2022-09-05 03:06:08 -04:00
/ *
Copyright ( c ) Edgeless Systems GmbH
SPDX - License - Identifier : AGPL - 3.0 - only
* /
2022-08-29 10:49:44 -04:00
package cmd
import (
"context"
2023-01-04 07:55:10 -05:00
"errors"
2022-12-19 10:52:15 -05:00
"fmt"
2023-05-22 07:31:20 -04:00
"path/filepath"
2022-12-19 10:52:15 -05:00
"time"
2022-08-29 10:49:44 -04:00
2023-07-21 04:04:29 -04:00
"github.com/edgelesssys/constellation/v2/cli/internal/cloudcmd"
2023-05-03 05:11:53 -04:00
"github.com/edgelesssys/constellation/v2/cli/internal/clusterid"
2023-08-08 09:42:06 -04:00
"github.com/edgelesssys/constellation/v2/cli/internal/cmd/pathprefix"
2023-01-04 07:55:10 -05:00
"github.com/edgelesssys/constellation/v2/cli/internal/helm"
2023-03-30 10:13:14 -04:00
"github.com/edgelesssys/constellation/v2/cli/internal/kubernetes"
2023-05-22 07:31:20 -04:00
"github.com/edgelesssys/constellation/v2/cli/internal/terraform"
"github.com/edgelesssys/constellation/v2/cli/internal/upgrade"
2023-06-07 10:16:32 -04:00
"github.com/edgelesssys/constellation/v2/internal/api/attestationconfigapi"
2023-06-09 09:41:02 -04:00
"github.com/edgelesssys/constellation/v2/internal/attestation/variant"
2023-03-24 12:07:14 -04:00
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
2023-02-28 04:23:09 -05:00
"github.com/edgelesssys/constellation/v2/internal/compatibility"
2022-09-21 07:47:57 -04:00
"github.com/edgelesssys/constellation/v2/internal/config"
2023-05-03 05:11:53 -04:00
"github.com/edgelesssys/constellation/v2/internal/constants"
2022-09-21 07:47:57 -04:00
"github.com/edgelesssys/constellation/v2/internal/file"
2023-08-11 09:18:59 -04:00
"github.com/edgelesssys/constellation/v2/internal/kms/uri"
2023-06-05 03:13:02 -04:00
"github.com/edgelesssys/constellation/v2/internal/versions"
2023-08-08 07:03:23 -04:00
"github.com/rogpeppe/go-internal/diff"
2022-08-29 10:49:44 -04:00
"github.com/spf13/afero"
"github.com/spf13/cobra"
2023-08-08 07:03:23 -04:00
"gopkg.in/yaml.v3"
2022-08-29 10:49:44 -04:00
)
2023-02-01 04:56:47 -05:00
func newUpgradeApplyCmd ( ) * cobra . Command {
2022-08-29 10:49:44 -04:00
cmd := & cobra . Command {
2023-02-09 09:54:12 -05:00
Use : "apply" ,
2023-02-01 04:56:47 -05:00
Short : "Apply an upgrade to a Constellation cluster" ,
Long : "Apply an upgrade to a Constellation cluster by applying the chosen configuration." ,
2022-08-29 10:49:44 -04:00
Args : cobra . NoArgs ,
2023-02-01 04:56:47 -05:00
RunE : runUpgradeApply ,
2022-08-29 10:49:44 -04:00
}
2023-01-17 08:01:56 -05:00
cmd . Flags ( ) . BoolP ( "yes" , "y" , false , "run upgrades without further confirmation\n" +
2023-03-14 13:34:58 -04:00
"WARNING: might delete your resources in case you are using cert-manager in your cluster. Please read the docs.\n" +
"WARNING: might unintentionally overwrite measurements in the running cluster." )
2023-06-06 09:22:06 -04:00
cmd . Flags ( ) . Duration ( "timeout" , 5 * time . Minute , "change helm upgrade timeout\n" +
2023-02-01 05:23:57 -05:00
"Might be useful for slow connections or big clusters." )
2023-08-11 09:18:59 -04:00
cmd . Flags ( ) . Bool ( "conformance" , false , "enable conformance mode" )
