2
0

install_agent.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188
  1. package cluster
  2. import (
  3. "context"
  4. "fmt"
  5. "net/http"
  6. "github.com/porter-dev/porter/api/server/authz"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/types"
  12. "github.com/porter-dev/porter/internal/auth/token"
  13. "github.com/porter-dev/porter/internal/helm"
  14. "github.com/porter-dev/porter/internal/helm/loader"
  15. "github.com/porter-dev/porter/internal/kubernetes"
  16. "github.com/porter-dev/porter/internal/models"
  17. v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  18. )
  19. const (
  20. monitoringNodeLabel = "porter.run/workload-kind=monitoring"
  21. olderAgentLabel = "control-plane=controller-manager"
  22. )
  23. type InstallAgentHandler struct {
  24. handlers.PorterHandlerReadWriter
  25. authz.KubernetesAgentGetter
  26. }
  27. func NewInstallAgentHandler(
  28. config *config.Config,
  29. decoderValidator shared.RequestDecoderValidator,
  30. writer shared.ResultWriter,
  31. ) *InstallAgentHandler {
  32. return &InstallAgentHandler{
  33. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  34. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  35. }
  36. }
  37. func (c *InstallAgentHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  38. proj, _ := r.Context().Value(types.ProjectScope).(*models.Project)
  39. user, _ := r.Context().Value(types.UserScope).(*models.User)
  40. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  41. k8sAgent, err := c.GetAgent(r, cluster, "porter-agent-system")
  42. if err != nil {
  43. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  44. return
  45. }
  46. err = checkAndDeleteOlderAgent(k8sAgent)
  47. if err != nil {
  48. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  49. return
  50. }
  51. helmAgent, err := c.GetHelmAgent(r, cluster, "porter-agent-system")
  52. if err != nil {
  53. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  54. return
  55. }
  56. chart, err := loader.LoadChartPublic(c.Config().ServerConf.DefaultAddonHelmRepoURL, "porter-agent", "")
  57. if err != nil {
  58. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  59. return
  60. }
  61. // create namespace if not exists
  62. _, err = helmAgent.K8sAgent.CreateNamespace("porter-agent-system")
  63. if err != nil {
  64. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  65. return
  66. }
  67. // add api token to values
  68. jwt, err := token.GetTokenForAPI(user.ID, proj.ID)
  69. if err != nil {
  70. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  71. return
  72. }
  73. encoded, err := jwt.EncodeToken(c.Config().TokenConf)
  74. if err != nil {
  75. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  76. return
  77. }
  78. porterAgentValues := map[string]interface{}{
  79. "agent": map[string]interface{}{
  80. "image": "public.ecr.aws/o1j4x7p4/porter-agent:latest",
  81. "porterHost": c.Config().ServerConf.ServerURL,
  82. "porterPort": "443",
  83. "porterToken": encoded,
  84. "privateRegistry": map[string]interface{}{
  85. "enabled": false,
  86. },
  87. "clusterID": fmt.Sprintf("%d", cluster.ID),
  88. "projectID": fmt.Sprintf("%d", proj.ID),
  89. },
  90. "loki": map[string]interface{}{
  91. "nodeSelector": map[string]interface{}{
  92. "porter.run/workload-kind": "monitoring",
  93. },
  94. "tolerations": []map[string]interface{}{
  95. {
  96. "key": "porter.run/workload-kind",
  97. "operator": "Equal",
  98. "value": "monitoring",
  99. "effect": "NoSchedule",
  100. },
  101. },
  102. },
  103. }
  104. conf := &helm.InstallChartConfig{
  105. Chart: chart,
  106. Name: "porter-agent",
  107. Namespace: "porter-agent-system",
  108. Cluster: cluster,
  109. Repo: c.Repo(),
  110. Values: porterAgentValues,
  111. }
  112. _, err = helmAgent.InstallChart(conf, c.Config().DOConf)
  113. if err != nil {
  114. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  115. fmt.Errorf("error installing porter-agent: %w", err), http.StatusBadRequest,
  116. ))
  117. return
  118. }
  119. w.WriteHeader(http.StatusOK)
  120. }
  121. func checkAndDeleteOlderAgent(k8sAgent *kubernetes.Agent) error {
  122. namespaceList, err := k8sAgent.Clientset.CoreV1().Namespaces().List(context.Background(), v1.ListOptions{})
  123. if err != nil {
  124. return fmt.Errorf("error listing namespaces: %w", err)
  125. }
  126. nsExists := false
  127. for _, namespace := range namespaceList.Items {
  128. if namespace.Name == "porter-agent-system" {
  129. nsExists = true
  130. break
  131. }
  132. }
  133. if !nsExists {
  134. return nil
  135. }
  136. podList, err := k8sAgent.Clientset.CoreV1().Pods("porter-agent-system").List(context.Background(), v1.ListOptions{
  137. LabelSelector: olderAgentLabel,
  138. })
  139. if err != nil {
  140. return fmt.Errorf("error listing pods for older porter-agent: %w", err)
  141. }
  142. if len(podList.Items) > 0 {
  143. // older porter-agent exists, delete the entire namespace
  144. err := k8sAgent.Clientset.CoreV1().Namespaces().Delete(
  145. context.Background(), "porter-agent-system", v1.DeleteOptions{},
  146. )
  147. if err != nil {
  148. return fmt.Errorf("error deleting older porter-agent's namespace: %w", err)
  149. }
  150. }
  151. return nil
  152. }