| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171 |
- package cmd
- import (
- "context"
- "encoding/json"
- "fmt"
- "io/ioutil"
- "net/url"
- "os"
- "path/filepath"
- "strconv"
- "strings"
- "github.com/cli/cli/git"
- "github.com/fatih/color"
- "github.com/mitchellh/mapstructure"
- api "github.com/porter-dev/porter/api/client"
- "github.com/porter-dev/porter/api/types"
- "github.com/porter-dev/porter/cli/cmd/config"
- "github.com/porter-dev/porter/cli/cmd/deploy"
- "github.com/porter-dev/porter/cli/cmd/deploy/wait"
- "github.com/porter-dev/porter/cli/cmd/preview"
- previewInt "github.com/porter-dev/porter/internal/integrations/preview"
- "github.com/porter-dev/porter/internal/templater/utils"
- "github.com/porter-dev/switchboard/pkg/drivers"
- switchboardModels "github.com/porter-dev/switchboard/pkg/models"
- "github.com/porter-dev/switchboard/pkg/parser"
- switchboardTypes "github.com/porter-dev/switchboard/pkg/types"
- switchboardWorker "github.com/porter-dev/switchboard/pkg/worker"
- "github.com/rs/zerolog"
- "github.com/spf13/cobra"
- )
- // applyCmd represents the "porter apply" base command when called
- // with a porter.yaml file as an argument
- var applyCmd = &cobra.Command{
- Use: "apply",
- Short: "Applies a configuration to an application",
- Long: fmt.Sprintf(`
- %s
- Applies a configuration to an application by either creating a new one or updating an existing
- one. For example:
- %s
- This command will apply the configuration contained in porter.yaml to the requested project and
- cluster either provided inside the porter.yaml file or through environment variables. Note that
- environment variables will always take precendence over values specified in the porter.yaml file.
- By default, this command expects to be run from a local git repository.
- The following are the environment variables that can be used to set certain values while
- applying a configuration:
- PORTER_CLUSTER Cluster ID that contains the project
- PORTER_PROJECT Project ID that contains the application
- PORTER_NAMESPACE The Kubernetes namespace that the application belongs to
- PORTER_SOURCE_NAME Name of the source Helm chart
- PORTER_SOURCE_REPO The URL of the Helm charts registry
- PORTER_SOURCE_VERSION The version of the Helm chart to use
- PORTER_TAG The Docker image tag to use (like the git commit hash)
- `,
- color.New(color.FgBlue, color.Bold).Sprintf("Help for \"porter apply\":"),
- color.New(color.FgGreen, color.Bold).Sprintf("porter apply -f porter.yaml"),
- ),
- Run: func(cmd *cobra.Command, args []string) {
- err := checkLoginAndRun(args, apply)
- if err != nil {
- if strings.Contains(err.Error(), "Forbidden") {
- color.New(color.FgRed).Fprintf(os.Stderr, "You may have to update your GitHub secret token")
- }
- os.Exit(1)
- }
- },
- }
- // applyValidateCmd represents the "porter apply validate" command when called
- // with a porter.yaml file as an argument
- var applyValidateCmd = &cobra.Command{
- Use: "validate",
- Short: "Validates a porter.yaml",
- Run: func(*cobra.Command, []string) {
- err := applyValidate()
- if err != nil {
- color.New(color.FgRed).Fprintf(os.Stderr, "Error: %s\n", err.Error())
- os.Exit(1)
- } else {
- color.New(color.FgGreen).Printf("The porter.yaml file is valid!\n")
- }
- },
- }
- var porterYAML string
- func init() {
- rootCmd.AddCommand(applyCmd)
- applyCmd.AddCommand(applyValidateCmd)
- applyCmd.PersistentFlags().StringVarP(&porterYAML, "file", "f", "", "path to porter.yaml")
- applyCmd.MarkFlagRequired("file")
- }
- func apply(_ *types.GetAuthenticatedUserResponse, client *api.Client, _ []string) error {
- if _, ok := os.LookupEnv("PORTER_VALIDATE_YAML"); ok {
- err := applyValidate()
- if err != nil {
- return err
- }
- }