cmd . Flags ( ) . Bool ( "skip-helm-wait" , false , "install helm charts without waiting for deployments to be ready" )
2022-12-19 10:52:15 -05:00
if err := cmd . Flags ( ) . MarkHidden ( "timeout" ) ; err != nil {
panic ( err )
}
2022-08-29 10:49:44 -04:00
return cmd
}
2023-03-20 06:03:36 -04:00
func runUpgradeApply ( cmd * cobra . Command , _ [ ] string ) error {
2022-12-19 10:52:15 -05:00
log , err := newCLILogger ( cmd )
if err != nil {
return fmt . Errorf ( "creating logger: %w" , err )
}
defer log . Sync ( )
2022-08-29 10:49:44 -04:00
fileHandler := file . NewHandler ( afero . NewOsFs ( ) )
2023-08-04 07:53:51 -04:00
upgrader , err := kubernetes . NewUpgrader (
cmd . Context ( ) , cmd . OutOrStdout ( ) ,
constants . UpgradeDir , constants . AdminConfFilename ,
fileHandler , log , kubernetes . UpgradeCmdKindApply ,
)
2022-08-29 10:49:44 -04:00
if err != nil {
return err
}
2023-06-07 10:16:32 -04:00
configFetcher := attestationconfigapi . NewFetcher ( )
2023-08-11 09:18:59 -04:00
tfClient , err := terraform . New ( cmd . Context ( ) , constants . TerraformWorkingDir )
if err != nil {
return fmt . Errorf ( "setting up terraform client: %w" , err )
}
2023-08-08 07:03:23 -04:00
2023-08-14 09:16:07 -04:00
applyCmd := upgradeApplyCmd { upgrader : upgrader , log : log , configFetcher : configFetcher , clusterShower : tfClient , fileHandler : fileHandler }
2023-08-11 09:18:59 -04:00
return applyCmd . upgradeApply ( cmd )
2022-08-29 10:49:44 -04:00
}
2023-02-09 09:54:12 -05:00
type upgradeApplyCmd struct {
2023-07-26 11:29:03 -04:00
upgrader cloudUpgrader
configFetcher attestationconfigapi . Fetcher
2023-08-11 09:18:59 -04:00
clusterShower clusterShower
fileHandler file . Handler
2023-07-26 11:29:03 -04:00
log debugLog
2023-02-09 09:54:12 -05:00
}
2023-08-11 09:18:59 -04:00
func ( u * upgradeApplyCmd ) upgradeApply ( cmd * cobra . Command ) error {
2023-02-01 04:56:47 -05:00
flags , err := parseUpgradeApplyFlags ( cmd )
2022-08-29 10:49:44 -04:00
if err != nil {
2023-01-04 07:55:10 -05:00
return fmt . Errorf ( "parsing flags: %w" , err )
2022-08-29 10:49:44 -04:00
}
2023-07-26 11:29:03 -04:00
2023-08-11 09:18:59 -04:00
conf , err := config . New ( u . fileHandler , constants . ConfigFilename , u . configFetcher , flags . force )
2023-02-07 06:56:25 -05:00
var configValidationErr * config . ValidationError
if errors . As ( err , & configValidationErr ) {
cmd . PrintErrln ( configValidationErr . LongMessage ( ) )
}
2022-08-29 10:49:44 -04:00
if err != nil {
2023-02-07 06:56:25 -05:00
return err
2022-08-29 10:49:44 -04:00
}
2023-07-26 11:29:03 -04:00
if upgradeRequiresIAMMigration ( conf . GetProvider ( ) ) {
cmd . Println ( "WARNING: This upgrade requires an IAM migration. Please make sure you have applied the IAM migration using `iam upgrade apply` before continuing." )
if ! flags . yes {
yes , err := askToConfirm ( cmd , "Did you upgrade the IAM resources?" )
if err != nil {
return fmt . Errorf ( "asking for confirmation: %w" , err )
}
if ! yes {
cmd . Println ( "Skipping upgrade." )
return nil
}
}
}
2023-08-11 09:18:59 -04:00
validK8sVersion , err := validK8sVersion ( cmd , conf . KubernetesVersion , flags . yes )
if err != nil {
2023-06-05 03:13:02 -04:00
return err
}
