2
0

create.go 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346
  1. package stack
  2. import (
  3. "fmt"
  4. "net/http"
  5. "strings"
  6. "github.com/porter-dev/porter/api/server/authz"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/handlers/release"
  9. "github.com/porter-dev/porter/api/server/shared"
  10. "github.com/porter-dev/porter/api/server/shared/apierrors"
  11. "github.com/porter-dev/porter/api/server/shared/config"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/encryption"
  14. "github.com/porter-dev/porter/internal/kubernetes/envgroup"
  15. "github.com/porter-dev/porter/internal/models"
  16. helmrelease "helm.sh/helm/v3/pkg/release"
  17. )
  18. type StackCreateHandler struct {
  19. handlers.PorterHandlerReadWriter
  20. authz.KubernetesAgentGetter
  21. }
  22. func NewStackCreateHandler(
  23. config *config.Config,
  24. reader shared.RequestDecoderValidator,
  25. writer shared.ResultWriter,
  26. ) *StackCreateHandler {
  27. return &StackCreateHandler{
  28. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, reader, writer),
  29. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  30. }
  31. }
  32. func (p *StackCreateHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  33. proj, _ := r.Context().Value(types.ProjectScope).(*models.Project)
  34. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  35. namespace, _ := r.Context().Value(types.NamespaceScope).(string)
  36. req := &types.CreateStackRequest{}
  37. if ok := p.DecodeAndValidate(w, r, req); !ok {
  38. return
  39. }
  40. uid, err := encryption.GenerateRandomBytes(16)
  41. if err != nil {
  42. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  43. return
  44. }
  45. sourceConfigs, err := getSourceConfigModels(req.SourceConfigs)
  46. if err != nil {
  47. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  48. return
  49. }
  50. resources, err := getResourceModels(req.AppResources, sourceConfigs, p.Config().ServerConf.DefaultApplicationHelmRepoURL)
  51. if err != nil {
  52. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  53. return
  54. }
  55. envGroups, err := getEnvGroupModels(req.EnvGroups, proj.ID, cluster.ID, namespace)
  56. if err != nil {
  57. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  58. return
  59. }
  60. // write stack to the database with creating status
  61. stack := &models.Stack{
  62. ProjectID: proj.ID,
  63. ClusterID: cluster.ID,
  64. Namespace: namespace,
  65. Name: req.Name,
  66. UID: uid,
  67. Revisions: []models.StackRevision{
  68. {
  69. RevisionNumber: 1,
  70. Status: string(types.StackRevisionStatusDeploying),
  71. SourceConfigs: sourceConfigs,
  72. Resources: resources,
  73. EnvGroups: envGroups,
  74. },
  75. },
  76. }
  77. stack, err = p.Repo().Stack().CreateStack(stack)
  78. if err != nil {
  79. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  80. return
  81. }
  82. // apply all env groups
  83. k8sAgent, err := p.GetAgent(r, cluster, "")
  84. if err != nil {
  85. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  86. return
  87. }
  88. envGroupDeployErrors := make([]string, 0)
  89. for _, envGroup := range req.EnvGroups {
  90. cm, err := envgroup.CreateEnvGroup(k8sAgent, types.ConfigMapInput{
  91. Name: envGroup.Name,
  92. Namespace: namespace,
  93. Variables: envGroup.Variables,
  94. SecretVariables: envGroup.SecretVariables,
  95. })
  96. if err != nil {
  97. envGroupDeployErrors = append(envGroupDeployErrors, fmt.Sprintf("error creating env group %s", envGroup.Name))
  98. }
  99. // add each of the linked applications to the env group
  100. for _, appName := range envGroup.LinkedApplications {
  101. cm, err = k8sAgent.AddApplicationToVersionedConfigMap(cm, appName)
  102. if err != nil {
  103. envGroupDeployErrors = append(envGroupDeployErrors, fmt.Sprintf("error creating env group %s", envGroup.Name))
  104. }
  105. }
  106. }
  107. revision := &stack.Revisions[0]
  108. if len(envGroupDeployErrors) > 0 {
  109. revision.Status = string(types.StackRevisionStatusFailed)
  110. revision.Reason = "EnvGroupDeployErr"
  111. revision.Message = strings.Join(envGroupDeployErrors, " , ")
  112. revision, err = p.Repo().Stack().UpdateStackRevision(revision)
  113. if err != nil {
  114. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  115. return
  116. }
  117. } else {
  118. // apply all app resources
  119. registries, err := p.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  120. if err != nil {
  121. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  122. return
  123. }
  124. helmAgent, err := p.GetHelmAgent(r, cluster, "")
  125. if err != nil {
  126. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  127. return
  128. }
  129. helmReleaseMap := make(map[string]*helmrelease.Release)
  130. deployErrs := make([]string, 0)
  131. for _, appResource := range req.AppResources {
  132. rel, err := applyAppResource(&applyAppResourceOpts{
  133. config: p.Config(),
  134. projectID: proj.ID,
  135. namespace: namespace,
  136. cluster: cluster,
  137. registries: registries,
  138. helmAgent: helmAgent,
  139. request: appResource,
  140. })