- fileBytes, err := ioutil.ReadFile(porterYAML)
- if err != nil {
- return fmt.Errorf("error reading porter.yaml: %w", err)
- }
- resGroup, err := parser.ParseRawBytes(fileBytes)
- if err != nil {
- return fmt.Errorf("error parsing porter.yaml: %w", err)
- }
- basePath, err := os.Getwd()
- if err != nil {
- return fmt.Errorf("error getting working directory: %w", err)
- }
- worker := switchboardWorker.NewWorker()
- worker.RegisterDriver("deploy", NewDeployDriver)
- worker.RegisterDriver("build-image", preview.NewBuildDriver)
- worker.RegisterDriver("push-image", preview.NewPushDriver)
- worker.RegisterDriver("update-config", preview.NewUpdateConfigDriver)
- worker.RegisterDriver("random-string", preview.NewRandomStringDriver)
- worker.RegisterDriver("env-group", preview.NewEnvGroupDriver)
- worker.RegisterDriver("os-env", preview.NewOSEnvDriver)
- worker.SetDefaultDriver("deploy")
- if hasDeploymentHookEnvVars() {
- deplNamespace := os.Getenv("PORTER_NAMESPACE")
- if deplNamespace == "" {
- return fmt.Errorf("namespace must be set by PORTER_NAMESPACE")
- }
- deploymentHook, err := NewDeploymentHook(client, resGroup, deplNamespace)
- if err != nil {
- return fmt.Errorf("error creating deployment hook: %w", err)
- }
- worker.RegisterHook("deployment", deploymentHook)
- }
- cloneEnvGroupHook := NewCloneEnvGroupHook(client, resGroup)
- worker.RegisterHook("cloneenvgroup", cloneEnvGroupHook)
- return worker.Apply(resGroup, &switchboardTypes.ApplyOpts{
- BasePath: basePath,
- })
- }
- func applyValidate() error {
- fileBytes, err := ioutil.ReadFile(porterYAML)
- if err != nil {
- return fmt.Errorf("error reading porter.yaml: %w", err)
- }
- validationErrors := previewInt.Validate(string(fileBytes))
- if len(validationErrors) > 0 {
- errString := "the following error(s) were found while validating the porter.yaml file:"
- for _, err := range validationErrors {
- errString += "\n- " + strings.ReplaceAll(err.Error(), "\n\n*", "\n *")
- }
- return fmt.Errorf(errString)
- }
- return nil
- }
- func hasDeploymentHookEnvVars() bool {
- if ghIDStr := os.Getenv("PORTER_GIT_INSTALLATION_ID"); ghIDStr == "" {
- return false
- }
- if prIDStr := os.Getenv("PORTER_PULL_REQUEST_ID"); prIDStr == "" {
- return false
- }
- if branchFrom := os.Getenv("PORTER_BRANCH_FROM"); branchFrom == "" {
- return false
- }
- if branchInto := os.Getenv("PORTER_BRANCH_INTO"); branchInto == "" {
- return false
- }
- if actionIDStr := os.Getenv("PORTER_ACTION_ID"); actionIDStr == "" {
- return false
- }
- if repoName := os.Getenv("PORTER_REPO_NAME"); repoName == "" {
- return false
- }
- if repoOwner := os.Getenv("PORTER_REPO_OWNER"); repoOwner == "" {
- return false
- }
- if prName := os.Getenv("PORTER_PR_NAME"); prName == "" {
- return false
- }
- return true
- }
- type DeployDriver struct {
- source *previewInt.Source
- target *previewInt.Target
- output map[string]interface{}
- lookupTable *map[string]drivers.Driver
- logger *zerolog.Logger
- }
- func NewDeployDriver(resource *switchboardModels.Resource, opts *drivers.SharedDriverOpts) (drivers.Driver, error) {
- driver := &DeployDriver{
- lookupTable: opts.DriverLookupTable,
- logger: opts.Logger,
- output: make(map[string]interface{}),
- }
- source, err := preview.GetSource(resource.Name, resource.Source)
- if err != nil {
- return nil, err
- }
- driver.source = source
- target, err := preview.GetTarget(resource.Name, resource.Target)
- if err != nil {
- return nil, err
- }
- driver.target = target
- return driver, nil
- }
- func (d *DeployDriver) ShouldApply(_ *switchboardModels.Resource) bool {
- return true
- }
- func (d *DeployDriver) Apply(resource *switchboardModels.Resource) (*switchboardModels.Resource, error) {
- client := config.GetAPIClient()
