rollback.go 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159
  1. package porter_app
  2. import (
  3. "fmt"
  4. "net/http"
  5. "strings"
  6. "github.com/porter-dev/porter/api/server/authz"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/server/shared/requestutils"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/helm"
  14. "github.com/porter-dev/porter/internal/models"
  15. "github.com/porter-dev/porter/internal/telemetry"
  16. "gopkg.in/yaml.v2"
  17. )
  18. type RollbackPorterAppHandler struct {
  19. handlers.PorterHandlerReadWriter
  20. authz.KubernetesAgentGetter
  21. }
  22. func NewRollbackPorterAppHandler(
  23. config *config.Config,
  24. decoderValidator shared.RequestDecoderValidator,
  25. writer shared.ResultWriter,
  26. ) *RollbackPorterAppHandler {
  27. return &RollbackPorterAppHandler{
  28. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  29. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  30. }
  31. }
  32. func (c *RollbackPorterAppHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  33. ctx, span := telemetry.NewSpan(r.Context(), "serve-rollback-porter-app")
  34. defer span.End()
  35. cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster)
  36. request := &types.RollbackPorterAppRequest{}
  37. if ok := c.DecodeAndValidate(w, r, request); !ok {
  38. err := telemetry.Error(ctx, span, nil, "error decoding request")
  39. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  40. return
  41. }
  42. stackName, reqErr := requestutils.GetURLParamString(r, types.URLParamStackName)
  43. if reqErr != nil {
  44. err := telemetry.Error(ctx, span, reqErr, "error getting stack name from url")
  45. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  46. return
  47. }
  48. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "stack-name", Value: stackName})
  49. namespace := fmt.Sprintf("porter-stack-%s", stackName)
  50. helmAgent, err := c.GetHelmAgent(ctx, r, cluster, namespace)
  51. if err != nil {
  52. err = telemetry.Error(ctx, span, err, "error getting helm agent")
  53. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  54. return
  55. }
  56. k8sAgent, err := c.GetAgent(r, cluster, namespace)
  57. if err != nil {
  58. err = telemetry.Error(ctx, span, err, "error getting k8s agent")
  59. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  60. return
  61. }
  62. helmReleaseFromRequestedRevision, err := helmAgent.GetRelease(ctx, stackName, request.Revision, false)
  63. if err != nil {
  64. err = telemetry.Error(ctx, span, err, "error getting helm release for requested revision")
  65. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  66. return
  67. }
  68. latestHelmRelease, err := helmAgent.GetRelease(ctx, stackName, 0, false)
  69. if err != nil {
  70. err = telemetry.Error(ctx, span, err, "error getting latest helm release")
  71. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  72. return
  73. }
  74. valuesYaml, err := yaml.Marshal(helmReleaseFromRequestedRevision.Config)
  75. if err != nil {
  76. err = telemetry.Error(ctx, span, err, "error marshalling helm release config to yaml")
  77. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  78. return
  79. }
  80. imageInfo := attemptToGetImageInfoFromRelease(helmReleaseFromRequestedRevision.Config)
  81. if imageInfo.Tag == "" {
  82. imageInfo.Tag = "latest"
  83. }
  84. porterApp, err := c.Repo().PorterApp().ReadPorterAppByName(cluster.ID, stackName, 0)
  85. if err != nil {
  86. err = telemetry.Error(ctx, span, err, "error getting porter app")
  87. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  88. return
  89. }
  90. injectLauncher := strings.Contains(porterApp.Builder, "heroku") ||
  91. strings.Contains(porterApp.Builder, "paketo")
  92. registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  93. if err != nil {
  94. err = telemetry.Error(ctx, span, err, "error listing registries")
  95. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  96. return
  97. }
  98. chart, values, _, err := parse(
  99. ParseConf{
  100. ImageInfo: imageInfo,
  101. ServerConfig: c.Config(),
  102. ProjectID: cluster.ProjectID,
  103. Namespace: namespace,
  104. SubdomainCreateOpts: SubdomainCreateOpts{
  105. k8sAgent: k8sAgent,
  106. dnsRepo: c.Repo().DNSRecord(),
  107. powerDnsClient: c.Config().PowerDNSClient,
  108. appRootDomain: c.Config().ServerConf.AppRootDomain,
  109. stackName: stackName,
  110. },
  111. InjectLauncherToStartCommand: injectLauncher,
  112. FullHelmValues: string(valuesYaml),
  113. },
  114. )
  115. if err != nil {
  116. err = telemetry.Error(ctx, span, err, "error parsing helm chart")
  117. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  118. return
  119. }
  120. conf := &helm.InstallChartConfig{
  121. Chart: chart,
  122. Name: stackName,
  123. Namespace: namespace,
  124. Values: values,
  125. Cluster: cluster,
  126. Repo: c.Repo(),
  127. Registries: registries,
  128. }
  129. _, err = helmAgent.UpgradeInstallChart(ctx, conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection)
  130. if err != nil {
  131. err = telemetry.Error(ctx, span, err, "error upgrading application")
  132. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  133. return
  134. }
  135. _, err = createPorterAppEvent(ctx, "SUCCESS", porterApp.ID, latestHelmRelease.Version+1, imageInfo.Tag, c.Repo().PorterAppEvent())
  136. if err != nil {
  137. err = telemetry.Error(ctx, span, err, "error creating porter app event")
  138. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  139. return
  140. }
  141. }