2023-05-03 05:11:53 -04:00
var idFile clusterid . File
2023-08-11 09:18:59 -04:00
if err := u . fileHandler . ReadJSON ( constants . ClusterIDsFilename , & idFile ) ; err != nil {
2023-05-03 05:11:53 -04:00
return fmt . Errorf ( "reading cluster ID file: %w" , err )
}
2023-08-11 09:18:59 -04:00
if idFile . MeasurementSalt == nil {
// TODO(elchead): remove after 2.10, since 2.9 does not yet save it in the idfile
measurementSalt , err := u . upgrader . GetMeasurementSalt ( cmd . Context ( ) )
if err != nil {
return fmt . Errorf ( "getting join-config: %w" , err )
}
idFile . MeasurementSalt = measurementSalt
if err := u . fileHandler . WriteJSON ( constants . ClusterIDsFilename , idFile , file . OptOverwrite ) ; err != nil {
return fmt . Errorf ( "writing cluster ID file: %w" , err )
}
}
2023-05-03 05:11:53 -04:00
conf . UpdateMAAURL ( idFile . AttestationURL )
2023-08-11 09:18:59 -04:00
if err := u . confirmIfUpgradeAttestConfigHasDiff ( cmd , conf . GetAttestationConfig ( ) , flags ) ; err != nil {
2023-05-03 05:11:53 -04:00
return fmt . Errorf ( "upgrading measurements: %w" , err )
}
2023-07-24 04:30:53 -04:00
// not moving existing Terraform migrator because of planned apply refactor
2023-08-14 09:16:07 -04:00
tfOutput , err := u . migrateTerraform ( cmd , conf , flags )
2023-08-11 09:18:59 -04:00
if err != nil {
2023-05-22 07:31:20 -04:00
return fmt . Errorf ( "performing Terraform migrations: %w" , err )
}
2023-07-21 10:43:51 -04:00
// reload idFile after terraform migration
// it might have been updated by the migration
2023-08-11 09:18:59 -04:00
if err := u . fileHandler . ReadJSON ( constants . ClusterIDsFilename , & idFile ) ; err != nil {
2023-07-21 10:43:51 -04:00
return fmt . Errorf ( "reading updated cluster ID file: %w" , err )
}
// extend the clusterConfig cert SANs with any of the supported endpoints:
// - (legacy) public IP
// - fallback endpoint
// - custom (user-provided) endpoint
sans := append ( [ ] string { idFile . IP , conf . CustomEndpoint } , idFile . APIServerCertSANs ... )
if err := u . upgrader . ExtendClusterConfigCertSANs ( cmd . Context ( ) , sans ) ; err != nil {
return fmt . Errorf ( "extending cert SANs: %w" , err )
}
2023-05-22 07:31:20 -04:00
2023-05-19 07:57:31 -04:00
if conf . GetProvider ( ) == cloudprovider . Azure || conf . GetProvider ( ) == cloudprovider . GCP || conf . GetProvider ( ) == cloudprovider . AWS {
2023-06-30 10:46:05 -04:00
var upgradeErr * compatibility . InvalidUpgradeError
2023-08-11 09:18:59 -04:00
err = u . handleServiceUpgrade ( cmd , conf , idFile , tfOutput , validK8sVersion , flags )
2023-03-24 12:07:14 -04:00
switch {
2023-06-30 10:46:05 -04:00
case errors . As ( err , & upgradeErr ) :
2023-03-24 12:07:14 -04:00
cmd . PrintErrln ( err )
2023-08-11 09:18:59 -04:00
case err == nil :
cmd . Println ( "Successfully upgraded Constellation services." )
2023-03-24 12:07:14 -04:00
case err != nil :
return fmt . Errorf ( "upgrading services: %w" , err )
}
2022-12-19 10:52:15 -05:00
2023-06-21 09:49:42 -04:00
err = u . upgrader . UpgradeNodeVersion ( cmd . Context ( ) , conf , flags . force )
2023-03-24 12:07:14 -04:00
switch {
2023-03-30 10:13:14 -04:00