- _, err := client.GetRelease(
- context.Background(),
- d.target.Project,
- d.target.Cluster,
- d.target.Namespace,
- resource.Name,
- )
- shouldCreate := err != nil
- if err != nil {
- color.New(color.FgYellow).Printf("Could not read release %s/%s (%s): attempting creation\n", d.target.Namespace, resource.Name, err.Error())
- }
- if d.source.IsApplication {
- return d.applyApplication(resource, client, shouldCreate)
- }
- return d.applyAddon(resource, client, shouldCreate)
- }
- // Simple apply for addons
- func (d *DeployDriver) applyAddon(resource *switchboardModels.Resource, client *api.Client, shouldCreate bool) (*switchboardModels.Resource, error) {
- addonConfig, err := d.getAddonConfig(resource)
- if err != nil {
- return nil, fmt.Errorf("error getting addon config for resource %s: %w", resource.Name, err)
- }
- if shouldCreate {
- err := client.DeployAddon(
- context.Background(),
- d.target.Project,
- d.target.Cluster,
- d.target.Namespace,
- &types.CreateAddonRequest{
- CreateReleaseBaseRequest: &types.CreateReleaseBaseRequest{
- RepoURL: d.source.Repo,
- TemplateName: d.source.Name,
- TemplateVersion: d.source.Version,
- Values: addonConfig,
- Name: resource.Name,
- },
- },
- )
- if err != nil {
- return nil, fmt.Errorf("error creating addon from resource %s: %w", resource.Name, err)
- }
- } else {
- bytes, err := json.Marshal(addonConfig)
- if err != nil {
- return nil, fmt.Errorf("error marshalling addon config from resource %s: %w", resource.Name, err)
- }
- err = client.UpgradeRelease(
- context.Background(),
- d.target.Project,
- d.target.Cluster,
- d.target.Namespace,
- resource.Name,
- &types.UpgradeReleaseRequest{
- Values: string(bytes),
- },
- )
- if err != nil {
- return nil, fmt.Errorf("error updating addon from resource %s: %w", resource.Name, err)
- }
- }
- if err = d.assignOutput(resource, client); err != nil {
- return nil, err
- }
- return resource, nil
- }
- func (d *DeployDriver) applyApplication(resource *switchboardModels.Resource, client *api.Client, shouldCreate bool) (*switchboardModels.Resource, error) {
- if resource == nil {
- return nil, fmt.Errorf("nil resource")
- }
- resourceName := resource.Name
- appConfig, err := d.getApplicationConfig(resource)
- if err != nil {
- return nil, err
- }
- fullPath, err := filepath.Abs(appConfig.Build.Context)
- if err != nil {
- return nil, fmt.Errorf("for resource %s, error getting absolute path for config.build.context: %w", resourceName,
- err)
- }
- tag := os.Getenv("PORTER_TAG")
- if tag == "" {
- color.New(color.FgYellow).Printf("for resource %s, since PORTER_TAG is not set, the Docker image tag will default to"+
- " the git repo SHA", resourceName)
- commit, err := git.LastCommit()
- if err != nil {
- return nil, fmt.Errorf("for resource %s, error getting last git commit: %w", resourceName, err)
- }
- tag = commit.Sha[:7]
- color.New(color.FgYellow).Printf("for resource %s, using tag %s\n", resourceName, tag)
- }
- // if the method is registry and a tag is defined, we use the provided tag
- if appConfig.Build.Method == "registry" {
- imageSpl := strings.Split(appConfig.Build.Image, ":")
- if len(imageSpl) == 2 {
- tag = imageSpl[1]
- }
- if tag == "" {
- tag = "latest"
- }
- }
- sharedOpts := &deploy.SharedOpts{
- ProjectID: d.target.Project,
- ClusterID: d.target.Cluster,
- Namespace: d.target.Namespace,
- LocalPath: fullPath,
- LocalDockerfile: appConfig.Build.Dockerfile,
- OverrideTag: tag,
- Method: deploy.DeployBuildType(appConfig.Build.Method),
- EnvGroups: appConfig.EnvGroups,
- UseCache: appConfig.Build.UseCache,
- }
- if appConfig.Build.UseCache {
- // set the docker config so that pack caching can use the repo credentials
- err := config.SetDockerConfig(client)
- if err != nil {
- return nil, err
