upgrade.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248
  1. package release
  2. import (
  3. "fmt"
  4. "net/http"
  5. "net/url"
  6. semver "github.com/Masterminds/semver/v3"
  7. "github.com/porter-dev/porter/api/server/authz"
  8. "github.com/porter-dev/porter/api/server/handlers"
  9. "github.com/porter-dev/porter/api/server/shared"
  10. "github.com/porter-dev/porter/api/server/shared/apierrors"
  11. "github.com/porter-dev/porter/api/server/shared/config"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/helm"
  14. "github.com/porter-dev/porter/internal/integrations/slack"
  15. "github.com/porter-dev/porter/internal/models"
  16. "github.com/porter-dev/porter/internal/stacks"
  17. "helm.sh/helm/v3/pkg/release"
  18. )
  19. var (
  20. createEnvSecretConstraint, _ = semver.NewConstraint(" < 0.1.0")
  21. )
  22. type UpgradeReleaseHandler struct {
  23. handlers.PorterHandlerReadWriter
  24. authz.KubernetesAgentGetter
  25. }
  26. func NewUpgradeReleaseHandler(
  27. config *config.Config,
  28. decoderValidator shared.RequestDecoderValidator,
  29. writer shared.ResultWriter,
  30. ) *UpgradeReleaseHandler {
  31. return &UpgradeReleaseHandler{
  32. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  33. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  34. }
  35. }
  36. func (c *UpgradeReleaseHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  37. user, _ := r.Context().Value(types.UserScope).(*models.User)
  38. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  39. helmRelease, _ := r.Context().Value(types.ReleaseScope).(*release.Release)
  40. helmAgent, err := c.GetHelmAgent(r, cluster, "")
  41. if err != nil {
  42. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  43. return
  44. }
  45. request := &types.UpgradeReleaseRequest{}
  46. if ok := c.DecodeAndValidate(w, r, request); !ok {
  47. return
  48. }
  49. registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  50. if err != nil {
  51. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  52. return
  53. }
  54. conf := &helm.UpgradeReleaseConfig{
  55. Name: helmRelease.Name,
  56. Cluster: cluster,
  57. Repo: c.Repo(),
  58. Registries: registries,
  59. }
  60. // if the chart version is set, load a chart from the repo
  61. if request.ChartVersion != "" {
  62. cache := c.Config().URLCache
  63. chartRepoURL, foundFirst := cache.GetURL(helmRelease.Chart.Metadata.Name)
  64. if !foundFirst {
  65. cache.Update()
  66. var found bool
  67. chartRepoURL, found = cache.GetURL(helmRelease.Chart.Metadata.Name)
  68. if !found {
  69. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  70. fmt.Errorf("chart not found"),
  71. http.StatusBadRequest,
  72. ))
  73. return
  74. }
  75. }
  76. chart, err := LoadChart(c.Config(), &LoadAddonChartOpts{
  77. ProjectID: cluster.ProjectID,
  78. RepoURL: chartRepoURL,
  79. TemplateName: helmRelease.Chart.Metadata.Name,
  80. TemplateVersion: request.ChartVersion,
  81. })
  82. if err != nil {
  83. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  84. return
  85. }
  86. if err != nil {
  87. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  88. fmt.Errorf("chart not found"),
  89. http.StatusBadRequest,
  90. ))
  91. return
  92. }
  93. conf.Chart = chart
  94. }
  95. newHelmRelease, upgradeErr := helmAgent.UpgradeRelease(conf, request.Values, c.Config().DOConf)
  96. if upgradeErr == nil && newHelmRelease != nil {
  97. helmRelease = newHelmRelease
  98. }
  99. slackInts, _ := c.Repo().SlackIntegration().ListSlackIntegrationsByProjectID(cluster.ProjectID)
  100. rel, releaseErr := c.Repo().Release().ReadRelease(cluster.ID, helmRelease.Name, helmRelease.Namespace)
  101. var notifConf *types.NotificationConfig
  102. notifConf = nil
  103. if rel != nil && rel.NotificationConfig != 0 {
  104. conf, err := c.Repo().NotificationConfig().ReadNotificationConfig(rel.NotificationConfig)
  105. if err != nil {
  106. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  107. return
  108. }
  109. notifConf = conf.ToNotificationConfigType()
  110. }
  111. notifier := slack.NewSlackNotifier(notifConf, slackInts...)
  112. notifyOpts := &slack.NotifyOpts{
  113. ProjectID: cluster.ProjectID,
  114. ClusterID: cluster.ID,
  115. ClusterName: cluster.Name,
  116. Name: helmRelease.Name,
  117. Namespace: helmRelease.Namespace,
  118. URL: fmt.Sprintf(
  119. "%s/applications/%s/%s/%s?project_id=%d",
  120. c.Config().ServerConf.ServerURL,
  121. url.PathEscape(cluster.Name),
  122. helmRelease.Namespace,
  123. helmRelease.Name,
  124. cluster.ProjectID,
  125. ),
  126. }
  127. if upgradeErr != nil {
  128. notifyOpts.Status = slack.StatusHelmFailed
  129. notifyOpts.Info = upgradeErr.Error()
  130. if !cluster.NotificationsDisabled {
  131. notifier.Notify(notifyOpts)
  132. }
  133. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  134. upgradeErr,
  135. http.StatusBadRequest,
  136. ))
  137. return
  138. }
  139. if helmRelease.Chart != nil && helmRelease.Chart.Metadata.Name != "job" {
  140. notifyOpts.Status = slack.StatusHelmDeployed
  141. notifyOpts.Version = helmRelease.Version
  142. if !cluster.NotificationsDisabled {
  143. notifier.Notify(notifyOpts)
  144. }
  145. }
  146. // update the github actions env if the release exists and is built from source
  147. if cName := helmRelease.Chart.Metadata.Name; cName == "job" || cName == "web" || cName == "worker" {
  148. if releaseErr == nil && rel != nil {
  149. err = UpdateReleaseRepo(c.Config(), rel, helmRelease)
  150. if err != nil {
  151. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  152. return
  153. }
  154. gitAction := rel.GitActionConfig
  155. if gitAction != nil && gitAction.ID != 0 && gitAction.GitlabIntegrationID == 0 {
  156. gaRunner, err := GetGARunner(
  157. c.Config(),
  158. user.ID,
  159. cluster.ProjectID,
  160. cluster.ID,
  161. rel.GitActionConfig,
  162. helmRelease.Name,
  163. helmRelease.Namespace,
  164. rel,
  165. helmRelease,
  166. )
  167. if err != nil {
  168. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  169. return
  170. }
  171. actionVersion, err := semver.NewVersion(gaRunner.Version)
  172. if err != nil {
  173. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  174. return
  175. }
  176. if createEnvSecretConstraint.Check(actionVersion) {
  177. if err := gaRunner.CreateEnvSecret(); err != nil {
  178. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  179. return
  180. }
  181. }
  182. }
  183. }
  184. }
  185. c.WriteResult(w, r, nil)
  186. err = postUpgrade(c.Config(), cluster.ProjectID, cluster.ID, helmRelease)
  187. if err != nil {
  188. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(err))
  189. return
  190. }
  191. }
  192. // postUpgrade runs any necessary scripting after the release has been upgraded.
  193. func postUpgrade(config *config.Config, projectID, clusterID uint, release *release.Release) error {
  194. // update the relevant helm revision number if tied to a stack resource
  195. return stacks.UpdateHelmRevision(config, projectID, clusterID, release)
  196. }