case errors . Is ( err , kubernetes . ErrInProgress ) :
2023-03-24 12:07:14 -04:00
cmd . PrintErrln ( "Skipping image and Kubernetes upgrades. Another upgrade is in progress." )
2023-06-30 10:46:05 -04:00
case errors . As ( err , & upgradeErr ) :
2023-03-24 12:07:14 -04:00
cmd . PrintErrln ( err )
case err != nil :
return fmt . Errorf ( "upgrading NodeVersion: %w" , err )
}
} else {
2023-05-19 07:57:31 -04:00
cmd . PrintErrln ( "WARNING: Skipping service and image upgrades, which are currently only supported for AWS, Azure, and GCP." )
2023-02-09 09:54:12 -05:00
}
2023-03-14 13:34:58 -04:00
return nil
}
2023-08-08 07:03:23 -04:00
func diffAttestationCfg ( currentAttestationCfg config . AttestationCfg , newAttestationCfg config . AttestationCfg ) ( string , error ) {
// cannot compare structs directly with go-cmp because of unexported fields in the attestation config
currentYml , err := yaml . Marshal ( currentAttestationCfg )
if err != nil {
return "" , fmt . Errorf ( "marshalling remote attestation config: %w" , err )
}
newYml , err := yaml . Marshal ( newAttestationCfg )
if err != nil {
return "" , fmt . Errorf ( "marshalling local attestation config: %w" , err )
}
diff := string ( diff . Diff ( "current" , currentYml , "new" , newYml ) )
return diff , nil
}
2023-05-22 07:31:20 -04:00
// migrateTerraform checks if the Constellation version the cluster is being upgraded to requires a migration
// of cloud resources with Terraform. If so, the migration is performed.
2023-08-04 07:53:51 -04:00
func ( u * upgradeApplyCmd ) migrateTerraform (
2023-08-14 09:16:07 -04:00
cmd * cobra . Command , conf * config . Config , flags upgradeApplyFlags ,
2023-08-11 09:18:59 -04:00
) ( res terraform . ApplyOutput , err error ) {
2023-05-22 07:31:20 -04:00
u . log . Debugf ( "Planning Terraform migrations" )
2023-08-04 07:53:51 -04:00
if err := u . upgrader . CheckTerraformMigrations ( constants . UpgradeDir ) ; err != nil {
2023-08-11 09:18:59 -04:00
return res , fmt . Errorf ( "checking workspace: %w" , err )
2023-05-22 07:31:20 -04:00
}
2023-08-14 09:16:07 -04:00
vars , err := cloudcmd . TerraformUpgradeVars ( conf )
2023-05-22 07:31:20 -04:00
if err != nil {
2023-08-11 09:18:59 -04:00
return res , fmt . Errorf ( "parsing upgrade variables: %w" , err )
2023-05-22 07:31:20 -04:00
}
u . log . Debugf ( "Using Terraform variables:\n%v" , vars )
opts := upgrade . TerraformUpgradeOptions {
2023-08-04 07:53:51 -04:00
LogLevel : flags . terraformLogLevel ,
CSP : conf . GetProvider ( ) ,
Vars : vars ,
TFWorkspace : constants . TerraformWorkingDir ,
UpgradeWorkspace : constants . UpgradeDir ,
2023-05-22 07:31:20 -04:00
}
// Check if there are any Terraform migrations to apply
2023-08-09 10:04:32 -04:00
// Add manual migrations here if required
//
// var manualMigrations []terraform.StateMigration
// for _, migration := range manualMigrations {
// u.log.Debugf("Adding manual Terraform migration: %s", migration.DisplayName)
// u.upgrader.AddManualStateMigration(migration)
// }
2023-05-22 07:31:20 -04:00
hasDiff , err := u . upgrader . PlanTerraformMigrations ( cmd . Context ( ) , opts )
if err != nil {
2023-08-11 09:18:59 -04:00
return res , fmt . Errorf ( "planning terraform migrations: %w" , err )
