-
Notifications
You must be signed in to change notification settings - Fork 173
/
delete.go
172 lines (144 loc) · 4.99 KB
/
delete.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
// Copyright 2016-2017 VMware, Inc. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package delete
import (
"context"
"time"
"gopkg.in/urfave/cli.v1"
"github.com/vmware/vic/cmd/vic-machine/common"
"github.com/vmware/vic/lib/install/data"
"github.com/vmware/vic/lib/install/management"
"github.com/vmware/vic/lib/install/validate"
"github.com/vmware/vic/pkg/errors"
"github.com/vmware/vic/pkg/trace"
"github.com/vmware/vic/pkg/version"
"github.com/vmware/vic/pkg/vsphere/vm"
)
// Delete has all input parameters for vic-machine delete command
type Uninstall struct {
*data.Data
executor *management.Dispatcher
}
func NewUninstall() *Uninstall {
d := &Uninstall{}
d.Data = data.NewData()
return d
}
// Flags return all cli flags for delete
func (d *Uninstall) Flags() []cli.Flag {
util := []cli.Flag{
cli.BoolFlag{
Name: "force, f",
Usage: "Force the deletion",
Destination: &d.Force,
},
cli.DurationFlag{
Name: "timeout",
Value: 3 * time.Minute,
Usage: "Time to wait for delete",
Destination: &d.Timeout,
},
}
target := d.TargetFlags()
id := d.IDFlags()
compute := d.ComputeFlags()
debug := d.DebugFlags(true)
// flag arrays are declared, now combined
var flags []cli.Flag
for _, f := range [][]cli.Flag{target, id, compute, util, debug} {
flags = append(flags, f...)
}
return flags
}
func (d *Uninstall) processParams(op trace.Operation) error {
defer trace.End(trace.Begin("", op))
if err := d.HasCredentials(op); err != nil {
return err
}
return nil
}
func (d *Uninstall) Run(clic *cli.Context) (err error) {
op := common.NewOperation(clic, d.Debug.Debug)
defer func() {
// urfave/cli will print out exit in error handling, so no more information in main method can be printed out.
err = common.LogErrorIfAny(op, clic, err)
}()
op, cancel := trace.WithTimeout(&op, d.Timeout, clic.App.Name)
defer cancel()
defer func() {
if op.Err() != nil && op.Err() == context.DeadlineExceeded {
//context deadline exceeded, replace returned error message
err = errors.Errorf("Delete timed out: use --timeout to add more time")
}
}()
if err = d.processParams(op); err != nil {
return err
}
if len(clic.Args()) > 0 {
op.Errorf("Unknown argument: %s", clic.Args()[0])
return errors.New("invalid CLI arguments")
}
op.Infof("### Removing VCH ####")
validator, err := validate.NewValidator(op, d.Data)
if err != nil {
op.Errorf("Delete cannot continue - failed to create validator: %s", err)
return errors.New("delete failed")
}
defer validator.Session.Logout(op)
_, err = validator.ValidateTarget(op, d.Data)
if err != nil {
op.Errorf("Delete cannot continue - target validation failed: %s", err)
return errors.New("delete failed")
}
executor := management.NewDispatcher(validator.Context, validator.Session, management.DeleteAction, d.Force)
var vch *vm.VirtualMachine
if d.Data.ID != "" {
vch, err = executor.NewVCHFromID(d.Data.ID)
} else {
vch, err = executor.NewVCHFromComputePath(d.Data.ComputeResourcePath, d.Data.DisplayName, validator)
}
if err != nil {
op.Errorf("Failed to get Virtual Container Host %s", d.DisplayName)
op.Error(err)
return errors.New("delete failed")
}
op.Infof("")
op.Infof("VCH ID: %s", vch.Reference().String())
vchConfig, err := executor.GetNoSecretVCHConfig(vch)
if err != nil {
op.Error("Failed to get Virtual Container Host configuration")
op.Error(err)
return errors.New("delete failed")
}
// compare vch version and vic-machine version
installerBuild := version.GetBuild()
if vchConfig.Version == nil || !installerBuild.Equal(vchConfig.Version) {
if !d.Data.Force {
op.Errorf("VCH version %q is different than installer version %s. Upgrade VCH before deleting or specify --force to force delete", vchConfig.Version.ShortVersion(), installerBuild.ShortVersion())
return errors.New("delete failed")
}
op.Warnf("VCH version %q is different than installer version %s. Force delete will attempt to remove everything related to the installed VCH", vchConfig.Version.ShortVersion(), installerBuild.ShortVersion())
}
if err = executor.DeleteVCH(vchConfig, nil, nil); err != nil {
executor.CollectDiagnosticLogs()
op.Errorf("%s", err)
return errors.New("delete failed")
}
op.Info("----------")
op.Info("If firewall changes were made for VIC during install, they were not reverted during delete")
op.Info("To modify firewall rules see vic-machine update firewall --help")
op.Info("----------")
op.Info("Completed successfully")
return nil
}