- }
- }
- if shouldCreate {
- resource, err = d.createApplication(resource, client, sharedOpts, appConfig)
- if err != nil {
- return nil, fmt.Errorf("error creating app from resource %s: %w", resourceName, err)
- }
- } else if !appConfig.OnlyCreate {
- resource, err = d.updateApplication(resource, client, sharedOpts, appConfig)
- if err != nil {
- return nil, fmt.Errorf("error updating application from resource %s: %w", resourceName, err)
- }
- } else {
- color.New(color.FgYellow).Printf("Skipping creation for resource %s as onlyCreate is set to true\n", resourceName)
- }
- if err = d.assignOutput(resource, client); err != nil {
- return nil, err
- }
- if d.source.Name == "job" && appConfig.WaitForJob && (shouldCreate || !appConfig.OnlyCreate) {
- color.New(color.FgYellow).Printf("Waiting for job '%s' to finish\n", resourceName)
- err = wait.WaitForJob(client, &wait.WaitOpts{
- ProjectID: d.target.Project,
- ClusterID: d.target.Cluster,
- Namespace: d.target.Namespace,
- Name: resourceName,
- })
- if err != nil && appConfig.OnlyCreate {
- deleteJobErr := client.DeleteRelease(
- context.Background(),
- d.target.Project,
- d.target.Cluster,
- d.target.Namespace,
- resourceName,
- )
- if deleteJobErr != nil {
- return nil, fmt.Errorf("error deleting job %s with waitForJob and onlyCreate set to true: %w",
- resourceName, deleteJobErr)
- }
- } else if err != nil {
- return nil, fmt.Errorf("error waiting for job %s: %w", resourceName, err)
- }
- }
- return resource, err
- }
- func (d *DeployDriver) createApplication(resource *switchboardModels.Resource, client *api.Client, sharedOpts *deploy.SharedOpts, appConf *previewInt.ApplicationConfig) (*switchboardModels.Resource, error) {
- // create new release
- color.New(color.FgGreen).Printf("Creating %s release: %s\n", d.source.Name, resource.Name)
- regList, err := client.ListRegistries(context.Background(), d.target.Project)
- if err != nil {
- return nil, fmt.Errorf("for resource %s, error listing registries: %w", resource.Name, err)
- }
- var registryURL string
- if len(*regList) == 0 {
- return nil, fmt.Errorf("no registry found")
- } else {
- registryURL = (*regList)[0].URL
- }
- color.New(color.FgBlue).Printf("for resource %s, using registry %s\n", resource.Name, registryURL)
- // attempt to get repo suffix from environment variables
- var repoSuffix string
- if repoName := os.Getenv("PORTER_REPO_NAME"); repoName != "" {
- if repoOwner := os.Getenv("PORTER_REPO_OWNER"); repoOwner != "" {
- repoSuffix = strings.ToLower(strings.ReplaceAll(fmt.Sprintf("%s-%s", repoOwner, repoName), "_", "-"))
- }
- }
- createAgent := &deploy.CreateAgent{
- Client: client,
- CreateOpts: &deploy.CreateOpts{
- SharedOpts: sharedOpts,
- Kind: d.source.Name,
- ReleaseName: resource.Name,
- RegistryURL: registryURL,
- RepoSuffix: repoSuffix,
- },
- }
- var buildConfig *types.BuildConfig
- if appConf.Build.Builder != "" {
- buildConfig = &types.BuildConfig{
- Builder: appConf.Build.Builder,
- Buildpacks: appConf.Build.Buildpacks,
- }
- }
- var subdomain string
- if appConf.Build.Method == "registry" {
- subdomain, err = createAgent.CreateFromRegistry(appConf.Build.Image, appConf.Values)
- } else {
- // if useCache is set, create the image repository first
- if appConf.Build.UseCache {
- regID, imageURL, err := createAgent.GetImageRepoURL(resource.Name, sharedOpts.Namespace)
- if err != nil {
- return nil, err
- }
- err = client.CreateRepository(
- context.Background(),
- sharedOpts.ProjectID,
- regID,
- &types.CreateRegistryRepositoryRequest{
- ImageRepoURI: imageURL,
- },
- )
- if err != nil {
- return nil, err
- }
- }
- subdomain, err = createAgent.CreateFromDocker(appConf.Values, sharedOpts.OverrideTag, buildConfig)
- }
- if err != nil {
