| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346 |
- package stack
- import (
- "fmt"
- "net/http"
- "strings"
- "github.com/porter-dev/porter/api/server/authz"
- "github.com/porter-dev/porter/api/server/handlers"
- "github.com/porter-dev/porter/api/server/handlers/release"
- "github.com/porter-dev/porter/api/server/shared"
- "github.com/porter-dev/porter/api/server/shared/apierrors"
- "github.com/porter-dev/porter/api/server/shared/config"
- "github.com/porter-dev/porter/api/types"
- "github.com/porter-dev/porter/internal/encryption"
- "github.com/porter-dev/porter/internal/kubernetes/envgroup"
- "github.com/porter-dev/porter/internal/models"
- helmrelease "helm.sh/helm/v3/pkg/release"
- )
- type StackCreateHandler struct {
- handlers.PorterHandlerReadWriter
- authz.KubernetesAgentGetter
- }
- func NewStackCreateHandler(
- config *config.Config,
- reader shared.RequestDecoderValidator,
- writer shared.ResultWriter,
- ) *StackCreateHandler {
- return &StackCreateHandler{
- PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, reader, writer),
- KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
- }
- }
- func (p *StackCreateHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- proj, _ := r.Context().Value(types.ProjectScope).(*models.Project)
- cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
- namespace, _ := r.Context().Value(types.NamespaceScope).(string)
- req := &types.CreateStackRequest{}
- if ok := p.DecodeAndValidate(w, r, req); !ok {
- return
- }
- uid, err := encryption.GenerateRandomBytes(16)
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- sourceConfigs, err := getSourceConfigModels(req.SourceConfigs)
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- resources, err := getResourceModels(req.AppResources, sourceConfigs, p.Config().ServerConf.DefaultApplicationHelmRepoURL)
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- envGroups, err := getEnvGroupModels(req.EnvGroups, proj.ID, cluster.ID, namespace)
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- // write stack to the database with creating status
- stack := &models.Stack{
- ProjectID: proj.ID,
- ClusterID: cluster.ID,
- Namespace: namespace,
- Name: req.Name,
- UID: uid,
- Revisions: []models.StackRevision{
- {
- RevisionNumber: 1,
- Status: string(types.StackRevisionStatusDeploying),
- SourceConfigs: sourceConfigs,
- Resources: resources,
- EnvGroups: envGroups,
- },
- },
- }
- stack, err = p.Repo().Stack().CreateStack(stack)
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- // apply all env groups
- k8sAgent, err := p.GetAgent(r, cluster, "")
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- envGroupDeployErrors := make([]string, 0)
- for _, envGroup := range req.EnvGroups {
- cm, err := envgroup.CreateEnvGroup(k8sAgent, types.ConfigMapInput{
- Name: envGroup.Name,
- Namespace: namespace,
- Variables: envGroup.Variables,
- SecretVariables: envGroup.SecretVariables,
- })
- if err != nil {
- envGroupDeployErrors = append(envGroupDeployErrors, fmt.Sprintf("error creating env group %s", envGroup.Name))
- }
- // add each of the linked applications to the env group
- for _, appName := range envGroup.LinkedApplications {
- cm, err = k8sAgent.AddApplicationToVersionedConfigMap(cm, appName)
- if err != nil {
- envGroupDeployErrors = append(envGroupDeployErrors, fmt.Sprintf("error creating env group %s", envGroup.Name))
- }
- }
- }
- revision := &stack.Revisions[0]
- if len(envGroupDeployErrors) > 0 {
- revision.Status = string(types.StackRevisionStatusFailed)
- revision.Reason = "EnvGroupDeployErr"
- revision.Message = strings.Join(envGroupDeployErrors, " , ")
- revision, err = p.Repo().Stack().UpdateStackRevision(revision)
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- } else {
- // apply all app resources
- registries, err := p.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- helmAgent, err := p.GetHelmAgent(r, cluster, "")
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- helmReleaseMap := make(map[string]*helmrelease.Release)
- deployErrs := make([]string, 0)
- for _, appResource := range req.AppResources {
- rel, err := applyAppResource(&applyAppResourceOpts{
- config: p.Config(),
- projectID: proj.ID,
- namespace: namespace,
- cluster: cluster,
- registries: registries,
- helmAgent: helmAgent,
- request: appResource,
- })
- if err != nil {
