| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236 |
- package cmd
- import (
- "context"
- "encoding/json"
- "fmt"
- "io/ioutil"
- "net/url"
- "os"
- "path/filepath"
- "strconv"
- "strings"
- "github.com/cli/cli/git"
- "github.com/fatih/color"
- "github.com/mitchellh/mapstructure"
- api "github.com/porter-dev/porter/api/client"
- "github.com/porter-dev/porter/api/types"
- "github.com/porter-dev/porter/cli/cmd/config"
- "github.com/porter-dev/porter/cli/cmd/deploy"
- "github.com/porter-dev/porter/cli/cmd/deploy/wait"
- "github.com/porter-dev/porter/cli/cmd/preview"
- previewInt "github.com/porter-dev/porter/internal/integrations/preview"
- "github.com/porter-dev/porter/internal/templater/utils"
- "github.com/porter-dev/switchboard/pkg/drivers"
- switchboardModels "github.com/porter-dev/switchboard/pkg/models"
- "github.com/porter-dev/switchboard/pkg/parser"
- switchboardTypes "github.com/porter-dev/switchboard/pkg/types"
- switchboardWorker "github.com/porter-dev/switchboard/pkg/worker"
- "github.com/rs/zerolog"
- "github.com/spf13/cobra"
- )
- // applyCmd represents the "porter apply" base command when called
- // with a porter.yaml file as an argument
- var applyCmd = &cobra.Command{
- Use: "apply",
- Short: "Applies a configuration to an application",
- Long: fmt.Sprintf(`
- %s
- Applies a configuration to an application by either creating a new one or updating an existing
- one. For example:
- %s
- This command will apply the configuration contained in porter.yaml to the requested project and
- cluster either provided inside the porter.yaml file or through environment variables. Note that
- environment variables will always take precendence over values specified in the porter.yaml file.
- By default, this command expects to be run from a local git repository.
- The following are the environment variables that can be used to set certain values while
- applying a configuration:
- PORTER_CLUSTER Cluster ID that contains the project
- PORTER_PROJECT Project ID that contains the application
- PORTER_NAMESPACE The Kubernetes namespace that the application belongs to
- PORTER_SOURCE_NAME Name of the source Helm chart
- PORTER_SOURCE_REPO The URL of the Helm charts registry
- PORTER_SOURCE_VERSION The version of the Helm chart to use
- PORTER_TAG The Docker image tag to use (like the git commit hash)
- `,
- color.New(color.FgBlue, color.Bold).Sprintf("Help for \"porter apply\":"),
- color.New(color.FgGreen, color.Bold).Sprintf("porter apply -f porter.yaml"),
- ),
- Run: func(cmd *cobra.Command, args []string) {
- err := checkLoginAndRun(args, apply)
- if err != nil {
- if strings.Contains(err.Error(), "Forbidden") {
- color.New(color.FgRed).Fprintf(os.Stderr, "You may have to update your GitHub secret token")
- }
- os.Exit(1)
- }
- },
- }
- // applyValidateCmd represents the "porter apply validate" command when called
- // with a porter.yaml file as an argument
- var applyValidateCmd = &cobra.Command{
- Use: "validate",
- Short: "Validates a porter.yaml",
- Run: func(*cobra.Command, []string) {
- err := applyValidate()
- if err != nil {
- color.New(color.FgRed).Fprintf(os.Stderr, "Error: %s\n", err.Error())
- os.Exit(1)
- } else {
- color.New(color.FgGreen).Printf("The porter.yaml file is valid!\n")
- }
- },
- }
- var porterYAML string
- func init() {
- rootCmd.AddCommand(applyCmd)
- applyCmd.AddCommand(applyValidateCmd)
- applyCmd.PersistentFlags().StringVarP(&porterYAML, "file", "f", "", "path to porter.yaml")
- applyCmd.MarkFlagRequired("file")
- }
- func apply(_ *types.GetAuthenticatedUserResponse, client *api.Client, _ []string) error {
- if _, ok := os.LookupEnv("PORTER_VALIDATE_YAML"); ok {
- err := applyValidate()
- if err != nil {
- return err
- }
- }
- fileBytes, err := ioutil.ReadFile(porterYAML)
- if err != nil {
- return fmt.Errorf("error reading porter.yaml: %w", err)
- }
- resGroup, err := parser.ParseRawBytes(fileBytes)
