create_env_group.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383
  1. package namespace
  2. import (
  3. "fmt"
  4. "net/http"
  5. "strings"
  6. "sync"
  7. "sigs.k8s.io/yaml"
  8. "helm.sh/helm/v3/pkg/release"
  9. v1 "k8s.io/api/core/v1"
  10. "github.com/porter-dev/porter/api/server/authz"
  11. "github.com/porter-dev/porter/api/server/handlers"
  12. "github.com/porter-dev/porter/api/server/shared"
  13. "github.com/porter-dev/porter/api/server/shared/apierrors"
  14. "github.com/porter-dev/porter/api/server/shared/config"
  15. "github.com/porter-dev/porter/api/types"
  16. "github.com/porter-dev/porter/internal/helm"
  17. "github.com/porter-dev/porter/internal/kubernetes/envgroup"
  18. "github.com/porter-dev/porter/internal/models"
  19. "github.com/porter-dev/porter/internal/stacks"
  20. )
  21. type CreateEnvGroupHandler struct {
  22. handlers.PorterHandlerReadWriter
  23. authz.KubernetesAgentGetter
  24. }
  25. func NewCreateEnvGroupHandler(
  26. config *config.Config,
  27. decoderValidator shared.RequestDecoderValidator,
  28. writer shared.ResultWriter,
  29. ) *CreateEnvGroupHandler {
  30. return &CreateEnvGroupHandler{
  31. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  32. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  33. }
  34. }
  35. func (c *CreateEnvGroupHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  36. request := &types.CreateEnvGroupRequest{}
  37. if ok := c.DecodeAndValidate(w, r, request); !ok {
  38. return
  39. }
  40. namespace := r.Context().Value(types.NamespaceScope).(string)
  41. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  42. agent, err := c.GetAgent(r, cluster, namespace)
  43. if err != nil {
  44. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  45. return
  46. }
  47. envGroup, err := envgroup.GetEnvGroup(agent, request.Name, namespace, 0)
  48. // if the environment group exists and has MetaVersion=1, throw an error
  49. if envGroup != nil && envGroup.MetaVersion == 1 {
  50. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  51. fmt.Errorf("env group with that name already exists"),
  52. http.StatusNotFound,
  53. ))
  54. return
  55. }
  56. helmAgent, err := c.GetHelmAgent(r, cluster, namespace)
  57. if err != nil {
  58. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  59. return
  60. }
  61. configMap, err := envgroup.CreateEnvGroup(agent, types.ConfigMapInput{
  62. Name: request.Name,
  63. Namespace: namespace,
  64. Variables: request.Variables,
  65. SecretVariables: request.SecretVariables,
  66. })
  67. if err != nil {
  68. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  69. return
  70. }
  71. envGroup, err = envgroup.ToEnvGroup(configMap)
  72. if err != nil {
  73. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  74. return
  75. }
  76. releases, err := envgroup.GetSyncedReleases(helmAgent, configMap)
  77. if err != nil {
  78. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  79. return
  80. }
  81. c.WriteResult(w, r, envGroup)
  82. // trigger rollout of new applications after writing the result
  83. errors := rolloutApplications(c.Config(), cluster, helmAgent, envGroup, configMap, releases)
  84. if len(errors) > 0 {
  85. errStrArr := make([]string, 0)
  86. for _, err := range errors {
  87. errStrArr = append(errStrArr, err.Error())
  88. }
  89. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(fmt.Errorf(strings.Join(errStrArr, ","))))
  90. return
  91. }
  92. err = postUpgrade(c.Config(), cluster.ProjectID, cluster.ID, envGroup)
  93. if err != nil {
  94. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(err))
  95. return
  96. }
  97. }
  98. func rolloutApplications(
  99. config *config.Config,
  100. cluster *models.Cluster,
  101. helmAgent *helm.Agent,
  102. envGroup *types.EnvGroup,
  103. configMap *v1.ConfigMap,
  104. releases []*release.Release,
  105. ) []error {
  106. registries, err := config.Repo.Registry().ListRegistriesByProjectID(cluster.ProjectID)
  107. if err != nil {
  108. return []error{err}
  109. }
  110. // construct the synced env section that should be written
  111. newSection := &SyncedEnvSection{
  112. Name: envGroup.Name,
  113. Version: envGroup.Version,
  114. }
  115. newSectionKeys := make([]SyncedEnvSectionKey, 0)
  116. for key, val := range configMap.Data {
  117. newSectionKeys = append(newSectionKeys, SyncedEnvSectionKey{
  118. Name: key,
  119. Secret: strings.Contains(val, "PORTERSECRET"),
  120. })
  121. }
  122. newSection.Keys = newSectionKeys
  123. // asynchronously update releases with that image repo uri
  124. var wg sync.WaitGroup
  125. mu := &sync.Mutex{}
  126. errors := make([]error, 0)
  127. for i, rel := range releases {
  128. index := i
  129. release := rel
  130. wg.Add(1)
  131. go func() {
  132. defer wg.Done()
  133. // read release via agent
  134. newConfig, err := getNewConfig(release.Config, newSection)
  135. if err != nil {
  136. mu.Lock()
  137. errors = append(errors, err)
  138. mu.Unlock()
  139. return
  140. }
  141. // if this is a job chart, update the config and set correct paused param to true
  142. if release.Chart.Name() == "job" {