2023-05-22 07:31:20 -04:00
}
if hasDiff {
// If there are any Terraform migrations to apply, ask for confirmation
2023-06-19 07:02:01 -04:00
fmt . Fprintln ( cmd . OutOrStdout ( ) , "The upgrade requires a migration of Constellation cloud resources by applying an updated Terraform template. Please manually review the suggested changes below." )
2023-05-22 07:31:20 -04:00
if ! flags . yes {
ok , err := askToConfirm ( cmd , "Do you want to apply the Terraform migrations?" )
if err != nil {
2023-08-11 09:18:59 -04:00
return res , fmt . Errorf ( "asking for confirmation: %w" , err )
2023-05-22 07:31:20 -04:00
}
if ! ok {
cmd . Println ( "Aborting upgrade." )
2023-08-04 07:53:51 -04:00
if err := u . upgrader . CleanUpTerraformMigrations ( constants . UpgradeDir ) ; err != nil {
2023-08-11 09:18:59 -04:00
return res , fmt . Errorf ( "cleaning up workspace: %w" , err )
2023-05-22 07:31:20 -04:00
}
2023-08-11 09:18:59 -04:00
return res , fmt . Errorf ( "aborted by user" )
2023-05-22 07:31:20 -04:00
}
}
u . log . Debugf ( "Applying Terraform migrations" )
2023-08-11 09:18:59 -04:00
tfOutput , err := u . upgrader . ApplyTerraformMigrations ( cmd . Context ( ) , opts )
2023-05-22 07:31:20 -04:00
if err != nil {
2023-08-11 09:18:59 -04:00
return tfOutput , fmt . Errorf ( "applying terraform migrations: %w" , err )
2023-05-22 07:31:20 -04:00
}
2023-08-11 09:18:59 -04:00
// Patch MAA policy if we applied an Azure upgrade.
newIDFile := newIDFile ( opts , tfOutput )
if err := mergeClusterIDFile ( constants . ClusterIDsFilename , newIDFile , u . fileHandler ) ; err != nil {
return tfOutput , fmt . Errorf ( "merging cluster ID files: %w" , err )
2023-08-04 07:53:51 -04:00
}
2023-05-22 07:31:20 -04:00
cmd . Printf ( "Terraform migrations applied successfully and output written to: %s\n" +
2023-07-18 03:33:42 -04:00
"A backup of the pre-upgrade state has been written to: %s\n" ,
2023-08-08 09:42:06 -04:00
flags . pf . PrefixPath ( constants . ClusterIDsFilename ) , flags . pf . PrefixPath ( filepath . Join ( opts . UpgradeWorkspace , u . upgrader . GetUpgradeID ( ) , constants . TerraformUpgradeBackupDir ) ) )
2023-05-22 07:31:20 -04:00
} else {
u . log . Debugf ( "No Terraform diff detected" )
}
2023-08-11 09:18:59 -04:00
u . log . Debugf ( "No Terraform diff detected" )
tfOutput , err := u . clusterShower . ShowCluster ( cmd . Context ( ) , conf . GetProvider ( ) )
if err != nil {
return tfOutput , fmt . Errorf ( "getting Terraform output: %w" , err )
}
return tfOutput , nil
}
2023-05-22 07:31:20 -04:00
2023-08-11 09:18:59 -04:00
func newIDFile ( opts upgrade . TerraformUpgradeOptions , tfOutput terraform . ApplyOutput ) clusterid . File {
newIDFile := clusterid . File {
CloudProvider : opts . CSP ,
InitSecret : [ ] byte ( tfOutput . Secret ) ,
IP : tfOutput . IP ,
APIServerCertSANs : tfOutput . APIServerCertSANs ,
UID : tfOutput . UID ,
}
if tfOutput . Azure != nil {
newIDFile . AttestationURL = tfOutput . Azure . AttestationURL
}
return newIDFile
2023-05-22 07:31:20 -04:00
}
2023-08-11 09:18:59 -04:00
// validK8sVersion checks if the Kubernetes patch version is supported and asks for confirmation if not.
