package porter_app import ( "fmt" "net/http" "strings" "github.com/porter-dev/porter/api/server/authz" "github.com/porter-dev/porter/api/server/handlers" "github.com/porter-dev/porter/api/server/shared" "github.com/porter-dev/porter/api/server/shared/apierrors" "github.com/porter-dev/porter/api/server/shared/config" "github.com/porter-dev/porter/api/server/shared/requestutils" "github.com/porter-dev/porter/api/types" "github.com/porter-dev/porter/internal/helm" "github.com/porter-dev/porter/internal/models" "github.com/porter-dev/porter/internal/telemetry" "gopkg.in/yaml.v2" ) type RollbackPorterAppHandler struct { handlers.PorterHandlerReadWriter authz.KubernetesAgentGetter } func NewRollbackPorterAppHandler( config *config.Config, decoderValidator shared.RequestDecoderValidator, writer shared.ResultWriter, ) *RollbackPorterAppHandler { return &RollbackPorterAppHandler{ PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer), KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config), } } func (c *RollbackPorterAppHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) { ctx, span := telemetry.NewSpan(r.Context(), "serve-rollback-porter-app") defer span.End() cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster) request := &types.RollbackPorterAppRequest{} if ok := c.DecodeAndValidate(w, r, request); !ok { err := telemetry.Error(ctx, span, nil, "error decoding request") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest)) return } stackName, reqErr := requestutils.GetURLParamString(r, types.URLParamStackName) if reqErr != nil { err := telemetry.Error(ctx, span, reqErr, "error getting stack name from url") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest)) return } telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "stack-name", Value: stackName}) namespace := fmt.Sprintf("porter-stack-%s", stackName) helmAgent, err := c.GetHelmAgent(ctx, r, cluster, namespace) if err != nil { err = telemetry.Error(ctx, span, err, "error getting helm agent") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError)) return } k8sAgent, err := c.GetAgent(r, cluster, namespace) if err != nil { err = telemetry.Error(ctx, span, err, "error getting k8s agent") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError)) return } helmReleaseFromRequestedRevision, err := helmAgent.GetRelease(ctx, stackName, request.Revision, false) if err != nil { err = telemetry.Error(ctx, span, err, "error getting helm release for requested revision") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError)) return } latestHelmRelease, err := helmAgent.GetRelease(ctx, stackName, 0, false) if err != nil { err = telemetry.Error(ctx, span, err, "error getting latest helm release") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError)) return } valuesYaml, err := yaml.Marshal(helmReleaseFromRequestedRevision.Config) if err != nil { err = telemetry.Error(ctx, span, err, "error marshalling helm release config to yaml") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError)) return } imageInfo := attemptToGetImageInfoFromRelease(helmReleaseFromRequestedRevision.Config) if imageInfo.Tag == "" { imageInfo.Tag = "latest" } porterApp, err := c.Repo().PorterApp().ReadPorterAppByName(cluster.ID, stackName) if err != nil { err = telemetry.Error(ctx, span, err, "error getting porter app") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError)) return } injectLauncher := strings.Contains(porterApp.Builder, "heroku") || strings.Contains(porterApp.Builder, "paketo") registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID) if err != nil { err = telemetry.Error(ctx, span, err, "error listing registries") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError)) return } chart, values, _, err := parse( ctx, ParseConf{ ImageInfo: imageInfo, ServerConfig: c.Config(), ProjectID: cluster.ProjectID, Namespace: namespace, SubdomainCreateOpts: SubdomainCreateOpts{ k8sAgent: k8sAgent, dnsRepo: c.Repo().DNSRecord(), powerDnsClient: c.Config().PowerDNSClient, appRootDomain: c.Config().ServerConf.AppRootDomain, stackName: stackName, }, InjectLauncherToStartCommand: injectLauncher, FullHelmValues: string(valuesYaml), }, ) if err != nil { err = telemetry.Error(ctx, span, err, "error parsing helm chart") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError)) return } conf := &helm.InstallChartConfig{ Chart: chart, Name: stackName, Namespace: namespace, Values: values, Cluster: cluster, Repo: c.Repo(), Registries: registries, } _, err = helmAgent.UpgradeInstallChart(ctx, conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection) if err != nil { err = telemetry.Error(ctx, span, err, "error upgrading application") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest)) return } _, err = createPorterAppEvent(ctx, "SUCCESS", porterApp.ID, latestHelmRelease.Version+1, imageInfo.Tag, c.Repo().PorterAppEvent()) if err != nil { err = telemetry.Error(ctx, span, err, "error creating porter app event") c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError)) return } }