- return nil, err
- }
- return resource, handleSubdomainCreate(subdomain, err)
- }
- func (d *DeployDriver) updateApplication(resource *switchboardModels.Resource, client *api.Client, sharedOpts *deploy.SharedOpts, appConf *previewInt.ApplicationConfig) (*switchboardModels.Resource, error) {
- color.New(color.FgGreen).Println("Updating existing release:", resource.Name)
- if len(appConf.Build.Env) > 0 {
- sharedOpts.AdditionalEnv = appConf.Build.Env
- }
- updateAgent, err := deploy.NewDeployAgent(client, resource.Name, &deploy.DeployOpts{
- SharedOpts: sharedOpts,
- Local: appConf.Build.Method != "registry",
- })
- if err != nil {
- return nil, err
- }
- // if the build method is registry, we do not trigger a build
- if appConf.Build.Method != "registry" {
- buildEnv, err := updateAgent.GetBuildEnv(&deploy.GetBuildEnvOpts{
- UseNewConfig: true,
- NewConfig: appConf.Values,
- })
- if err != nil {
- return nil, err
- }
- err = updateAgent.SetBuildEnv(buildEnv)
- if err != nil {
- return nil, err
- }
- var buildConfig *types.BuildConfig
- if appConf.Build.Builder != "" {
- buildConfig = &types.BuildConfig{
- Builder: appConf.Build.Builder,
- Buildpacks: appConf.Build.Buildpacks,
- }
- }
- err = updateAgent.Build(buildConfig)
- if err != nil {
- return nil, err
- }
- if !appConf.Build.UseCache {
- err = updateAgent.Push()
- if err != nil {
- return nil, err
- }
- }
- }
- err = updateAgent.UpdateImageAndValues(appConf.Values)
- if err != nil {
- return nil, err
- }
- return resource, nil
- }
- func (d *DeployDriver) assignOutput(resource *switchboardModels.Resource, client *api.Client) error {
- release, err := client.GetRelease(
- context.Background(),
- d.target.Project,
- d.target.Cluster,
- d.target.Namespace,
- resource.Name,
- )
- if err != nil {
- return err
- }
- d.output = utils.CoalesceValues(d.source.SourceValues, release.Config)
- return nil
- }
- func (d *DeployDriver) Output() (map[string]interface{}, error) {
- return d.output, nil
- }
- func (d *DeployDriver) getApplicationConfig(resource *switchboardModels.Resource) (*previewInt.ApplicationConfig, error) {
- populatedConf, err := drivers.ConstructConfig(&drivers.ConstructConfigOpts{
- RawConf: resource.Config,
- LookupTable: *d.lookupTable,
- Dependencies: resource.Dependencies,
- })
- if err != nil {
- return nil, err
- }
- appConf := &previewInt.ApplicationConfig{}
- err = mapstructure.Decode(populatedConf, appConf)
- if err != nil {
- return nil, err
- }
- if _, ok := resource.Config["waitForJob"]; !ok && d.source.Name == "job" {
- // default to true and wait for the job to finish
- appConf.WaitForJob = true
- }
- return appConf, nil
- }
- func (d *DeployDriver) getAddonConfig(resource *switchboardModels.Resource) (map[string]interface{}, error) {
- return drivers.ConstructConfig(&drivers.ConstructConfigOpts{
- RawConf: resource.Config,
- LookupTable: *d.lookupTable,
- Dependencies: resource.Dependencies,
- })
- }
- type DeploymentHook struct {
- client *api.Client
- resourceGroup *switchboardTypes.ResourceGroup
- gitInstallationID, projectID, clusterID, prID, actionID, envID uint
- branchFrom, branchInto, namespace, repoName, repoOwner, prName, commitSHA string
- }
- func NewDeploymentHook(client *api.Client, resourceGroup *switchboardTypes.ResourceGroup, namespace string) (*DeploymentHook, error) {
- res := &DeploymentHook{
- client: client,
- resourceGroup: resourceGroup,
- namespace: namespace,
- }
- ghIDStr := os.Getenv("PORTER_GIT_INSTALLATION_ID")
- ghID, err := strconv.Atoi(ghIDStr)
- if err != nil {
- return nil, err
- }
- res.gitInstallationID = uint(ghID)
- prIDStr := os.Getenv("PORTER_PULL_REQUEST_ID")
- prID, err := strconv.Atoi(prIDStr)
- if err != nil {
- return nil, err
- }
- res.prID = uint(prID)