func validK8sVersion ( cmd * cobra . Command , version string , yes bool ) ( validVersion versions . ValidK8sVersion , err error ) {
validVersion , err = versions . NewValidK8sVersion ( version , true )
if versions . IsPreviewK8sVersion ( validVersion ) {
cmd . PrintErrf ( "Warning: Constellation with Kubernetes %v is still in preview. Use only for evaluation purposes.\n" , validVersion )
}
2023-06-05 03:13:02 -04:00
valid := err == nil
if ! valid && ! yes {
confirmed , err := askToConfirm ( cmd , fmt . Sprintf ( "WARNING: The Kubernetes patch version %s is not supported. If you continue, Kubernetes upgrades will be skipped. Do you want to continue anyway?" , version ) )
if err != nil {
2023-08-11 09:18:59 -04:00
return validVersion , fmt . Errorf ( "asking for confirmation: %w" , err )
2023-06-05 03:13:02 -04:00
}
if ! confirmed {
2023-08-11 09:18:59 -04:00
return validVersion , fmt . Errorf ( "aborted by user" )
2023-06-05 03:13:02 -04:00
}
}
2023-08-11 09:18:59 -04:00
return validVersion , nil
2023-06-05 03:13:02 -04:00
}
2023-08-11 09:18:59 -04:00
// confirmIfUpgradeAttestConfigHasDiff checks if the locally configured measurements are different from the cluster's measurements.
// If so the function will ask the user to confirm (if --yes is not set).
func ( u * upgradeApplyCmd ) confirmIfUpgradeAttestConfigHasDiff ( cmd * cobra . Command , newConfig config . AttestationCfg , flags upgradeApplyFlags ) error {
clusterAttestationConfig , err := u . upgrader . GetClusterAttestationConfig ( cmd . Context ( ) , newConfig . GetVariant ( ) )
2023-07-10 08:03:45 -04:00
if err != nil {
return fmt . Errorf ( "getting cluster attestation config: %w" , err )
2023-03-14 13:34:58 -04:00
}
2023-08-11 09:18:59 -04:00
2023-07-10 08:03:45 -04:00
// If the current config is equal, or there is an error when comparing the configs, we skip the upgrade.
2023-07-12 05:53:00 -04:00
equal , err := newConfig . EqualTo ( clusterAttestationConfig )
if err != nil {
2023-07-10 08:03:45 -04:00
return fmt . Errorf ( "comparing attestation configs: %w" , err )
2023-03-14 13:34:58 -04:00
}
2023-07-12 05:53:00 -04:00
if equal {
return nil
}
2023-08-11 09:18:59 -04:00
cmd . Println ( "The configured attestation config is different from the attestation config in the cluster." )
diffStr , err := diffAttestationCfg ( clusterAttestationConfig , newConfig )
if err != nil {
return fmt . Errorf ( "diffing attestation configs: %w" , err )
}
cmd . Println ( "The following changes will be applied to the attestation config:" )
cmd . Println ( diffStr )
2023-03-14 13:34:58 -04:00
if ! flags . yes {
2023-08-08 07:03:23 -04:00
ok , err := askToConfirm ( cmd , "Are you sure you want to change your cluster's attestation config?" )
2023-03-14 13:34:58 -04:00
if err != nil {
return fmt . Errorf ( "asking for confirmation: %w" , err )
}
if ! ok {
2023-08-11 09:18:59 -04:00
return errors . New ( "aborting upgrade since attestation config is different" )
2023-03-14 13:34:58 -04:00
}
}
2023-08-11 09:18:59 -04:00
// TODO(elchead): move this outside this function to remove the side effect.
