package action
|
|
|
|
import (
|
|
"bytes"
|
|
"sort"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
"helm.sh/helm/pkg/hooks"
|
|
"helm.sh/helm/pkg/kube"
|
|
"helm.sh/helm/pkg/release"
|
|
"helm.sh/helm/pkg/releaseutil"
|
|
)
|
|
|
|
// Uninstall is the action for uninstalling releases.
|
|
//
|
|
// It provides the implementation of 'helm uninstall'.
|
|
type Uninstall struct {
|
|
cfg *Configuration
|
|
|
|
DisableHooks bool
|
|
DryRun bool
|
|
KeepHistory bool
|
|
Timeout int64
|
|
}
|
|
|
|
// NewUninstall creates a new Uninstall object with the given configuration.
|
|
func NewUninstall(cfg *Configuration) *Uninstall {
|
|
return &Uninstall{
|
|
cfg: cfg,
|
|
}
|
|
}
|
|
|
|
// Run uninstalls the given release.
|
|
func (u *Uninstall) Run(name string) (*release.UninstallReleaseResponse, error) {
|
|
if u.DryRun {
|
|
// In the dry run case, just see if the release exists
|
|
r, err := u.cfg.releaseContent(name, 0)
|
|
if err != nil {
|
|
return &release.UninstallReleaseResponse{}, err
|
|
}
|
|
return &release.UninstallReleaseResponse{Release: r}, nil
|
|
}
|
|
|
|
if err := validateReleaseName(name); err != nil {
|
|
return nil, errors.Errorf("uninstall: Release name is invalid: %s", name)
|
|
}
|
|
|
|
rels, err := u.cfg.Releases.History(name)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "uninstall: Release not loaded: %s", name)
|
|
}
|
|
if len(rels) < 1 {
|
|
return nil, errMissingRelease
|
|
}
|
|
|
|
releaseutil.SortByRevision(rels)
|
|
rel := rels[len(rels)-1]
|
|
|
|
// TODO: Are there any cases where we want to force a delete even if it's
|
|
// already marked deleted?
|
|
if rel.Info.Status == release.StatusUninstalled {
|
|
if !u.KeepHistory {
|
|
if err := u.purgeReleases(rels...); err != nil {
|
|
return nil, errors.Wrap(err, "uninstall: Failed to purge the release")
|
|
}
|
|
return &release.UninstallReleaseResponse{Release: rel}, nil
|
|
}
|
|
return nil, errors.Errorf("the release named %q is already deleted", name)
|
|
}
|
|
|
|
u.cfg.Log("uninstall: Deleting %s", name)
|
|
rel.Info.Status = release.StatusUninstalling
|
|
rel.Info.Deleted = time.Now()
|
|
rel.Info.Description = "Deletion in progress (or silently failed)"
|
|
res := &release.UninstallReleaseResponse{Release: rel}
|
|
|
|
if !u.DisableHooks {
|
|
if err := u.execHook(rel.Hooks, rel.Namespace, hooks.PreDelete); err != nil {
|
|
return res, err
|
|
}
|
|
} else {
|
|
u.cfg.Log("delete hooks disabled for %s", name)
|
|
}
|
|
|
|
// From here on out, the release is currently considered to be in StatusUninstalling
|
|
// state.
|
|
if err := u.cfg.Releases.Update(rel); err != nil {
|
|
u.cfg.Log("uninstall: Failed to store updated release: %s", err)
|
|
}
|
|
|
|
kept, errs := u.deleteRelease(rel)
|
|
res.Info = kept
|
|
|
|
if !u.DisableHooks {
|
|
if err := u.execHook(rel.Hooks, rel.Namespace, hooks.PostDelete); err != nil {
|
|
errs = append(errs, err)
|
|
}
|
|
}
|
|
|
|
rel.Info.Status = release.StatusUninstalled
|
|
rel.Info.Description = "Uninstallation complete"
|
|
|
|
if !u.KeepHistory {
|
|
u.cfg.Log("purge requested for %s", name)
|
|
err := u.purgeReleases(rels...)