- res.projectID = cliConf.Project
- if res.projectID == 0 {
- return nil, fmt.Errorf("project id must be set")
- }
- res.clusterID = cliConf.Cluster
- if res.clusterID == 0 {
- return nil, fmt.Errorf("cluster id must be set")
- }
- branchFrom := os.Getenv("PORTER_BRANCH_FROM")
- res.branchFrom = branchFrom
- branchInto := os.Getenv("PORTER_BRANCH_INTO")
- res.branchInto = branchInto
- actionIDStr := os.Getenv("PORTER_ACTION_ID")
- actionID, err := strconv.Atoi(actionIDStr)
- if err != nil {
- return nil, err
- }
- res.actionID = uint(actionID)
- repoName := os.Getenv("PORTER_REPO_NAME")
- res.repoName = repoName
- repoOwner := os.Getenv("PORTER_REPO_OWNER")
- res.repoOwner = repoOwner
- prName := os.Getenv("PORTER_PR_NAME")
- res.prName = prName
- commit, err := git.LastCommit()
- if err != nil {
- return nil, fmt.Errorf(err.Error())
- }
- res.commitSHA = commit.Sha[:7]
- return res, nil
- }
- func (t *DeploymentHook) PreApply() error {
- if isSystemNamespace(t.namespace) {
- color.New(color.FgYellow).Printf("attempting to deploy to system namespace '%s'\n", t.namespace)
- }
- envList, err := t.client.ListEnvironments(
- context.Background(), t.projectID, t.clusterID,
- )
- if err != nil {
- return err
- }
- envs := *envList
- var deplEnv *types.Environment
- for _, env := range envs {
- if strings.EqualFold(env.GitRepoOwner, t.repoOwner) &&
- strings.EqualFold(env.GitRepoName, t.repoName) &&
- env.GitInstallationID == t.gitInstallationID {
- t.envID = env.ID
- deplEnv = env
- break
- }
- }
- if t.envID == 0 {
- return fmt.Errorf("could not find environment for deployment")
- }
- nsList, err := t.client.GetK8sNamespaces(
- context.Background(), t.projectID, t.clusterID,
- )
- if err != nil {
- return fmt.Errorf("error fetching namespaces: %w", err)
- }
- found := false
- for _, ns := range *nsList {
- if ns.Name == t.namespace {
- found = true
- break
- }
- }
- if !found {
- if isSystemNamespace(t.namespace) {
- return fmt.Errorf("attempting to deploy to system namespace '%s' which does not exist, please create it "+
- "to continue", t.namespace)
- }
- createNS := &types.CreateNamespaceRequest{
- Name: t.namespace,
- }
- if len(deplEnv.NamespaceAnnotations) > 0 {
- createNS.Annotations = deplEnv.NamespaceAnnotations
- }
- // create the new namespace
- _, err := t.client.CreateNewK8sNamespace(context.Background(), t.projectID, t.clusterID, createNS)
- if err != nil && !strings.Contains(err.Error(), "namespace already exists") {
- // ignore the error if the namespace already exists
- //
- // this might happen if someone creates the namespace in between this operation
- return fmt.Errorf("error creating namespace: %w", err)
- }
- }
- // attempt to read the deployment -- if it doesn't exist, create it
- _, err = t.client.GetDeployment(
- context.Background(),
- t.projectID, t.clusterID, t.envID,
- &types.GetDeploymentRequest{
- PRNumber: t.prID,
- },
- )
- if err != nil && strings.Contains(err.Error(), "not found") {
- // in this case, create the deployment
- _, err = t.client.CreateDeployment(
- context.Background(),
- t.projectID, t.gitInstallationID, t.clusterID,
- t.repoOwner, t.repoName,
- &types.CreateDeploymentRequest{
- Namespace: t.namespace,
- PullRequestID: t.prID,
- CreateGHDeploymentRequest: &types.CreateGHDeploymentRequest{
- ActionID: t.actionID,
- },
- GitHubMetadata: &types.GitHubMetadata{
- PRName: t.prName,
- RepoName: t.repoName,
- RepoOwner: t.repoOwner,
- CommitSHA: t.commitSHA,
- PRBranchFrom: t.branchFrom,
- PRBranchInto: t.branchInto,
- },
- },
- )
- } else if err == nil {
- _, err = t.client.UpdateDeployment(
- context.Background(),
- t.projectID, t.gitInstallationID, t.clusterID,
- t.repoOwner, t.repoName,
- &types.UpdateDeploymentRequest{