if err := u . upgrader . BackupConfigMap ( cmd . Context ( ) , constants . JoinConfigMap ) ; err != nil {
return fmt . Errorf ( "backing up join-config: %w" , err )
2023-03-14 13:34:58 -04:00
}
2023-08-15 07:58:04 -04:00
if err := u . upgrader . UpdateAttestationConfig ( cmd . Context ( ) , newConfig ) ; err != nil {
return fmt . Errorf ( "updating attestation config: %w" , err )
}
2023-02-09 09:54:12 -05:00
return nil
2023-02-01 05:23:57 -05:00
}
2023-08-11 09:18:59 -04:00
func ( u * upgradeApplyCmd ) handleServiceUpgrade ( cmd * cobra . Command , conf * config . Config , idFile clusterid . File , tfOutput terraform . ApplyOutput , validK8sVersion versions . ValidK8sVersion , flags upgradeApplyFlags ) error {
var secret uri . MasterSecret
if err := u . fileHandler . ReadJSON ( flags . pf . PrefixPath ( constants . MasterSecretFilename ) , & secret ) ; err != nil {
return fmt . Errorf ( "reading master secret: %w" , err )
}
serviceAccURI , err := cloudcmd . GetMarshaledServiceAccountURI ( conf . GetProvider ( ) , conf , flags . pf , u . log , u . fileHandler )
if err != nil {
return fmt . Errorf ( "getting service account URI: %w" , err )
}
err = u . upgrader . UpgradeHelmServices ( cmd . Context ( ) , conf , idFile , flags . upgradeTimeout , helm . DenyDestructive , flags . force , flags . conformance , flags . helmWaitMode , secret , serviceAccURI , validK8sVersion , tfOutput )
2023-02-01 05:23:57 -05:00
if errors . Is ( err , helm . ErrConfirmationMissing ) {
if ! flags . yes {
cmd . PrintErrln ( "WARNING: Upgrading cert-manager will destroy all custom resources you have manually created that are based on the current version of cert-manager." )
ok , askErr := askToConfirm ( cmd , "Do you want to upgrade cert-manager anyway?" )
if askErr != nil {
return fmt . Errorf ( "asking for confirmation: %w" , err )
}
if ! ok {
2023-05-03 05:11:53 -04:00
cmd . Println ( "Skipping upgrade." )
2023-02-01 05:23:57 -05:00
return nil
}
}
2023-08-11 09:18:59 -04:00
err = u . upgrader . UpgradeHelmServices ( cmd . Context ( ) , conf , idFile , flags . upgradeTimeout , helm . AllowDestructive , flags . force , flags . conformance , flags . helmWaitMode , secret , serviceAccURI , validK8sVersion , tfOutput )
2023-02-01 05:23:57 -05:00
}
2023-03-03 03:38:23 -05:00
return err
2022-08-29 10:49:44 -04:00
}
2023-02-01 04:56:47 -05:00
func parseUpgradeApplyFlags ( cmd * cobra . Command ) ( upgradeApplyFlags , error ) {
2023-08-08 09:42:06 -04:00
workDir , err := cmd . Flags ( ) . GetString ( "workspace" )
2023-01-04 07:55:10 -05:00
if err != nil {
2023-02-01 04:56:47 -05:00
return upgradeApplyFlags { } , err
2023-01-04 07:55:10 -05:00
}
yes , err := cmd . Flags ( ) . GetBool ( "yes" )
if err != nil {
2023-02-01 04:56:47 -05:00
return upgradeApplyFlags { } , err
2023-01-04 07:55:10 -05:00
}
timeout , err := cmd . Flags ( ) . GetDuration ( "timeout" )
if err != nil {
2023-02-01 04:56:47 -05:00
return upgradeApplyFlags { } , err
2023-01-04 07:55:10 -05:00
}
2023-01-31 05:45:31 -05:00
force , err := cmd . Flags ( ) . GetBool ( "force" )
if err != nil {
2023-02-01 04:56:47 -05:00
return upgradeApplyFlags { } , fmt . Errorf ( "parsing force argument: %w" , err )
2023-01-31 05:45:31 -05:00
}
2023-05-22 07:31:20 -04:00
logLevelString , err := cmd . Flags ( ) . GetString ( "tf-log" )
if err != nil {
return upgradeApplyFlags { } , fmt . Errorf ( "parsing tf-log string: %w" , err )
}
logLevel , err := terraform . ParseLogLevel ( logLevelString )
