2
0

rollback.go 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. package porter_app
  2. import (
  3. "net/http"
  4. "strings"
  5. "github.com/porter-dev/porter/api/server/authz"
  6. "github.com/porter-dev/porter/api/server/handlers"
  7. "github.com/porter-dev/porter/api/server/shared"
  8. "github.com/porter-dev/porter/api/server/shared/apierrors"
  9. "github.com/porter-dev/porter/api/server/shared/config"
  10. "github.com/porter-dev/porter/api/server/shared/features"
  11. "github.com/porter-dev/porter/api/server/shared/requestutils"
  12. "github.com/porter-dev/porter/api/types"
  13. utils "github.com/porter-dev/porter/api/utils/porter_app"
  14. "github.com/porter-dev/porter/internal/helm"
  15. "github.com/porter-dev/porter/internal/models"
  16. "github.com/porter-dev/porter/internal/telemetry"
  17. "gopkg.in/yaml.v2"
  18. )
  19. type RollbackPorterAppHandler struct {
  20. handlers.PorterHandlerReadWriter
  21. authz.KubernetesAgentGetter
  22. }
  23. func NewRollbackPorterAppHandler(
  24. config *config.Config,
  25. decoderValidator shared.RequestDecoderValidator,
  26. writer shared.ResultWriter,
  27. ) *RollbackPorterAppHandler {
  28. return &RollbackPorterAppHandler{
  29. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  30. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  31. }
  32. }
  33. func (c *RollbackPorterAppHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  34. ctx, span := telemetry.NewSpan(r.Context(), "serve-rollback-porter-app")
  35. defer span.End()
  36. cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster)
  37. request := &types.RollbackPorterAppRequest{}
  38. if ok := c.DecodeAndValidate(w, r, request); !ok {
  39. err := telemetry.Error(ctx, span, nil, "error decoding request")
  40. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  41. return
  42. }
  43. appName, reqErr := requestutils.GetURLParamString(r, types.URLParamPorterAppName)
  44. if reqErr != nil {
  45. err := telemetry.Error(ctx, span, reqErr, "error getting stack name from url")
  46. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  47. return
  48. }
  49. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "stack-name", Value: appName})
  50. namespace := utils.NamespaceFromPorterAppName(appName)
  51. helmAgent, err := c.GetHelmAgent(ctx, r, cluster, namespace)
  52. if err != nil {
  53. err = telemetry.Error(ctx, span, err, "error getting helm agent")
  54. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  55. return
  56. }
  57. k8sAgent, err := c.GetAgent(r, cluster, namespace)
  58. if err != nil {
  59. err = telemetry.Error(ctx, span, err, "error getting k8s agent")
  60. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  61. return
  62. }
  63. helmReleaseFromRequestedRevision, err := helmAgent.GetRelease(ctx, appName, request.Revision, false)
  64. if err != nil {
  65. err = telemetry.Error(ctx, span, err, "error getting helm release for requested revision")
  66. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  67. return
  68. }
  69. latestHelmRelease, err := helmAgent.GetRelease(ctx, appName, 0, false)
  70. if err != nil {
  71. err = telemetry.Error(ctx, span, err, "error getting latest helm release")
  72. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  73. return
  74. }
  75. valuesYaml, err := yaml.Marshal(helmReleaseFromRequestedRevision.Config)
  76. if err != nil {
  77. err = telemetry.Error(ctx, span, err, "error marshalling helm release config to yaml")
  78. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  79. return
  80. }
  81. imageInfo := attemptToGetImageInfoFromRelease(helmReleaseFromRequestedRevision.Config)
  82. if imageInfo.Tag == "" {
  83. imageInfo.Tag = "latest"
  84. }
  85. porterApp, err := c.Repo().PorterApp().ReadPorterAppByName(cluster.ID, appName)
  86. if err != nil {
  87. err = telemetry.Error(ctx, span, err, "error getting porter app")
  88. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  89. return
  90. }
  91. injectLauncher := strings.Contains(porterApp.Builder, "heroku") ||
  92. strings.Contains(porterApp.Builder, "paketo")
  93. registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  94. if err != nil {
  95. err = telemetry.Error(ctx, span, err, "error listing registries")
  96. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  97. return
  98. }
  99. chart, values, _, err := parse(
  100. ctx,
  101. ParseConf{
  102. PorterAppName: appName,
  103. ImageInfo: imageInfo,
  104. ServerConfig: c.Config(),
  105. ProjectID: cluster.ProjectID,
  106. Namespace: namespace,
  107. SubdomainCreateOpts: SubdomainCreateOpts{
  108. k8sAgent: k8sAgent,
  109. dnsRepo: c.Repo().DNSRecord(),
  110. dnsClient: c.Config().DNSClient,
  111. appRootDomain: c.Config().ServerConf.AppRootDomain,
  112. stackName: appName,
  113. },
  114. InjectLauncherToStartCommand: injectLauncher,
  115. FullHelmValues: string(valuesYaml),
  116. },
  117. )
  118. if err != nil {
  119. err = telemetry.Error(ctx, span, err, "error parsing helm chart")
  120. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  121. return
  122. }
  123. conf := &helm.InstallChartConfig{
  124. Chart: chart,
  125. Name: appName,
  126. Namespace: namespace,
  127. Values: values,
  128. Cluster: cluster,
  129. Repo: c.Repo(),
  130. Registries: registries,
  131. }
  132. _, err = helmAgent.UpgradeInstallChart(ctx, conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection)
  133. if err != nil {
  134. err = telemetry.Error(ctx, span, err, "error upgrading application")
  135. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  136. return
  137. }
  138. if features.AreAgentDeployEventsEnabled(k8sAgent) {
  139. serviceDeploymentStatusMap := getServiceDeploymentMetadataFromValues(values, types.PorterAppEventStatus_Progressing)
  140. _, err = createNewPorterAppDeployEvent(ctx, serviceDeploymentStatusMap, porterApp.ID, latestHelmRelease.Version+1, imageInfo.Tag, c.Repo().PorterAppEvent())
  141. } else {
  142. _, err = createOldPorterAppDeployEvent(ctx, types.PorterAppEventStatus_Success, porterApp.ID, latestHelmRelease.Version+1, imageInfo.Tag, c.Repo().PorterAppEvent())
  143. }
  144. if err != nil {
  145. err = telemetry.Error(ctx, span, err, "error creating porter app event")
  146. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  147. return
  148. }
  149. }