- Namespace: t.namespace,
- PRNumber: t.prID,
- CreateGHDeploymentRequest: &types.CreateGHDeploymentRequest{
- ActionID: t.actionID,
- },
- PRBranchFrom: t.branchFrom,
- CommitSHA: t.commitSHA,
- },
- )
- }
- return err
- }
- func (t *DeploymentHook) DataQueries() map[string]interface{} {
- res := make(map[string]interface{})
- // use the resource group to find all web applications that can have an exposed subdomain
- // that we can query for
- for _, resource := range t.resourceGroup.Resources {
- isWeb := false
- if sourceNameInter, exists := resource.Source["name"]; exists {
- if sourceName, ok := sourceNameInter.(string); ok {
- if sourceName == "web" {
- isWeb = true
- }
- }
- }
- if isWeb {
- // determine if we should query for porter_hosts or just hosts
- isCustomDomain := false
- ingressMap, err := deploy.GetNestedMap(resource.Config, "values", "ingress")
- if err == nil {
- enabledVal, enabledExists := ingressMap["enabled"]
- customDomVal, customDomExists := ingressMap["custom_domain"]
- if enabledExists && customDomExists {
- enabled, eOK := enabledVal.(bool)
- customDomain, cOK := customDomVal.(bool)
- if eOK && cOK && enabled {
- if customDomain {
- // return the first custom domain when one exists
- hostsArr, hostsExists := ingressMap["hosts"]
- if hostsExists {
- hostsArrVal, hostsArrOk := hostsArr.([]interface{})
- if hostsArrOk && len(hostsArrVal) > 0 {
- if _, ok := hostsArrVal[0].(string); ok {
- res[resource.Name] = fmt.Sprintf("{ .%s.ingress.hosts[0] }", resource.Name)
- isCustomDomain = true
- }
- }
- }
- }
- }
- }
- }
- if !isCustomDomain {
- res[resource.Name] = fmt.Sprintf("{ .%s.ingress.porter_hosts[0] }", resource.Name)
- }
- }
- }
- return res
- }
- func (t *DeploymentHook) PostApply(populatedData map[string]interface{}) error {
- subdomains := make([]string, 0)
- for _, data := range populatedData {
- domain, ok := data.(string)
- if !ok {
- continue
- }
- if _, err := url.Parse("https://" + domain); err == nil {
- subdomains = append(subdomains, "https://"+domain)
- }
- }
- req := &types.FinalizeDeploymentRequest{
- PRNumber: t.prID,
- Subdomain: strings.Join(subdomains, ", "),
- }
- for _, res := range t.resourceGroup.Resources {
- releaseType := getReleaseType(res)
- releaseName := getReleaseName(res)
- if releaseType != "" && releaseName != "" {
- req.SuccessfulResources = append(req.SuccessfulResources, &types.SuccessfullyDeployedResource{
- ReleaseName: releaseName,
- ReleaseType: releaseType,
- })
- }
- }
- // finalize the deployment
- _, err := t.client.FinalizeDeployment(
- context.Background(),
- t.projectID, t.gitInstallationID, t.clusterID,
- t.repoOwner, t.repoName, req,
- )
- return err
- }
- func (t *DeploymentHook) OnError(error) {
- // if the deployment exists, throw an error for that deployment
- _, err := t.client.GetDeployment(
- context.Background(),
- t.projectID, t.clusterID, t.envID,
- &types.GetDeploymentRequest{
- PRNumber: t.prID,
- },
- )
- if err == nil {
- // FIXME: try to use the error with a custom logger
- t.client.UpdateDeploymentStatus(
- context.Background(),
- t.projectID, t.gitInstallationID, t.clusterID,
- t.repoOwner, t.repoName,
- &types.UpdateDeploymentStatusRequest{
- PRNumber: t.prID,
- CreateGHDeploymentRequest: &types.CreateGHDeploymentRequest{
- ActionID: t.actionID,
- },
- PRBranchFrom: t.branchFrom,
- Status: string(types.DeploymentStatusFailed),
- },
- )
- }
- }
- func (t *DeploymentHook) OnConsolidatedErrors(allErrors map[string]error) {
- // if the deployment exists, throw an error for that deployment
- _, getDeplErr := t.client.GetDeployment(
- context.Background(),
- t.projectID, t.clusterID, t.envID,
- &types.GetDeploymentRequest{
- PRNumber: t.prID,
- },
- )
- if getDeplErr == nil {
