rollback.go 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. package porter_app
  2. import (
  3. "fmt"
  4. "net/http"
  5. "strings"
  6. "github.com/porter-dev/porter/api/server/authz"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/server/shared/requestutils"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/helm"
  14. "github.com/porter-dev/porter/internal/models"
  15. "github.com/porter-dev/porter/internal/telemetry"
  16. "gopkg.in/yaml.v2"
  17. )
  18. type RollbackPorterAppHandler struct {
  19. handlers.PorterHandlerReadWriter
  20. authz.KubernetesAgentGetter
  21. }
  22. func NewRollbackPorterAppHandler(
  23. config *config.Config,
  24. decoderValidator shared.RequestDecoderValidator,
  25. writer shared.ResultWriter,
  26. ) *RollbackPorterAppHandler {
  27. return &RollbackPorterAppHandler{
  28. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  29. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  30. }
  31. }
  32. func (c *RollbackPorterAppHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  33. ctx, span := telemetry.NewSpan(r.Context(), "serve-rollback-porter-app")
  34. defer span.End()
  35. cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster)
  36. request := &types.RollbackPorterAppRequest{}
  37. if ok := c.DecodeAndValidate(w, r, request); !ok {
  38. err := telemetry.Error(ctx, span, nil, "error decoding request")
  39. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  40. return
  41. }
  42. stackName, reqErr := requestutils.GetURLParamString(r, types.URLParamStackName)
  43. if reqErr != nil {
  44. err := telemetry.Error(ctx, span, reqErr, "error getting stack name from url")
  45. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  46. return
  47. }
  48. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "stack-name", Value: stackName})
  49. namespace := fmt.Sprintf("porter-stack-%s", stackName)
  50. helmAgent, err := c.GetHelmAgent(ctx, r, cluster, namespace)
  51. if err != nil {
  52. err = telemetry.Error(ctx, span, err, "error getting helm agent")
  53. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  54. return
  55. }
  56. k8sAgent, err := c.GetAgent(r, cluster, namespace)
  57. if err != nil {
  58. err = telemetry.Error(ctx, span, err, "error getting k8s agent")
  59. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  60. return
  61. }
  62. helmReleaseFromRequestedRevision, err := helmAgent.GetRelease(ctx, stackName, request.Revision, false)
  63. if err != nil {
  64. err = telemetry.Error(ctx, span, err, "error getting helm release for requested revision")
  65. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  66. return
  67. }
  68. latestHelmRelease, err := helmAgent.GetRelease(ctx, stackName, 0, false)
  69. if err != nil {
  70. err = telemetry.Error(ctx, span, err, "error getting latest helm release")
  71. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  72. return
  73. }
  74. valuesYaml, err := yaml.Marshal(helmReleaseFromRequestedRevision.Config)
  75. if err != nil {
  76. err = telemetry.Error(ctx, span, err, "error marshalling helm release config to yaml")
  77. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  78. return
  79. }
  80. imageInfo := attemptToGetImageInfoFromRelease(helmReleaseFromRequestedRevision.Config)
  81. if imageInfo.Tag == "" {
  82. imageInfo.Tag = "latest"
  83. }
  84. porterApp, err := c.Repo().PorterApp().ReadPorterAppByName(cluster.ID, stackName)
  85. if err != nil {
  86. err = telemetry.Error(ctx, span, err, "error getting porter app")
  87. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  88. return
  89. }
  90. injectLauncher := strings.Contains(porterApp.Builder, "heroku") ||
  91. strings.Contains(porterApp.Builder, "paketo")
  92. registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  93. if err != nil {
  94. err = telemetry.Error(ctx, span, err, "error listing registries")
  95. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  96. return
  97. }
  98. chart, values, _, err := parse(
  99. ctx,
  100. ParseConf{
  101. ImageInfo: imageInfo,
  102. ServerConfig: c.Config(),
  103. ProjectID: cluster.ProjectID,
  104. Namespace: namespace,
  105. SubdomainCreateOpts: SubdomainCreateOpts{
  106. k8sAgent: k8sAgent,
  107. dnsRepo: c.Repo().DNSRecord(),
  108. powerDnsClient: c.Config().PowerDNSClient,
  109. appRootDomain: c.Config().ServerConf.AppRootDomain,
  110. stackName: stackName,
  111. },
  112. InjectLauncherToStartCommand: injectLauncher,
  113. FullHelmValues: string(valuesYaml),
  114. },
  115. )
  116. if err != nil {
  117. err = telemetry.Error(ctx, span, err, "error parsing helm chart")
  118. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  119. return
  120. }
  121. conf := &helm.InstallChartConfig{
  122. Chart: chart,
  123. Name: stackName,
  124. Namespace: namespace,
  125. Values: values,
  126. Cluster: cluster,
  127. Repo: c.Repo(),
  128. Registries: registries,
  129. }
  130. _, err = helmAgent.UpgradeInstallChart(ctx, conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection)
  131. if err != nil {
  132. err = telemetry.Error(ctx, span, err, "error upgrading application")
  133. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  134. return
  135. }
  136. _, err = createPorterAppEvent(ctx, "SUCCESS", porterApp.ID, latestHelmRelease.Version+1, imageInfo.Tag, c.Repo().PorterAppEvent())
  137. if err != nil {
  138. err = telemetry.Error(ctx, span, err, "error creating porter app event")
  139. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  140. return
  141. }
  142. }