upgrade_webhook.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219
  1. package release
  2. import (
  3. "context"
  4. "fmt"
  5. "net/http"
  6. "net/url"
  7. "github.com/porter-dev/porter/api/server/authz"
  8. "github.com/porter-dev/porter/api/server/handlers"
  9. "github.com/porter-dev/porter/api/server/shared"
  10. "github.com/porter-dev/porter/api/server/shared/apierrors"
  11. "github.com/porter-dev/porter/api/server/shared/config"
  12. "github.com/porter-dev/porter/api/server/shared/requestutils"
  13. "github.com/porter-dev/porter/api/types"
  14. "github.com/porter-dev/porter/internal/analytics"
  15. "github.com/porter-dev/porter/internal/helm"
  16. "github.com/porter-dev/porter/internal/notifier"
  17. "github.com/porter-dev/porter/internal/notifier/slack"
  18. "gorm.io/gorm"
  19. )
  20. type WebhookHandler struct {
  21. handlers.PorterHandlerReadWriter
  22. authz.KubernetesAgentGetter
  23. }
  24. func NewWebhookHandler(
  25. config *config.Config,
  26. decoderValidator shared.RequestDecoderValidator,
  27. writer shared.ResultWriter,
  28. ) *WebhookHandler {
  29. return &WebhookHandler{
  30. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  31. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  32. }
  33. }
  34. func (c *WebhookHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  35. token, _ := requestutils.GetURLParamString(r, types.URLParamToken)
  36. // retrieve release by token
  37. release, err := c.Repo().Release().ReadReleaseByWebhookToken(token)
  38. if err != nil {
  39. if err == gorm.ErrRecordNotFound {
  40. // throw forbidden error, since we don't want a way to verify if webhooks exist
  41. c.HandleAPIError(w, r, apierrors.NewErrForbidden(
  42. fmt.Errorf("release not found with given webhook"),
  43. ))
  44. return
  45. }
  46. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  47. return
  48. }
  49. cluster, err := c.Repo().Cluster().ReadCluster(release.ProjectID, release.ClusterID)
  50. if err != nil {
  51. if err == gorm.ErrRecordNotFound {
  52. // throw forbidden error, since we don't want a way to verify if the cluster and project
  53. // still exist for a cluster that's been deleted
  54. c.HandleAPIError(w, r, apierrors.NewErrForbidden(
  55. fmt.Errorf("cluster %d in project %d not found for upgrade webhook", release.ClusterID, release.ProjectID),
  56. ))
  57. return
  58. }
  59. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  60. return
  61. }
  62. // in this case, we retrieve the agent by passing in the namespace field directly, since
  63. // it cannot be detected from the URL
  64. helmAgent, err := c.GetHelmAgent(r.Context(), r, cluster, release.Namespace)
  65. if err != nil {
  66. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  67. return
  68. }
  69. request := &types.WebhookRequest{}
  70. if ok := c.DecodeAndValidate(w, r, request); !ok {
  71. return
  72. }
  73. rel, err := helmAgent.GetRelease(context.Background(), release.Name, 0, true)
  74. if err != nil {
  75. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  76. return
  77. }
  78. // repository is set to current repository by default
  79. repository := rel.Config["image"].(map[string]interface{})["repository"]
  80. currTag := rel.Config["image"].(map[string]interface{})["tag"]
  81. gitAction := release.GitActionConfig
  82. if gitAction != nil && gitAction.ID != 0 && (repository == "porterdev/hello-porter" || repository == "public.ecr.aws/o1j4x7p4/hello-porter") {
  83. repository = gitAction.ImageRepoURI
  84. } else if gitAction != nil && gitAction.ID != 0 && (repository == "porterdev/hello-porter-job" || repository == "public.ecr.aws/o1j4x7p4/hello-porter-job") {
  85. repository = gitAction.ImageRepoURI
  86. }
  87. image := map[string]interface{}{}
  88. image["repository"] = repository
  89. image["tag"] = request.Commit
  90. if request.Commit == "" {
  91. image["tag"] = currTag
  92. }
  93. rel.Config["image"] = image
  94. if rel.Config["auto_deploy"] == false {
  95. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  96. fmt.Errorf("Deploy webhook is disabled for this deployment."),
  97. http.StatusBadRequest,
  98. ))
  99. return
  100. }
  101. registries, err := c.Repo().Registry().ListRegistriesByProjectID(release.ProjectID)
  102. if err != nil {
  103. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  104. return
  105. }
  106. conf := &helm.UpgradeReleaseConfig{
  107. Name: release.Name,
  108. Cluster: cluster,
  109. Repo: c.Repo(),
  110. Registries: registries,
  111. Values: rel.Config,
  112. }
  113. slackInts, _ := c.Repo().SlackIntegration().ListSlackIntegrationsByProjectID(release.ProjectID)
  114. var notifConf *types.NotificationConfig
  115. notifConf = nil
  116. if release != nil && release.NotificationConfig != 0 {
  117. conf, err := c.Repo().NotificationConfig().ReadNotificationConfig(release.NotificationConfig)
  118. if err != nil {
  119. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  120. return
  121. }
  122. notifConf = conf.ToNotificationConfigType()
  123. }
  124. deplNotifier := slack.NewDeploymentNotifier(notifConf, slackInts...)
  125. notifyOpts := &notifier.NotifyOpts{
  126. ProjectID: release.ProjectID,
  127. ClusterID: cluster.ID,
  128. ClusterName: cluster.Name,
  129. Name: rel.Name,
  130. Namespace: rel.Namespace,
  131. URL: fmt.Sprintf(
  132. "%s/applications/%s/%s/%s?project_id=%d",
  133. c.Config().ServerConf.ServerURL,
  134. url.PathEscape(cluster.Name),
  135. release.Namespace,
  136. rel.Name,
  137. cluster.ProjectID,
  138. ),
  139. }
  140. rel, err = helmAgent.UpgradeReleaseByValues(context.Background(), conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection, false)
  141. if err != nil {
  142. notifyOpts.Status = notifier.StatusHelmFailed
  143. notifyOpts.Info = err.Error()
  144. if !cluster.NotificationsDisabled {
  145. deplNotifier.Notify(notifyOpts)
  146. }
  147. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  148. err,
  149. http.StatusBadRequest,
  150. ))
  151. return
  152. }
  153. if rel.Chart != nil && rel.Chart.Metadata.Name != "job" {
  154. notifyOpts.Status = notifier.StatusHelmDeployed
  155. notifyOpts.Version = rel.Version
  156. if !cluster.NotificationsDisabled {
  157. deplNotifier.Notify(notifyOpts)
  158. }
  159. }
  160. c.Config().AnalyticsClient.Track(analytics.ApplicationDeploymentWebhookTrack(&analytics.ApplicationDeploymentWebhookTrackOpts{
  161. ImageURI: fmt.Sprintf("%v", repository),
  162. ApplicationScopedTrackOpts: analytics.GetApplicationScopedTrackOpts(
  163. 0,
  164. release.ProjectID,
  165. release.ClusterID,
  166. release.Name,
  167. release.Namespace,
  168. rel.Chart.Metadata.Name,
  169. ),
  170. }))
  171. c.WriteResult(w, r, nil)
  172. err = postUpgrade(c.Config(), cluster.ProjectID, cluster.ID, rel)
  173. if err != nil {
  174. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(err))
  175. return
  176. }
  177. }