- if err != nil {
- return fmt.Errorf("error parsing porter.yaml: %w", err)
- }
- basePath, err := os.Getwd()
- if err != nil {
- return fmt.Errorf("error getting working directory: %w", err)
- }
- worker := switchboardWorker.NewWorker()
- worker.RegisterDriver("deploy", NewDeployDriver)
- worker.RegisterDriver("build-image", preview.NewBuildDriver)
- worker.RegisterDriver("push-image", preview.NewPushDriver)
- worker.RegisterDriver("update-config", preview.NewUpdateConfigDriver)
- worker.RegisterDriver("random-string", preview.NewRandomStringDriver)
- worker.RegisterDriver("env-group", preview.NewEnvGroupDriver)
- worker.RegisterDriver("os-env", preview.NewOSEnvDriver)
- worker.SetDefaultDriver("deploy")
- if hasDeploymentHookEnvVars() {
- deplNamespace := os.Getenv("PORTER_NAMESPACE")
- if deplNamespace == "" {
- return fmt.Errorf("namespace must be set by PORTER_NAMESPACE")
- }
- deploymentHook, err := NewDeploymentHook(client, resGroup, deplNamespace)
- if err != nil {
- return fmt.Errorf("error creating deployment hook: %w", err)
- }
- worker.RegisterHook("deployment", deploymentHook)
- }
- cloneEnvGroupHook := NewCloneEnvGroupHook(client, resGroup)
- worker.RegisterHook("cloneenvgroup", cloneEnvGroupHook)
- return worker.Apply(resGroup, &switchboardTypes.ApplyOpts{
- BasePath: basePath,
- })
- }
- func applyValidate() error {
- fileBytes, err := ioutil.ReadFile(porterYAML)
- if err != nil {
- return fmt.Errorf("error reading porter.yaml: %w", err)
- }
- validationErrors := previewInt.Validate(string(fileBytes))
- if len(validationErrors) > 0 {
- errString := "the following error(s) were found while validating the porter.yaml file:"
- for _, err := range validationErrors {
- errString += "\n- " + strings.ReplaceAll(err.Error(), "\n\n*", "\n *")
- }
- return fmt.Errorf(errString)
- }
- return nil
- }
- func hasDeploymentHookEnvVars() bool {
- if ghIDStr := os.Getenv("PORTER_GIT_INSTALLATION_ID"); ghIDStr == "" {
- return false
- }
- if prIDStr := os.Getenv("PORTER_PULL_REQUEST_ID"); prIDStr == "" {
- return false
- }
- if branchFrom := os.Getenv("PORTER_BRANCH_FROM"); branchFrom == "" {
- return false
- }
- if branchInto := os.Getenv("PORTER_BRANCH_INTO"); branchInto == "" {
- return false
- }
- if actionIDStr := os.Getenv("PORTER_ACTION_ID"); actionIDStr == "" {
- return false
- }
- if repoName := os.Getenv("PORTER_REPO_NAME"); repoName == "" {
- return false
- }
- if repoOwner := os.Getenv("PORTER_REPO_OWNER"); repoOwner == "" {
- return false
- }
- if prName := os.Getenv("PORTER_PR_NAME"); prName == "" {
- return false
- }
- return true
- }
- type DeployDriver struct {
- source *previewInt.Source
- target *previewInt.Target
- output map[string]interface{}
- lookupTable *map[string]drivers.Driver
- logger *zerolog.Logger
- }
- func NewDeployDriver(resource *switchboardModels.Resource, opts *drivers.SharedDriverOpts) (drivers.Driver, error) {
- driver := &DeployDriver{
- lookupTable: opts.DriverLookupTable,
- logger: opts.Logger,
- output: make(map[string]interface{}),
- }
- target, err := preview.GetTarget(resource.Name, resource.Target)
- if err != nil {
- return nil, err
- }
- driver.target = target
- source, err := preview.GetSource(target.Project, resource.Name, resource.Source)
- if err != nil {
- return nil, err
- }
- driver.source = source
- return driver, nil
- }
- func (d *DeployDriver) ShouldApply(_ *switchboardModels.Resource) bool {
- return true
- }
- func (d *DeployDriver) Apply(resource *switchboardModels.Resource) (*switchboardModels.Resource, error) {
- client := config.GetAPIClient()
- _, err := client.GetRelease(
- context.Background(),
- d.target.Project,
- d.target.Cluster,
- d.target.Namespace,
- resource.Name,
- )
- shouldCreate := err != nil
- if err != nil {
- color.New(color.FgYellow).Printf("Could not read release %s/%s (%s): attempting creation\n", d.target.Namespace, resource.Name, err.Error())