  143. newConfig["paused"] = true
  144. }
  145. conf := &helm.UpgradeReleaseConfig{
  146. Name: releases[index].Name,
  147. Cluster: cluster,
  148. Repo: config.Repo,
  149. Registries: registries,
  150. Values: newConfig,
  151. }
  152. _, err = helmAgent.UpgradeReleaseByValues(conf, config.DOConf)
  153. if err != nil {
  154. mu.Lock()
  155. errors = append(errors, err)
  156. mu.Unlock()
  157. return
  158. }
  159. }()
  160. }
  161. wg.Wait()
  162. return errors
  163. }
  164. type SyncedEnvSection struct {
  165. Name string `json:"name" yaml:"name"`
  166. Version uint `json:"version" yaml:"version"`
  167. Keys []SyncedEnvSectionKey `json:"keys" yaml:"keys"`
  168. }
  169. type SyncedEnvSectionKey struct {
  170. Name string `json:"name" yaml:"name"`
  171. Secret bool `json:"secret" yaml:"secret"`
  172. }
  173. func getNewConfig(curr map[string]interface{}, syncedEnvSection *SyncedEnvSection) (map[string]interface{}, error) {
  174. // look for container.env.synced
  175. envConf, err := getNestedMap(curr, "container", "env")
  176. if err != nil {
  177. return nil, err
  178. }
  179. syncedEnvInter, syncedEnvExists := envConf["synced"]
  180. if !syncedEnvExists {
  181. return curr, nil
  182. } else {
  183. syncedArr := make([]*SyncedEnvSection, 0)
  184. syncedArrInter, ok := syncedEnvInter.([]interface{})
  185. if !ok {
  186. return nil, fmt.Errorf("could not convert to synced env section: not an array")
  187. }
  188. for _, syncedArrInterObj := range syncedArrInter {
  189. syncedArrObj := &SyncedEnvSection{}
  190. syncedArrInterObjMap, ok := syncedArrInterObj.(map[string]interface{})
  191. if !ok {
  192. continue
  193. }
  194. if nameField, nameFieldExists := syncedArrInterObjMap["name"]; nameFieldExists {
  195. syncedArrObj.Name, ok = nameField.(string)
  196. if !ok {
  197. continue
  198. }
  199. }
  200. if versionField, versionFieldExists := syncedArrInterObjMap["version"]; versionFieldExists {
  201. versionFloat, ok := versionField.(float64)
  202. if !ok {
  203. continue
  204. }
  205. syncedArrObj.Version = uint(versionFloat)
  206. }
  207. if keyField, keyFieldExists := syncedArrInterObjMap["keys"]; keyFieldExists {
  208. keyFieldInterArr, ok := keyField.([]interface{})
  209. if !ok {
  210. continue
  211. }
  212. keyFieldMapArr := make([]map[string]interface{}, 0)
  213. for _, keyFieldInter := range keyFieldInterArr {
  214. mapConv, ok := keyFieldInter.(map[string]interface{})
  215. if !ok {
  216. continue
  217. }
  218. keyFieldMapArr = append(keyFieldMapArr, mapConv)
  219. }
  220. keyFieldRes := make([]SyncedEnvSectionKey, 0)
  221. for _, keyFieldMap := range keyFieldMapArr {
  222. toAdd := SyncedEnvSectionKey{}
  223. if nameField, nameFieldExists := keyFieldMap["name"]; nameFieldExists {
  224. toAdd.Name, ok = nameField.(string)
  225. if !ok {
  226. continue
  227. }
  228. }
  229. if secretField, secretFieldExists := keyFieldMap["secret"]; secretFieldExists {
  230. toAdd.Secret, ok = secretField.(bool)
  231. if !ok {
  232. continue
  233. }
  234. }
  235. keyFieldRes = append(keyFieldRes, toAdd)
  236. }
  237. syncedArrObj.Keys = keyFieldRes
  238. }
  239. syncedArr = append(syncedArr, syncedArrObj)
  240. }
  241. resArr := make([]SyncedEnvSection, 0)
  242. foundMatch := false
  243. for _, candidate := range syncedArr {
  244. if candidate.Name == syncedEnvSection.Name {
  245. resArr = append(resArr, *syncedEnvSection)
  246. foundMatch = true
  247. } else {
  248. resArr = append(resArr, *candidate)
  249. }
  250. }
  251. if !foundMatch {
  252. return curr, nil
  253. }
  254. envConf["synced"] = resArr
  255. }
  256. // to remove all types that Helm may not be able to work with, we marshal to and from
  257. // yaml for good measure. Otherwise we get silly error messages like:
  258. // Upgrade failed: template: web/templates/deployment.yaml:138:40: executing \"web/templates/deployment.yaml\"
  259. // at <$syncedEnv.keys>: can't evaluate field keys in type namespace.SyncedEnvSection
  260. currYAML, err := yaml.Marshal(curr)
  261. if err != nil {
  262. return nil, err
  263. }
  264. res := make(map[string]interface{})
  265. err = yaml.Unmarshal([]byte(currYAML), &res)
  266. if err != nil {
  267. return nil, err
  268. }
  269. return res, nil
  270. }
  271. func getNestedMap(obj map[string]interface{}, fields ...string) (map[string]interface{}, error) {
  272. var res map[string]interface{}
  273. curr := obj
  274. for _, field := range fields {
  275. objField, ok := curr[field]
  276. if !ok {
  277. return nil, fmt.Errorf("%s not found", field)
  278. }
  279. res, ok = objField.(map[string]interface{})
  280. if !ok {
  281. return nil, fmt.Errorf("%s is not a nested object", field)
  282. }
  283. curr = res
  284. }
  285. return res, nil
  286. }
  287. // postUpgrade runs any necessary scripting after the release has been upgraded.
  288. func postUpgrade(config *config.Config, projectID, clusterID uint, envGroup *types.EnvGroup) error {
  289. // update the relevant env group version number if tied to a stack resource
  290. return stacks.UpdateEnvGroupVersion(config, projectID, clusterID, envGroup)
  291. }