|
|
return res, errors.Wrap(err, "uninstall: Failed to purge the release")
|
|
}
|
|
|
|
if err := u.cfg.Releases.Update(rel); err != nil {
|
|
u.cfg.Log("uninstall: Failed to store updated release: %s", err)
|
|
}
|
|
|
|
if len(errs) > 0 {
|
|
return res, errors.Errorf("uninstallation completed with %d error(s): %s", len(errs), joinErrors(errs))
|
|
}
|
|
return res, nil
|
|
}
|
|
|
|
func (u *Uninstall) purgeReleases(rels ...*release.Release) error {
|
|
for _, rel := range rels {
|
|
if _, err := u.cfg.Releases.Delete(rel.Name, rel.Version); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func joinErrors(errs []error) string {
|
|
es := make([]string, 0, len(errs))
|
|
for _, e := range errs {
|
|
es = append(es, e.Error())
|
|
}
|
|
return strings.Join(es, "; ")
|
|
}
|
|
|
|
// execHook executes all of the hooks for the given hook event.
|
|
func (u *Uninstall) execHook(hs []*release.Hook, namespace, hook string) error {
|
|
timeout := u.Timeout
|
|
executingHooks := []*release.Hook{}
|
|
|
|
for _, h := range hs {
|
|
for _, e := range h.Events {
|
|
if string(e) == hook {
|
|
executingHooks = append(executingHooks, h)
|
|
}
|
|
}
|
|
}
|
|
|
|
sort.Sort(hookByWeight(executingHooks))
|
|
|
|
for _, h := range executingHooks {
|
|
if err := deleteHookByPolicy(u.cfg, namespace, h, hooks.BeforeHookCreation, hook); err != nil {
|
|
return err
|
|
}
|
|
|
|
b := bytes.NewBufferString(h.Manifest)
|
|
if err := u.cfg.KubeClient.Create(namespace, b, timeout, false); err != nil {
|
|
return errors.Wrapf(err, "warning: Hook %s %s failed", hook, h.Path)
|
|
}
|
|
b.Reset()
|
|
b.WriteString(h.Manifest)
|
|
|
|
if err := u.cfg.KubeClient.WatchUntilReady(namespace, b, timeout, false); err != nil {
|
|
// If a hook is failed, checkout the annotation of the hook to determine whether the hook should be deleted
|
|
// under failed condition. If so, then clear the corresponding resource object in the hook
|
|
if err := deleteHookByPolicy(u.cfg, namespace, h, hooks.HookFailed, hook); err != nil {
|
|
return err
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
|
|
// If all hooks are succeeded, checkout the annotation of each hook to determine whether the hook should be deleted
|
|
// under succeeded condition. If so, then clear the corresponding resource object in each hook
|
|
for _, h := range executingHooks {
|
|
if err := deleteHookByPolicy(u.cfg, namespace, h, hooks.HookSucceeded, hook); err != nil {
|
|
return err
|
|
}
|
|
h.LastRun = time.Now()
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// deleteRelease deletes the release and returns manifests that were kept in the deletion process
|
|
func (u *Uninstall) deleteRelease(rel *release.Release) (kept string, errs []error) {
|
|
caps, err := newCapabilities(u.cfg.Discovery)
|
|
if err != nil {
|
|
return rel.Manifest, []error{errors.Wrap(err, "could not get apiVersions from Kubernetes")}
|
|
}
|
|
|
|
manifests := releaseutil.SplitManifests(rel.Manifest)
|
|
_, files, err := releaseutil.SortManifests(manifests, caps.APIVersions, releaseutil.UninstallOrder)
|
|
if err != nil {
|
|
// We could instead just delete everything in no particular order.
|
|
// FIXME: One way to delete at this point would be to try a label-based
|
|
// deletion. The problem with this is that we could get a false positive
|
|
// and delete something that was not legitimately part of this release.
|
|
return rel.Manifest, []error{errors.Wrap(err, "corrupted release record. You must manually delete the resources")}
|
|
}
|
|
|
|
filesToKeep, filesToDelete := filterManifestsToKeep(files)
|
|
if len(filesToKeep) > 0 {
|
|
kept = summarizeKeptManifests(filesToKeep, u.cfg.KubeClient, rel.Namespace)
|
|
}
|
|
|
|
for _, file := range filesToDelete {
|
|
b := bytes.NewBufferString(strings.TrimSpace(file.Content))
|
|
if b.Len() == 0 {
|
|
continue
|
|
}
|
|
if err := u.cfg.KubeClient.Delete(rel.Namespace, b); err != nil {
|
|
u.cfg.Log("uninstall: Failed deletion of %q: %s", rel.Name, err)
|
|
if err == kube.ErrNoObjectsVisited {
|
|
// Rewrite the message from "no objects visited"
|
|
err = errors.New("object not found, skipping delete")
|
|
}
|
|
errs = append(errs, err)
|
|
}
|
|
}
|
|
return kept, errs
|
|
}
|