- }
- if d.source.IsApplication {
- return d.applyApplication(resource, client, shouldCreate)
- }
- return d.applyAddon(resource, client, shouldCreate)
- }
- // Simple apply for addons
- func (d *DeployDriver) applyAddon(resource *switchboardModels.Resource, client *api.Client, shouldCreate bool) (*switchboardModels.Resource, error) {
- addonConfig, err := d.getAddonConfig(resource)
- if err != nil {
- return nil, fmt.Errorf("error getting addon config for resource %s: %w", resource.Name, err)
- }
- if shouldCreate {
- err := client.DeployAddon(
- context.Background(),
- d.target.Project,
- d.target.Cluster,
- d.target.Namespace,
- &types.CreateAddonRequest{
- CreateReleaseBaseRequest: &types.CreateReleaseBaseRequest{
- RepoURL: d.source.Repo,
- TemplateName: d.source.Name,
- TemplateVersion: d.source.Version,
- Values: addonConfig,
- Name: resource.Name,
- },
- },
- )
- if err != nil {
- return nil, fmt.Errorf("error creating addon from resource %s: %w", resource.Name, err)
- }
- } else {
- bytes, err := json.Marshal(addonConfig)
- if err != nil {
- return nil, fmt.Errorf("error marshalling addon config from resource %s: %w", resource.Name, err)
- }
- err = client.UpgradeRelease(
- context.Background(),
- d.target.Project,
- d.target.Cluster,
- d.target.Namespace,
- resource.Name,
- &types.UpgradeReleaseRequest{
- Values: string(bytes),
- },
- )
- if err != nil {
- return nil, fmt.Errorf("error updating addon from resource %s: %w", resource.Name, err)
- }
- }
- if err = d.assignOutput(resource, client); err != nil {
- return nil, err
- }
- return resource, nil
- }
- func (d *DeployDriver) applyApplication(resource *switchboardModels.Resource, client *api.Client, shouldCreate bool) (*switchboardModels.Resource, error) {
- if resource == nil {
- return nil, fmt.Errorf("nil resource")
- }
- resourceName := resource.Name
- appConfig, err := d.getApplicationConfig(resource)
- if err != nil {
- return nil, err
- }
- fullPath, err := filepath.Abs(appConfig.Build.Context)
- if err != nil {
- return nil, fmt.Errorf("for resource %s, error getting absolute path for config.build.context: %w", resourceName,
- err)
- }
- tag := os.Getenv("PORTER_TAG")
- if tag == "" {
- color.New(color.FgYellow).Printf("for resource %s, since PORTER_TAG is not set, the Docker image tag will default to"+
- " the git repo SHA\n", resourceName)
- commit, err := git.LastCommit()
- if err != nil {
- return nil, fmt.Errorf("for resource %s, error getting last git commit: %w", resourceName, err)
- }
- tag = commit.Sha[:7]
- color.New(color.FgYellow).Printf("for resource %s, using tag %s\n", resourceName, tag)
- }
- // if the method is registry and a tag is defined, we use the provided tag
- if appConfig.Build.Method == "registry" {
- imageSpl := strings.Split(appConfig.Build.Image, ":")
- if len(imageSpl) == 2 {
- tag = imageSpl[1]
- }
- if tag == "" {
- tag = "latest"
- }
- }
- sharedOpts := &deploy.SharedOpts{
- ProjectID: d.target.Project,
- ClusterID: d.target.Cluster,
- Namespace: d.target.Namespace,
- LocalPath: fullPath,
- LocalDockerfile: appConfig.Build.Dockerfile,
- OverrideTag: tag,
- Method: deploy.DeployBuildType(appConfig.Build.Method),
- EnvGroups: appConfig.EnvGroups,
- UseCache: appConfig.Build.UseCache,
- }
- if appConfig.Build.UseCache {
- // set the docker config so that pack caching can use the repo credentials
- err := config.SetDockerConfig(client)
- if err != nil {
- return nil, err
- }
- }
- if shouldCreate {
- resource, err = d.createApplication(resource, client, sharedOpts, appConfig)
- if err != nil {
- return nil, fmt.Errorf("error creating app from resource %s: %w", resourceName, err)
- }
- } else if !appConfig.OnlyCreate {
- resource, err = d.updateApplication(resource, client, sharedOpts, appConfig)
- if err != nil {
- return nil, fmt.Errorf("error updating application from resource %s: %w", resourceName, err)