- deployErrs = append(deployErrs, err.Error())
- } else {
- helmReleaseMap[fmt.Sprintf("%s/%s", namespace, appResource.Name)] = rel
- }
- }
- // update stack revision status
- if len(deployErrs) > 0 {
- revision.Status = string(types.StackRevisionStatusFailed)
- revision.Reason = "DeployError"
- revision.Message = strings.Join(deployErrs, " , ")
- } else {
- revision.Status = string(types.StackRevisionStatusDeployed)
- }
- revision, err = p.Repo().Stack().UpdateStackRevision(revision)
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- saveErrs := make([]string, 0)
- for _, resource := range revision.Resources {
- if rel, exists := helmReleaseMap[fmt.Sprintf("%s/%s", namespace, resource.Name)]; exists {
- _, err = release.CreateAppReleaseFromHelmRelease(p.Config(), proj.ID, cluster.ID, resource.ID, rel)
- if err != nil {
- saveErrs = append(saveErrs, fmt.Sprintf("the resource %s/%s could not be saved right now", namespace, resource.Name))
- }
- }
- }
- if len(saveErrs) > 0 {
- revision.Reason = "SaveError"
- revision.Message = strings.Join(saveErrs, " , ")
- revision, err = p.Repo().Stack().UpdateStackRevision(revision)
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- }
- }
- if revision.Status != string(types.StackRevisionStatusFailed) && len(revision.Reason) == 0 {
- revision.Reason = "CreationSuccess"
- revision.Message = "Stack deployed successfully"
- revision, err = p.Repo().Stack().UpdateStackRevision(revision)
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- }
- // read the stack again to get the latest revision info
- stack, err = p.Repo().Stack().ReadStackByStringID(proj.ID, stack.UID)
- if err != nil {
- p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- w.WriteHeader(http.StatusCreated)
- p.WriteResult(w, r, stack.ToStackType())
- }
- func getSourceConfigModels(sourceConfigs []*types.CreateStackSourceConfigRequest) ([]models.StackSourceConfig, error) {
- res := make([]models.StackSourceConfig, 0)
- // for now, only write source configs which are deployed as a docker image
- // TODO: add parsing/writes for git-based sources
- for _, sourceConfig := range sourceConfigs {
- if sourceConfig.StackSourceConfigBuild == nil {
- uid, err := encryption.GenerateRandomBytes(16)
- if err != nil {
- return nil, err
- }
- newSourceConfig := &models.StackSourceConfig{
- UID: uid,
- Name: sourceConfig.Name,
- ImageRepoURI: sourceConfig.ImageRepoURI,
- ImageTag: sourceConfig.ImageTag,
- }
- // If the source config had a source config ID then we need to copy it over
- if sourceConfig.StableSourceConfigID != "" {
- newSourceConfig.StableSourceConfigID = sourceConfig.StableSourceConfigID
- } else {
- newSourceConfig.StableSourceConfigID = string(uid)
- }
- res = append(res, *newSourceConfig)
- }
- }
- return res, nil
- }
- func getResourceModels(appResources []*types.CreateStackAppResourceRequest, sourceConfigs []models.StackSourceConfig, defaultRepoURL string) ([]models.StackResource, error) {
- res := make([]models.StackResource, 0)
- for _, appResource := range appResources {
- if appResource.TemplateRepoURL == "" {
- appResource.TemplateRepoURL = defaultRepoURL
- }
- uid, err := encryption.GenerateRandomBytes(16)
- if err != nil {
- return nil, err
- }
- var linkedSourceConfigUID string
- for _, sourceConfig := range sourceConfigs {
- if sourceConfig.Name == appResource.SourceConfigName {
- linkedSourceConfigUID = sourceConfig.UID
- }
- }
- if linkedSourceConfigUID == "" {
- return nil, fmt.Errorf("source config %s does not exist in source config list", appResource.SourceConfigName)
- }
- res = append(res, models.StackResource{
- Name: appResource.Name,
- UID: uid,
- StackSourceConfigUID: linkedSourceConfigUID,
- TemplateRepoURL: appResource.TemplateRepoURL,
- TemplateName: appResource.TemplateName,
- TemplateVersion: appResource.TemplateVersion,
- HelmRevisionID: 1,
- })
- }
- return res, nil
- }
- func getEnvGroupModels(envGroups []*types.CreateStackEnvGroupRequest, projID, clusterID uint, namespace string) ([]models.StackEnvGroup, error) {
- res := make([]models.StackEnvGroup, 0)
- for _, envGroup := range envGroups {
- uid, err := encryption.GenerateRandomBytes(16)
- if err != nil {
- return nil, err
- }
- res = append(res, models.StackEnvGroup{
- Name: envGroup.Name,
- UID: uid,
- EnvGroupVersion: 1,
- ProjectID: projID,
- ClusterID: clusterID,
- Namespace: namespace,
- })
- }
- return res, nil
- }
|