- req := &types.FinalizeDeploymentWithErrorsRequest{
- PRNumber: t.prID,
- Errors: make(map[string]string),
- }
- for _, res := range t.resourceGroup.Resources {
- if _, ok := allErrors[res.Name]; !ok {
- req.SuccessfulResources = append(req.SuccessfulResources, &types.SuccessfullyDeployedResource{
- ReleaseName: getReleaseName(res),
- ReleaseType: getReleaseType(res),
- })
- }
- }
- for res, err := range allErrors {
- req.Errors[res] = err.Error()
- }
- // FIXME: handle the error
- t.client.FinalizeDeploymentWithErrors(
- context.Background(),
- t.projectID, t.gitInstallationID, t.clusterID,
- t.repoOwner, t.repoName,
- req,
- )
- }
- }
- type CloneEnvGroupHook struct {
- client *api.Client
- resGroup *switchboardTypes.ResourceGroup
- }
- func NewCloneEnvGroupHook(client *api.Client, resourceGroup *switchboardTypes.ResourceGroup) *CloneEnvGroupHook {
- return &CloneEnvGroupHook{
- client: client,
- resGroup: resourceGroup,
- }
- }
- func (t *CloneEnvGroupHook) PreApply() error {
- for _, res := range t.resGroup.Resources {
- if res.Driver == "env-group" {
- continue
- }
- appConf := &previewInt.ApplicationConfig{}
- err := mapstructure.Decode(res.Config, &appConf)
- if err != nil {
- continue
- }
- if appConf != nil && len(appConf.EnvGroups) > 0 {
- target, err := preview.GetTarget(res.Name, res.Target)
- if err != nil {
- return err
- }
- for _, group := range appConf.EnvGroups {
- if group.Name == "" {
- return fmt.Errorf("env group name cannot be empty")
- }
- _, err := t.client.GetEnvGroup(
- context.Background(),
- target.Project,
- target.Cluster,
- target.Namespace,
- &types.GetEnvGroupRequest{
- Name: group.Name,
- Version: group.Version,
- },
- )
- if err != nil && err.Error() == "env group not found" {
- if group.Namespace == "" {
- return fmt.Errorf("env group namespace cannot be empty")
- }
- color.New(color.FgBlue, color.Bold).
- Printf("Env group '%s' does not exist in the target namespace '%s'\n", group.Name, target.Namespace)
- color.New(color.FgBlue, color.Bold).
- Printf("Cloning env group '%s' from namespace '%s' to target namespace '%s'\n",
- group.Name, group.Namespace, target.Namespace)
- _, err = t.client.CloneEnvGroup(
- context.Background(), target.Project, target.Cluster, group.Namespace,
- &types.CloneEnvGroupRequest{
- Name: group.Name,
- Namespace: target.Namespace,
- },
- )
- if err != nil {
- return err
- }
- } else if err != nil {
- return err
- }
- }
- }
- }
- return nil
- }
- func (t *CloneEnvGroupHook) DataQueries() map[string]interface{} {
- return nil
- }
- func (t *CloneEnvGroupHook) PostApply(map[string]interface{}) error {
- return nil
- }
- func (t *CloneEnvGroupHook) OnError(error) {}
- func (t *CloneEnvGroupHook) OnConsolidatedErrors(map[string]error) {}
- func getReleaseName(res *switchboardTypes.Resource) string {
- // can ignore the error because this method is called once
- // GetTarget has alrealy been called and validated previously
- target, _ := preview.GetTarget(res.Name, res.Target)
- if target.AppName != "" {
- return target.AppName
- }
- return res.Name
- }
- func getReleaseType(res *switchboardTypes.Resource) string {
- // can ignore the error because this method is called once
- // GetSource has alrealy been called and validated previously
- source, _ := preview.GetSource(res.Name, res.Source)
- if source != nil && source.Name != "" {
- return source.Name
- }
- return ""
- }
- func isSystemNamespace(namespace string) bool {
- return namespace == "cert-manager" || namespace == "ingress-nginx" ||
- namespace == "kube-node-lease" || namespace == "kube-public" ||
- namespace == "kube-system" || namespace == "monitoring" ||
- namespace == "porter-agent-system" || namespace == "default" ||
- namespace == "ingress-nginx-private"
- }
|