- }
- } else {
- color.New(color.FgYellow).Printf("Skipping creation for resource %s as onlyCreate is set to true\n", resourceName)
- }
- if err = d.assignOutput(resource, client); err != nil {
- return nil, err
- }
- if d.source.Name == "job" && appConfig.WaitForJob && (shouldCreate || !appConfig.OnlyCreate) {
- color.New(color.FgYellow).Printf("Waiting for job '%s' to finish\n", resourceName)
- err = wait.WaitForJob(client, &wait.WaitOpts{
- ProjectID: d.target.Project,
- ClusterID: d.target.Cluster,
- Namespace: d.target.Namespace,
- Name: resourceName,
- })
- if err != nil && appConfig.OnlyCreate {
- deleteJobErr := client.DeleteRelease(
- context.Background(),
- d.target.Project,
- d.target.Cluster,
- d.target.Namespace,
- resourceName,
- )
- if deleteJobErr != nil {
- return nil, fmt.Errorf("error deleting job %s with waitForJob and onlyCreate set to true: %w",
- resourceName, deleteJobErr)
- }
- } else if err != nil {
- return nil, fmt.Errorf("error waiting for job %s: %w", resourceName, err)
- }
- }
- return resource, err
- }
- func (d *DeployDriver) createApplication(resource *switchboardModels.Resource, client *api.Client, sharedOpts *deploy.SharedOpts, appConf *previewInt.ApplicationConfig) (*switchboardModels.Resource, error) {
- // create new release
- color.New(color.FgGreen).Printf("Creating %s release: %s\n", d.source.Name, resource.Name)
- regList, err := client.ListRegistries(context.Background(), d.target.Project)
- if err != nil {
- return nil, fmt.Errorf("for resource %s, error listing registries: %w", resource.Name, err)
- }
- var registryURL string
- if len(*regList) == 0 {
- return nil, fmt.Errorf("no registry found")
- } else {
- registryURL = (*regList)[0].URL
- }
- color.New(color.FgBlue).Printf("for resource %s, using registry %s\n", resource.Name, registryURL)
- // attempt to get repo suffix from environment variables
- var repoSuffix string
- if repoName := os.Getenv("PORTER_REPO_NAME"); repoName != "" {
- if repoOwner := os.Getenv("PORTER_REPO_OWNER"); repoOwner != "" {
- repoSuffix = strings.ToLower(strings.ReplaceAll(fmt.Sprintf("%s-%s", repoOwner, repoName), "_", "-"))
- }
- }
- createAgent := &deploy.CreateAgent{
- Client: client,
- CreateOpts: &deploy.CreateOpts{
- SharedOpts: sharedOpts,
- Kind: d.source.Name,
- ReleaseName: resource.Name,
- RegistryURL: registryURL,
- RepoSuffix: repoSuffix,
- },
- }
- var buildConfig *types.BuildConfig
- if appConf.Build.Builder != "" {
- buildConfig = &types.BuildConfig{
- Builder: appConf.Build.Builder,
- Buildpacks: appConf.Build.Buildpacks,
- }
- }
- var subdomain string
- if appConf.Build.Method == "registry" {
- subdomain, err = createAgent.CreateFromRegistry(appConf.Build.Image, appConf.Values)
- } else {
- // if useCache is set, create the image repository first
- if appConf.Build.UseCache {
- regID, imageURL, err := createAgent.GetImageRepoURL(resource.Name, sharedOpts.Namespace)
- if err != nil {
- return nil, err
- }
- err = client.CreateRepository(
- context.Background(),
- sharedOpts.ProjectID,
- regID,
- &types.CreateRegistryRepositoryRequest{
- ImageRepoURI: imageURL,
- },
- )
- if err != nil {
- return nil, err
- }
- }
- subdomain, err = createAgent.CreateFromDocker(appConf.Values, sharedOpts.OverrideTag, buildConfig)
- }
- if err != nil {
- return nil, err
- }
- return resource, handleSubdomainCreate(subdomain, err)
- }
- func (d *DeployDriver) updateApplication(resource *switchboardModels.Resource, client *api.Client, sharedOpts *deploy.SharedOpts, appConf *previewInt.ApplicationConfig) (*switchboardModels.Resource, error) {
- color.New(color.FgGreen).Println("Updating existing release:", resource.Name)
- if len(appConf.Build.Env) > 0 {
- sharedOpts.AdditionalEnv = appConf.Build.Env
- }
- updateAgent, err := deploy.NewDeployAgent(client, resource.Name, &deploy.DeployOpts{
- SharedOpts: sharedOpts,
