|
|
@@ -0,0 +1,158 @@
|
|
|
+package porter_app
|
|
|
+
|
|
|
+import (
|
|
|
+ "net/http"
|
|
|
+
|
|
|
+ "connectrpc.com/connect"
|
|
|
+ porterv1 "github.com/porter-dev/api-contracts/generated/go/porter/v1"
|
|
|
+ "github.com/porter-dev/porter/api/server/authz"
|
|
|
+ "github.com/porter-dev/porter/api/server/handlers"
|
|
|
+ "github.com/porter-dev/porter/api/server/shared"
|
|
|
+ "github.com/porter-dev/porter/api/server/shared/apierrors"
|
|
|
+ "github.com/porter-dev/porter/api/server/shared/config"
|
|
|
+ "github.com/porter-dev/porter/api/types"
|
|
|
+ "github.com/porter-dev/porter/internal/models"
|
|
|
+ "github.com/porter-dev/porter/internal/telemetry"
|
|
|
+)
|
|
|
+
|
|
|
+// AttachEnvGroupHandler is the handler for the /apps/attach-env-group endpoint
|
|
|
+type AttachEnvGroupHandler struct {
|
|
|
+ handlers.PorterHandlerReadWriter
|
|
|
+ authz.KubernetesAgentGetter
|
|
|
+}
|
|
|
+
|
|
|
+// NewAttachEnvGroupHandler handles POST requests to the endpoint /apps/attach-env-group
|
|
|
+func NewAttachEnvGroupHandler(
|
|
|
+ config *config.Config,
|
|
|
+ decoderValidator shared.RequestDecoderValidator,
|
|
|
+ writer shared.ResultWriter,
|
|
|
+) *AttachEnvGroupHandler {
|
|
|
+ return &AttachEnvGroupHandler{
|
|
|
+ PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
|
|
|
+ KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+// AttachEnvGroupRequest is the request object for the /apps/attach-env-group endpoint
|
|
|
+type AttachEnvGroupRequest struct {
|
|
|
+ EnvGroupName string `json:"env_group_name"`
|
|
|
+ AppInstanceIDs []string `json:"app_instance_ids"`
|
|
|
+}
|
|
|
+
|
|
|
+// ServeHTTP translates the request into a AttachEnvGroup request, then calls update on the app with the env group
|
|
|
+// The latest version of the env group will be attached (ccp makes sure of that)
|
|
|
+func (c *AttachEnvGroupHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
|
+ ctx, span := telemetry.NewSpan(r.Context(), "serve-attach-env-group")
|
|
|
+ defer span.End()
|
|
|
+
|
|
|
+ project, _ := ctx.Value(types.ProjectScope).(*models.Project)
|
|
|
+
|
|
|
+ request := &AttachEnvGroupRequest{}
|
|
|
+ if ok := c.DecodeAndValidate(w, r, request); !ok {
|
|
|
+ err := telemetry.Error(ctx, span, nil, "error decoding request")
|
|
|
+ c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "env-group-name", Value: request.EnvGroupName})
|
|
|
+
|
|
|
+ usingUpdateLogic := project.GetFeatureFlag(models.BetaFeaturesEnabled, c.Config().LaunchDarklyClient)
|
|
|
+ telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "using-update-logic", Value: usingUpdateLogic})
|
|
|
+
|
|
|
+ if request.EnvGroupName == "" {
|
|
|
+ err := telemetry.Error(ctx, span, nil, "env group name cannot be empty")
|
|
|
+ c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ for _, appInstanceId := range request.AppInstanceIDs {
|
|
|
+ appInstance, err := c.Repo().AppInstance().Get(ctx, appInstanceId)
|
|
|
+ if err != nil {
|
|
|
+ telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "app-instance-id", Value: appInstanceId})
|
|
|
+ err := telemetry.Error(ctx, span, err, "error getting app instance")
|
|
|
+ c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ // TODO: delete second branch once all projects are on update flow