  141. if err != nil {
  142. deployErrs = append(deployErrs, err.Error())
  143. } else {
  144. helmReleaseMap[fmt.Sprintf("%s/%s", namespace, appResource.Name)] = rel
  145. }
  146. }
  147. // update stack revision status
  148. if len(deployErrs) > 0 {
  149. revision.Status = string(types.StackRevisionStatusFailed)
  150. revision.Reason = "DeployError"
  151. revision.Message = strings.Join(deployErrs, " , ")
  152. } else {
  153. revision.Status = string(types.StackRevisionStatusDeployed)
  154. }
  155. revision, err = p.Repo().Stack().UpdateStackRevision(revision)
  156. if err != nil {
  157. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  158. return
  159. }
  160. saveErrs := make([]string, 0)
  161. for _, resource := range revision.Resources {
  162. if rel, exists := helmReleaseMap[fmt.Sprintf("%s/%s", namespace, resource.Name)]; exists {
  163. _, err = release.CreateAppReleaseFromHelmRelease(p.Config(), proj.ID, cluster.ID, resource.ID, rel)
  164. if err != nil {
  165. saveErrs = append(saveErrs, fmt.Sprintf("the resource %s/%s could not be saved right now", namespace, resource.Name))
  166. }
  167. }
  168. }
  169. if len(saveErrs) > 0 {
  170. revision.Reason = "SaveError"
  171. revision.Message = strings.Join(saveErrs, " , ")
  172. revision, err = p.Repo().Stack().UpdateStackRevision(revision)
  173. if err != nil {
  174. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  175. return
  176. }
  177. }
  178. }
  179. if revision.Status != string(types.StackRevisionStatusFailed) && len(revision.Reason) == 0 {
  180. revision.Reason = "CreationSuccess"
  181. revision.Message = "Stack deployed successfully"
  182. revision, err = p.Repo().Stack().UpdateStackRevision(revision)
  183. if err != nil {
  184. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  185. return
  186. }
  187. }
  188. // read the stack again to get the latest revision info
  189. stack, err = p.Repo().Stack().ReadStackByStringID(proj.ID, stack.UID)
  190. if err != nil {
  191. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  192. return
  193. }
  194. w.WriteHeader(http.StatusCreated)
  195. p.WriteResult(w, r, stack.ToStackType())
  196. }
  197. func getSourceConfigModels(sourceConfigs []*types.CreateStackSourceConfigRequest) ([]models.StackSourceConfig, error) {
  198. res := make([]models.StackSourceConfig, 0)
  199. // for now, only write source configs which are deployed as a docker image
  200. // TODO: add parsing/writes for git-based sources
  201. for _, sourceConfig := range sourceConfigs {
  202. if sourceConfig.StackSourceConfigBuild == nil {
  203. uid, err := encryption.GenerateRandomBytes(16)
  204. if err != nil {
  205. return nil, err
  206. }
  207. newSourceConfig := &models.StackSourceConfig{
  208. UID: uid,
  209. Name: sourceConfig.Name,
  210. ImageRepoURI: sourceConfig.ImageRepoURI,
  211. ImageTag: sourceConfig.ImageTag,
  212. }
  213. // If the source config had a source config ID then we need to copy it over
  214. if sourceConfig.StableSourceConfigID != "" {
  215. newSourceConfig.StableSourceConfigID = sourceConfig.StableSourceConfigID
  216. } else {
  217. newSourceConfig.StableSourceConfigID = string(uid)
  218. }
  219. res = append(res, *newSourceConfig)
  220. }
  221. }
  222. return res, nil
  223. }
  224. func getResourceModels(appResources []*types.CreateStackAppResourceRequest, sourceConfigs []models.StackSourceConfig, defaultRepoURL string) ([]models.StackResource, error) {
  225. res := make([]models.StackResource, 0)
  226. for _, appResource := range appResources {
  227. if appResource.TemplateRepoURL == "" {
  228. appResource.TemplateRepoURL = defaultRepoURL
  229. }
  230. uid, err := encryption.GenerateRandomBytes(16)
  231. if err != nil {
  232. return nil, err
  233. }
  234. var linkedSourceConfigUID string
  235. for _, sourceConfig := range sourceConfigs {
  236. if sourceConfig.Name == appResource.SourceConfigName {
  237. linkedSourceConfigUID = sourceConfig.UID
  238. }
  239. }
  240. if linkedSourceConfigUID == "" {
  241. return nil, fmt.Errorf("source config %s does not exist in source config list", appResource.SourceConfigName)
  242. }
  243. res = append(res, models.StackResource{
  244. Name: appResource.Name,
  245. UID: uid,
  246. StackSourceConfigUID: linkedSourceConfigUID,
  247. TemplateRepoURL: appResource.TemplateRepoURL,
  248. TemplateName: appResource.TemplateName,
  249. TemplateVersion: appResource.TemplateVersion,
  250. HelmRevisionID: 1,
  251. })
  252. }
  253. return res, nil
  254. }
  255. func getEnvGroupModels(envGroups []*types.CreateStackEnvGroupRequest, projID, clusterID uint, namespace string) ([]models.StackEnvGroup, error) {
  256. res := make([]models.StackEnvGroup, 0)
  257. for _, envGroup := range envGroups {
  258. uid, err := encryption.GenerateRandomBytes(16)
  259. if err != nil {
  260. return nil, err
  261. }
  262. res = append(res, models.StackEnvGroup{
  263. Name: envGroup.Name,
  264. UID: uid,
  265. EnvGroupVersion: 1,
  266. ProjectID: projID,
  267. ClusterID: clusterID,
  268. Namespace: namespace,
  269. })
  270. }
  271. return res, nil
  272. }