- Local: appConf.Build.Method != "registry",
- })
- if err != nil {
- return nil, err
- }
- // if the build method is registry, we do not trigger a build
- if appConf.Build.Method != "registry" {
- buildEnv, err := updateAgent.GetBuildEnv(&deploy.GetBuildEnvOpts{
- UseNewConfig: true,
- NewConfig: appConf.Values,
- })
- if err != nil {
- return nil, err
- }
- err = updateAgent.SetBuildEnv(buildEnv)
- if err != nil {
- return nil, err
- }
- var buildConfig *types.BuildConfig
- if appConf.Build.Builder != "" {
- buildConfig = &types.BuildConfig{
- Builder: appConf.Build.Builder,
- Buildpacks: appConf.Build.Buildpacks,
- }
- }
- err = updateAgent.Build(buildConfig)
- if err != nil {
- return nil, err
- }
- if !appConf.Build.UseCache {
- err = updateAgent.Push()
- if err != nil {
- return nil, err
- }
- }
- }
- err = updateAgent.UpdateImageAndValues(appConf.Values)
- if err != nil {
- return nil, err
- }
- return resource, nil
- }
- func (d *DeployDriver) assignOutput(resource *switchboardModels.Resource, client *api.Client) error {
- release, err := client.GetRelease(
- context.Background(),
- d.target.Project,
- d.target.Cluster,
- d.target.Namespace,
- resource.Name,
- )
- if err != nil {
- return err
- }
- d.output = utils.CoalesceValues(d.source.SourceValues, release.Config)
- return nil
- }
- func (d *DeployDriver) Output() (map[string]interface{}, error) {
- return d.output, nil
- }
- func (d *DeployDriver) getApplicationConfig(resource *switchboardModels.Resource) (*previewInt.ApplicationConfig, error) {
- populatedConf, err := drivers.ConstructConfig(&drivers.ConstructConfigOpts{
- RawConf: resource.Config,
- LookupTable: *d.lookupTable,
- Dependencies: resource.Dependencies,
- })
- if err != nil {
- return nil, err
- }
- appConf := &previewInt.ApplicationConfig{}
- err = mapstructure.Decode(populatedConf, appConf)
- if err != nil {
- return nil, err
- }
- if _, ok := resource.Config["waitForJob"]; !ok && d.source.Name == "job" {
- // default to true and wait for the job to finish
- appConf.WaitForJob = true
- }
- return appConf, nil
- }
- func (d *DeployDriver) getAddonConfig(resource *switchboardModels.Resource) (map[string]interface{}, error) {
- return drivers.ConstructConfig(&drivers.ConstructConfigOpts{
- RawConf: resource.Config,
- LookupTable: *d.lookupTable,
- Dependencies: resource.Dependencies,
- })
- }
- type DeploymentHook struct {
- client *api.Client
- resourceGroup *switchboardTypes.ResourceGroup
- gitInstallationID, projectID, clusterID, prID, actionID, envID uint
- branchFrom, branchInto, namespace, repoName, repoOwner, prName, commitSHA string
- }
- func NewDeploymentHook(client *api.Client, resourceGroup *switchboardTypes.ResourceGroup, namespace string) (*DeploymentHook, error) {
- res := &DeploymentHook{
- client: client,
- resourceGroup: resourceGroup,
- namespace: namespace,
- }
- ghIDStr := os.Getenv("PORTER_GIT_INSTALLATION_ID")
- ghID, err := strconv.Atoi(ghIDStr)
- if err != nil {
- return nil, err
- }
- res.gitInstallationID = uint(ghID)
- prIDStr := os.Getenv("PORTER_PULL_REQUEST_ID")
- prID, err := strconv.Atoi(prIDStr)
- if err != nil {
- return nil, err
- }
- res.prID = uint(prID)
- res.projectID = cliConf.Project
- if res.projectID == 0 {
- return nil, fmt.Errorf("project id must be set")
- }
- res.clusterID = cliConf.Cluster
- if res.clusterID == 0 {
- return nil, fmt.Errorf("cluster id must be set")
- }
- branchFrom := os.Getenv("PORTER_BRANCH_FROM")
- res.branchFrom = branchFrom
- branchInto := os.Getenv("PORTER_BRANCH_INTO")
- res.branchInto = branchInto
- actionIDStr := os.Getenv("PORTER_ACTION_ID")
- actionID, err := strconv.Atoi(actionIDStr)
- if err != nil {
- return nil, err
- }
- res.actionID = uint(actionID)
- repoName := os.Getenv("PORTER_REPO_NAME")
- res.repoName = repoName
- repoOwner := os.Getenv("PORTER_REPO_OWNER")
- res.repoOwner = repoOwner
- prName := os.Getenv("PORTER_PR_NAME")