|
|
|
+ if usingUpdateLogic {
|
|
|
+ updateReq := connect.NewRequest(&porterv1.UpdateAppRequest{
|
|
|
+ ProjectId: int64(project.ID),
|
|
|
+ DeploymentTargetIdentifier: &porterv1.DeploymentTargetIdentifier{
|
|
|
+ Id: appInstance.DeploymentTargetID.String(),
|
|
|
+ },
|
|
|
+ App: &porterv1.PorterApp{
|
|
|
+ Name: appInstance.Name,
|
|
|
+ EnvGroups: []*porterv1.EnvGroup{
|
|
|
+ {
|
|
|
+ Name: request.EnvGroupName,
|
|
|
+ },
|
|
|
+ },
|
|
|
+ },
|
|
|
+ })
|
|
|
+
|
|
|
+ _, err = c.Config().ClusterControlPlaneClient.UpdateApp(ctx, updateReq)
|
|
|
+ if err != nil {
|
|
|
+ telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "app-instance-id", Value: appInstanceId})
|
|
|
+ err := telemetry.Error(ctx, span, err, "error calling ccp update app")
|
|
|
+ c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
|
|
|
+ return
|
|
|
+ }
|
|
|
+ } else {
|
|
|
+ validateReq := connect.NewRequest(&porterv1.ValidatePorterAppRequest{
|
|
|
+ ProjectId: int64(project.ID),
|
|
|
+ DeploymentTargetId: appInstance.DeploymentTargetID.String(),
|
|
|
+ App: &porterv1.PorterApp{
|
|
|
+ Name: appInstance.Name,
|
|
|
+ EnvGroups: []*porterv1.EnvGroup{
|
|
|
+ {
|
|
|
+ Name: request.EnvGroupName,
|
|
|
+ },
|
|
|
+ },
|
|
|
+ },
|
|
|
+ })
|
|
|
+ ccpResp, err := c.Config().ClusterControlPlaneClient.ValidatePorterApp(ctx, validateReq)
|
|
|
+ if err != nil {
|
|
|
+ telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "app-instance-id", Value: appInstanceId})
|
|
|
+ err := telemetry.Error(ctx, span, err, "error calling ccp validate porter app")
|
|
|
+ c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ if ccpResp == nil {
|
|
|
+ telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "app-instance-id", Value: appInstanceId})
|
|
|
+ err := telemetry.Error(ctx, span, err, "ccp resp is nil")
|
|
|
+ c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
|
|
|
+ return
|
|
|
+ }
|
|
|
+ if ccpResp.Msg == nil {
|
|
|
+ telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "app-instance-id", Value: appInstanceId})
|
|
|
+ err := telemetry.Error(ctx, span, err, "ccp resp msg is nil")
|
|
|
+ c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ if ccpResp.Msg.App == nil {
|
|
|
+ telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "app-instance-id", Value: appInstanceId})
|
|
|
+ err := telemetry.Error(ctx, span, err, "ccp resp app is nil")
|
|
|
+ c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
|
|
|
+ return
|
|
|
+ }
|
|
|
+
|
|
|
+ applyReq := connect.NewRequest(&porterv1.ApplyPorterAppRequest{
|
|
|
+ ProjectId: int64(project.ID),
|
|
|
+ DeploymentTargetId: appInstance.DeploymentTargetID.String(),
|
|
|
+ App: ccpResp.Msg.App,
|
|
|
+ })
|
|
|
+ _, err = c.Config().ClusterControlPlaneClient.ApplyPorterApp(ctx, applyReq)
|
|
|
+ if err != nil {
|
|
|
+ telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "app-instance-id", Value: appInstanceId})
|
|
|
+ err := telemetry.Error(ctx, span, err, "error calling ccp apply porter app")
|
|
|
+ c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
|
|
|
+ return
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ c.WriteResult(w, r, nil)
|
|
|
+}
|