upgrade_webhook.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216
  1. package release
  2. import (
  3. "fmt"
  4. "net/http"
  5. "net/url"
  6. "github.com/porter-dev/porter/api/server/authz"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/server/shared/requestutils"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/analytics"
  14. "github.com/porter-dev/porter/internal/helm"
  15. "github.com/porter-dev/porter/internal/integrations/slack"
  16. "gorm.io/gorm"
  17. )
  18. type WebhookHandler struct {
  19. handlers.PorterHandlerReadWriter
  20. authz.KubernetesAgentGetter
  21. }
  22. func NewWebhookHandler(
  23. config *config.Config,
  24. decoderValidator shared.RequestDecoderValidator,
  25. writer shared.ResultWriter,
  26. ) *WebhookHandler {
  27. return &WebhookHandler{
  28. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  29. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  30. }
  31. }
  32. func (c *WebhookHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  33. token, _ := requestutils.GetURLParamString(r, types.URLParamToken)
  34. // retrieve release by token
  35. release, err := c.Repo().Release().ReadReleaseByWebhookToken(token)
  36. if err != nil {
  37. if err == gorm.ErrRecordNotFound {
  38. // throw forbidden error, since we don't want a way to verify if webhooks exist
  39. c.HandleAPIError(w, r, apierrors.NewErrForbidden(
  40. fmt.Errorf("release not found with given webhook"),
  41. ))
  42. return
  43. }
  44. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  45. return
  46. }
  47. cluster, err := c.Repo().Cluster().ReadCluster(release.ProjectID, release.ClusterID)
  48. if err != nil {
  49. if err == gorm.ErrRecordNotFound {
  50. // throw forbidden error, since we don't want a way to verify if the cluster and project
  51. // still exist for a cluster that's been deleted
  52. c.HandleAPIError(w, r, apierrors.NewErrForbidden(
  53. fmt.Errorf("cluster %d in project %d not found for upgrade webhook", release.ClusterID, release.ProjectID),
  54. ))
  55. return
  56. }
  57. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  58. return
  59. }
  60. // in this case, we retrieve the agent by passing in the namespace field directly, since
  61. // it cannot be detected from the URL
  62. helmAgent, err := c.GetHelmAgent(r, cluster, release.Namespace)
  63. if err != nil {
  64. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  65. return
  66. }
  67. request := &types.WebhookRequest{}
  68. if ok := c.DecodeAndValidate(w, r, request); !ok {
  69. return
  70. }
  71. rel, err := helmAgent.GetRelease(release.Name, 0, true)
  72. if err != nil {
  73. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  74. return
  75. }
  76. // repository is set to current repository by default
  77. repository := rel.Config["image"].(map[string]interface{})["repository"]
  78. gitAction := release.GitActionConfig
  79. if gitAction != nil && gitAction.ID != 0 && (repository == "porterdev/hello-porter" || repository == "public.ecr.aws/o1j4x7p4/hello-porter") {
  80. repository = gitAction.ImageRepoURI
  81. } else if gitAction != nil && gitAction.ID != 0 && (repository == "porterdev/hello-porter-job" || repository == "public.ecr.aws/o1j4x7p4/hello-porter-job") {
  82. repository = gitAction.ImageRepoURI
  83. }
  84. image := map[string]interface{}{}
  85. image["repository"] = repository
  86. image["tag"] = request.Commit
  87. rel.Config["image"] = image
  88. if rel.Config["auto_deploy"] == false {
  89. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  90. fmt.Errorf("Deploy webhook is disabled for this deployment."),
  91. http.StatusBadRequest,
  92. ))
  93. return
  94. }
  95. registries, err := c.Repo().Registry().ListRegistriesByProjectID(release.ProjectID)
  96. if err != nil {
  97. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  98. return
  99. }
  100. conf := &helm.UpgradeReleaseConfig{
  101. Name: release.Name,
  102. Cluster: cluster,
  103. Repo: c.Repo(),
  104. Registries: registries,
  105. Values: rel.Config,
  106. }
  107. slackInts, _ := c.Repo().SlackIntegration().ListSlackIntegrationsByProjectID(release.ProjectID)
  108. var notifConf *types.NotificationConfig
  109. notifConf = nil
  110. if release != nil && release.NotificationConfig != 0 {
  111. conf, err := c.Repo().NotificationConfig().ReadNotificationConfig(release.NotificationConfig)
  112. if err != nil {
  113. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  114. return
  115. }
  116. notifConf = conf.ToNotificationConfigType()
  117. }
  118. notifier := slack.NewSlackNotifier(notifConf, slackInts...)
  119. notifyOpts := &slack.NotifyOpts{
  120. ProjectID: release.ProjectID,
  121. ClusterID: cluster.ID,
  122. ClusterName: cluster.Name,
  123. Name: rel.Name,
  124. Namespace: rel.Namespace,
  125. URL: fmt.Sprintf(
  126. "%s/applications/%s/%s/%s?project_id=%d",
  127. c.Config().ServerConf.ServerURL,
  128. url.PathEscape(cluster.Name),
  129. release.Namespace,
  130. rel.Name,
  131. cluster.ProjectID,
  132. ),
  133. }
  134. rel, err = helmAgent.UpgradeReleaseByValues(conf, c.Config().DOConf)
  135. if err != nil {
  136. notifyOpts.Status = slack.StatusHelmFailed
  137. notifyOpts.Info = err.Error()
  138. if !cluster.NotificationsDisabled {
  139. notifier.Notify(notifyOpts)
  140. }
  141. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  142. err,
  143. http.StatusBadRequest,
  144. ))
  145. return
  146. }
  147. if rel.Chart != nil && rel.Chart.Metadata.Name != "job" {
  148. notifyOpts.Status = slack.StatusHelmDeployed
  149. notifyOpts.Version = rel.Version
  150. if !cluster.NotificationsDisabled {
  151. notifier.Notify(notifyOpts)
  152. }
  153. }
  154. c.Config().AnalyticsClient.Track(analytics.ApplicationDeploymentWebhookTrack(&analytics.ApplicationDeploymentWebhookTrackOpts{
  155. ImageURI: fmt.Sprintf("%v", repository),
  156. ApplicationScopedTrackOpts: analytics.GetApplicationScopedTrackOpts(
  157. 0,
  158. release.ProjectID,
  159. release.ClusterID,
  160. release.Name,
  161. release.Namespace,
  162. rel.Chart.Metadata.Name,
  163. ),
  164. }))
  165. c.WriteResult(w, r, nil)
  166. err = postUpgrade(c.Config(), cluster.ProjectID, cluster.ID, rel)
  167. if err != nil {
  168. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(err))
  169. return
  170. }
  171. }