- res.prName = prName
- commit, err := git.LastCommit()
- if err != nil {
- return nil, fmt.Errorf(err.Error())
- }
- res.commitSHA = commit.Sha[:7]
- return res, nil
- }
- func (t *DeploymentHook) isBranchDeploy() bool {
- return t.branchFrom != "" && t.branchInto != "" && t.branchFrom == t.branchInto
- }
- func (t *DeploymentHook) PreApply() error {
- if isSystemNamespace(t.namespace) {
- color.New(color.FgYellow).Printf("attempting to deploy to system namespace '%s'\n", t.namespace)
- }
- envList, err := t.client.ListEnvironments(
- context.Background(), t.projectID, t.clusterID,
- )
- if err != nil {
- return err
- }
- envs := *envList
- var deplEnv *types.Environment
- for _, env := range envs {
- if strings.EqualFold(env.GitRepoOwner, t.repoOwner) &&
- strings.EqualFold(env.GitRepoName, t.repoName) &&
- env.GitInstallationID == t.gitInstallationID {
- t.envID = env.ID
- deplEnv = env
- break
- }
- }
- if t.envID == 0 {
- return fmt.Errorf("could not find environment for deployment")
- }
- nsList, err := t.client.GetK8sNamespaces(
- context.Background(), t.projectID, t.clusterID,
- )
- if err != nil {
- return fmt.Errorf("error fetching namespaces: %w", err)
- }
- found := false
- for _, ns := range *nsList {
- if ns.Name == t.namespace {
- found = true
- break
- }
- }
- if !found {
- if isSystemNamespace(t.namespace) {
- return fmt.Errorf("attempting to deploy to system namespace '%s' which does not exist, please create it "+
- "to continue", t.namespace)
- }
- createNS := &types.CreateNamespaceRequest{
- Name: t.namespace,
- }
- if len(deplEnv.NamespaceLabels) > 0 {
- createNS.Labels = deplEnv.NamespaceLabels
- }
- // create the new namespace
- _, err := t.client.CreateNewK8sNamespace(context.Background(), t.projectID, t.clusterID, createNS)
- if err != nil && !strings.Contains(err.Error(), "namespace already exists") {
- // ignore the error if the namespace already exists
- //
- // this might happen if someone creates the namespace in between this operation
- return fmt.Errorf("error creating namespace: %w", err)
- }
- }
- var deplErr error
- if t.isBranchDeploy() {
- _, deplErr = t.client.GetDeployment(
- context.Background(),
- t.projectID, t.clusterID, t.envID,
- &types.GetDeploymentRequest{
- Branch: t.branchFrom,
- },
- )
- } else {
- _, deplErr = t.client.GetDeployment(
- context.Background(),
- t.projectID, t.clusterID, t.envID,
- &types.GetDeploymentRequest{
- PRNumber: t.prID,
- },
- )
- }
- if deplErr != nil && strings.Contains(deplErr.Error(), "not found") {
- // in this case, create the deployment
- createReq := &types.CreateDeploymentRequest{
- Namespace: t.namespace,
- PullRequestID: t.prID,
- CreateGHDeploymentRequest: &types.CreateGHDeploymentRequest{
- ActionID: t.actionID,
- },
- GitHubMetadata: &types.GitHubMetadata{
- PRName: t.prName,
- RepoName: t.repoName,
- RepoOwner: t.repoOwner,
- CommitSHA: t.commitSHA,
- PRBranchFrom: t.branchFrom,
- PRBranchInto: t.branchInto,
- },
- }
- if t.isBranchDeploy() {
- createReq.PullRequestID = 0
- }
- _, err = t.client.CreateDeployment(
- context.Background(),
- t.projectID, t.gitInstallationID, t.clusterID,
- t.repoOwner, t.repoName, createReq,
- )
- } else if err == nil {
- updateReq := &types.UpdateDeploymentRequest{
- Namespace: t.namespace,
- PRNumber: t.prID,
- CreateGHDeploymentRequest: &types.CreateGHDeploymentRequest{
- ActionID: t.actionID,
- },
- PRBranchFrom: t.branchFrom,
- CommitSHA: t.commitSHA,
- }
- if t.isBranchDeploy() {
- updateReq.PRNumber = 0
- }
- _, err = t.client.UpdateDeployment(
- context.Background(),
- t.projectID, t.gitInstallationID, t.clusterID,
- t.repoOwner, t.repoName, updateReq,
- )
- }
- return err
- }
- func (t *DeploymentHook) DataQueries() map[string]interface{} {
- res := make(map[string]interface{})
- // use the resource group to find all web applications that can have an exposed subdomain
- // that we can query for