if err != nil {
return upgradeApplyFlags { } , fmt . Errorf ( "parsing Terraform log level %s: %w" , logLevelString , err )
}
2023-08-11 09:18:59 -04:00
conformance , err := cmd . Flags ( ) . GetBool ( "conformance" )
if err != nil {
return upgradeApplyFlags { } , fmt . Errorf ( "parsing conformance flag: %w" , err )
}
skipHelmWait , err := cmd . Flags ( ) . GetBool ( "skip-helm-wait" )
if err != nil {
return upgradeApplyFlags { } , fmt . Errorf ( "parsing skip-helm-wait flag: %w" , err )
}
helmWaitMode := helm . WaitModeAtomic
if skipHelmWait {
helmWaitMode = helm . WaitModeNone
}
2023-05-22 07:31:20 -04:00
return upgradeApplyFlags {
2023-08-08 09:42:06 -04:00
pf : pathprefix . New ( workDir ) ,
2023-05-22 07:31:20 -04:00
yes : yes ,
upgradeTimeout : timeout ,
force : force ,
terraformLogLevel : logLevel ,
2023-08-11 09:18:59 -04:00
conformance : conformance ,
helmWaitMode : helmWaitMode ,
2023-05-22 07:31:20 -04:00
} , nil
2023-01-04 07:55:10 -05:00
}
2023-08-04 07:53:51 -04:00
func mergeClusterIDFile ( clusterIDPath string , newIDFile clusterid . File , fileHandler file . Handler ) error {
idFile := & clusterid . File { }
if err := fileHandler . ReadJSON ( clusterIDPath , idFile ) ; err != nil {
return fmt . Errorf ( "reading %s: %w" , clusterIDPath , err )
}
if err := fileHandler . WriteJSON ( clusterIDPath , idFile . Merge ( newIDFile ) , file . OptOverwrite ) ; err != nil {
return fmt . Errorf ( "writing %s: %w" , clusterIDPath , err )
}
return nil
}
2023-02-01 04:56:47 -05:00
type upgradeApplyFlags struct {
2023-08-08 09:42:06 -04:00
pf pathprefix . PathPrefixer
2023-05-22 07:31:20 -04:00
yes bool
upgradeTimeout time . Duration
force bool
terraformLogLevel terraform . LogLevel
2023-08-11 09:18:59 -04:00
conformance bool
helmWaitMode helm . WaitMode
2023-01-04 07:55:10 -05:00
}
2022-08-29 10:49:44 -04:00
type cloudUpgrader interface {
2023-06-21 09:49:42 -04:00
UpgradeNodeVersion ( ctx context . Context , conf * config . Config , force bool ) error
2023-08-11 09:18:59 -04:00
UpgradeHelmServices ( ctx context . Context , config * config . Config , idFile clusterid . File , timeout time . Duration , allowDestructive bool , force bool , conformance bool , helmWaitMode helm . WaitMode , masterSecret uri . MasterSecret , serviceAccURI string , validK8sVersion versions . ValidK8sVersion , tfOutput terraform . ApplyOutput ) error
2023-07-21 10:43:51 -04:00
ExtendClusterConfigCertSANs ( ctx context . Context , alternativeNames [ ] string ) error
2023-08-11 09:18:59 -04:00
GetClusterAttestationConfig ( ctx context . Context , variant variant . Variant ) ( config . AttestationCfg , error )
2023-08-15 07:58:04 -04:00
UpdateAttestationConfig ( ctx context . Context , newAttestConfig config . AttestationCfg ) error
2023-08-11 09:18:59 -04:00
GetMeasurementSalt ( ctx context . Context ) ( [ ] byte , error )
2023-05-22 07:31:20 -04:00
PlanTerraformMigrations ( ctx context . Context , opts upgrade . TerraformUpgradeOptions ) ( bool , error )
2023-08-11 09:18:59 -04:00
ApplyTerraformMigrations ( ctx context . Context , opts upgrade . TerraformUpgradeOptions ) ( terraform . ApplyOutput , error )
2023-08-04 07:53:51 -04:00
CheckTerraformMigrations ( upgradeWorkspace string ) error
CleanUpTerraformMigrations ( upgradeWorkspace string ) error
GetUpgradeID ( ) string
2023-08-11 09:18:59 -04:00
BackupConfigMap ( ctx context . Context , name string ) error
2022-08-29 10:49:44 -04:00
}