- for _, resource := range t.resourceGroup.Resources {
- isWeb := false
- if sourceNameInter, exists := resource.Source["name"]; exists {
- if sourceName, ok := sourceNameInter.(string); ok {
- if sourceName == "web" {
- isWeb = true
- }
- }
- }
- if isWeb {
- // determine if we should query for porter_hosts or just hosts
- isCustomDomain := false
- ingressMap, err := deploy.GetNestedMap(resource.Config, "values", "ingress")
- if err == nil {
- enabledVal, enabledExists := ingressMap["enabled"]
- customDomVal, customDomExists := ingressMap["custom_domain"]
- if enabledExists && customDomExists {
- enabled, eOK := enabledVal.(bool)
- customDomain, cOK := customDomVal.(bool)
- if eOK && cOK && enabled {
- if customDomain {
- // return the first custom domain when one exists
- hostsArr, hostsExists := ingressMap["hosts"]
- if hostsExists {
- hostsArrVal, hostsArrOk := hostsArr.([]interface{})
- if hostsArrOk && len(hostsArrVal) > 0 {
- if _, ok := hostsArrVal[0].(string); ok {
- res[resource.Name] = fmt.Sprintf("{ .%s.ingress.hosts[0] }", resource.Name)
- isCustomDomain = true
- }
- }
- }
- }
- }
- }
- }
- if !isCustomDomain {
- res[resource.Name] = fmt.Sprintf("{ .%s.ingress.porter_hosts[0] }", resource.Name)
- }
- }
- }
- return res
- }
- func (t *DeploymentHook) PostApply(populatedData map[string]interface{}) error {
- subdomains := make([]string, 0)
- for _, data := range populatedData {
- domain, ok := data.(string)
- if !ok {
- continue
- }
- if _, err := url.Parse("https://" + domain); err == nil {
- subdomains = append(subdomains, "https://"+domain)
- }
- }
- req := &types.FinalizeDeploymentRequest{
- Subdomain: strings.Join(subdomains, ", "),
- }
- if t.isBranchDeploy() {
- req.Namespace = t.namespace
- } else {
- req.PRNumber = t.prID
- }
- for _, res := range t.resourceGroup.Resources {
- releaseType := getReleaseType(t.projectID, res)
- releaseName := getReleaseName(res)
- if releaseType != "" && releaseName != "" {
- req.SuccessfulResources = append(req.SuccessfulResources, &types.SuccessfullyDeployedResource{
- ReleaseName: releaseName,
- ReleaseType: releaseType,
- })
- }
- }
- // finalize the deployment
- _, err := t.client.FinalizeDeployment(
- context.Background(),
- t.projectID, t.gitInstallationID, t.clusterID,
- t.repoOwner, t.repoName, req,
- )
- return err
- }
- func (t *DeploymentHook) OnError(error) {
- var deplErr error
- if t.isBranchDeploy() {
- _, deplErr = t.client.GetDeployment(
- context.Background(),
- t.projectID, t.clusterID, t.envID,
- &types.GetDeploymentRequest{
- Branch: t.branchFrom,
- },
- )
- } else {
- _, deplErr = t.client.GetDeployment(
- context.Background(),
- t.projectID, t.clusterID, t.envID,
- &types.GetDeploymentRequest{
- PRNumber: t.prID,
- },
- )
- }
- // if the deployment exists, throw an error for that deployment
- if deplErr == nil {
- req := &types.UpdateDeploymentStatusRequest{
- CreateGHDeploymentRequest: &types.CreateGHDeploymentRequest{
- ActionID: t.actionID,
- },
- PRBranchFrom: t.branchFrom,
- Status: string(types.DeploymentStatusFailed),
- }
- if t.isBranchDeploy() {
- req.Namespace = t.namespace
- } else {
- req.PRNumber = t.prID
- }
- // FIXME: try to use the error with a custom logger
- t.client.UpdateDeploymentStatus(
- context.Background(),
- t.projectID, t.gitInstallationID, t.clusterID,
- t.repoOwner, t.repoName, req,
- )
- }
- }
- func (t *DeploymentHook) OnConsolidatedErrors(allErrors map[string]error) {
- var deplErr error
- if t.isBranchDeploy() {
- _, deplErr = t.client.GetDeployment(
- context.Background(),
- t.projectID, t.clusterID, t.envID,
- &types.GetDeploymentRequest{
- Branch: t.branchFrom,
- },
- )
- } else {
- _, deplErr = t.client.GetDeployment(
- context.Background(),
- t.projectID, t.clusterID, t.envID,
- &types.GetDeploymentRequest{
- PRNumber: t.prID,
- },
- )
- }
- // if the deployment exists, throw an error for that deployment
- if deplErr == nil {
- req := &types.FinalizeDeploymentWithErrorsRequest{
- Errors: make(map[string]string),
- }
- if t.isBranchDeploy() {
- req.Namespace = t.namespace
- } else {
- req.PRNumber = t.prID
- }
- for _, res := range t.resourceGroup.Resources {
- if _, ok := allErrors[res.Name]; !ok {
- req.SuccessfulResources = append(req.SuccessfulResources, &types.SuccessfullyDeployedResource{
- ReleaseName: getReleaseName(res),
- ReleaseType: getReleaseType(t.projectID, res),
- })
- }
- }
- for res, err := range allErrors {
- req.Errors[res] = err.Error()
- }
- // FIXME: handle the error
- t.client.FinalizeDeploymentWithErrors(
- context.Background(),
- t.projectID, t.gitInstallationID, t.clusterID,
- t.repoOwner, t.repoName,
- req,
- )
- }
- }
- type CloneEnvGroupHook struct {
- client *api.Client
- resGroup *switchboardTypes.ResourceGroup
- }
- func NewCloneEnvGroupHook(client *api.Client, resourceGroup *switchboardTypes.ResourceGroup) *CloneEnvGroupHook {
- return &CloneEnvGroupHook{
- client: client,
- resGroup: resourceGroup,
- }
- }
- func (t *CloneEnvGroupHook) PreApply() error {
- for _, res := range t.resGroup.Resources {
- if res.Driver == "env-group" {
- continue
- }
- appConf := &previewInt.ApplicationConfig{}
- err := mapstructure.Decode(res.Config, &appConf)
- if err != nil {
- continue
- }
- if appConf != nil && len(appConf.EnvGroups) > 0 {
- target, err := preview.GetTarget(res.Name, res.Target)
- if err != nil {
- return err
- }
- for _, group := range appConf.EnvGroups {
- if group.Name == "" {
- return fmt.Errorf("env group name cannot be empty")
- }
- _, err := t.client.GetEnvGroup(
- context.Background(),
- target.Project,
- target.Cluster,
- target.Namespace,
- &types.GetEnvGroupRequest{
- Name: group.Name,
- Version: group.Version,
- },
- )
- if err != nil && err.Error() == "env group not found" {
- if group.Namespace == "" {
- return fmt.Errorf("env group namespace cannot be empty")
- }
- color.New(color.FgBlue, color.Bold).
- Printf("Env group '%s' does not exist in the target namespace '%s'\n", group.Name, target.Namespace)
- color.New(color.FgBlue, color.Bold).
- Printf("Cloning env group '%s' from namespace '%s' to target namespace '%s'\n",
- group.Name, group.Namespace, target.Namespace)
- _, err = t.client.CloneEnvGroup(
- context.Background(), target.Project, target.Cluster, group.Namespace,
- &types.CloneEnvGroupRequest{
- Name: group.Name,
- Namespace: target.Namespace,
- },
- )
- if err != nil {
- return err
- }
- } else if err != nil {
- return err
- }
- }
- }
- }
- return nil
- }
- func (t *CloneEnvGroupHook) DataQueries() map[string]interface{} {
- return nil
- }
- func (t *CloneEnvGroupHook) PostApply(map[string]interface{}) error {
- return nil
- }
- func (t *CloneEnvGroupHook) OnError(error) {}
- func (t *CloneEnvGroupHook) OnConsolidatedErrors(map[string]error) {}
- func getReleaseName(res *switchboardTypes.Resource) string {
- // can ignore the error because this method is called once
- // GetTarget has alrealy been called and validated previously
- target, _ := preview.GetTarget(res.Name, res.Target)
- if target.AppName != "" {
- return target.AppName
- }
- return res.Name
- }
- func getReleaseType(projectID uint, res *switchboardTypes.Resource) string {
- // can ignore the error because this method is called once
- // GetSource has alrealy been called and validated previously
- source, _ := preview.GetSource(projectID, res.Name, res.Source)
- if source != nil && source.Name != "" {
- return source.Name
- }
- return ""
- }
- func isSystemNamespace(namespace string) bool {
- return namespace == "cert-manager" || namespace == "ingress-nginx" ||
- namespace == "kube-node-lease" || namespace == "kube-public" ||
- namespace == "kube-system" || namespace == "monitoring" ||
- namespace == "porter-agent-system" || namespace == "default" ||
- namespace == "ingress-nginx-private"
- }
|