create.go 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392
  1. package env_group
  2. import (
  3. "context"
  4. "fmt"
  5. "net/http"
  6. "strings"
  7. "sync"
  8. "sigs.k8s.io/yaml"
  9. "github.com/stefanmcshane/helm/pkg/release"
  10. v1 "k8s.io/api/core/v1"
  11. "github.com/porter-dev/porter/api/server/authz"
  12. "github.com/porter-dev/porter/api/server/handlers"
  13. "github.com/porter-dev/porter/api/server/shared"
  14. "github.com/porter-dev/porter/api/server/shared/apierrors"
  15. "github.com/porter-dev/porter/api/server/shared/config"
  16. "github.com/porter-dev/porter/api/types"
  17. "github.com/porter-dev/porter/internal/helm"
  18. "github.com/porter-dev/porter/internal/kubernetes/envgroup"
  19. "github.com/porter-dev/porter/internal/models"
  20. "github.com/porter-dev/porter/internal/stacks"
  21. )
  22. type CreateEnvGroupHandler struct {
  23. handlers.PorterHandlerReadWriter
  24. authz.KubernetesAgentGetter
  25. }
  26. func NewCreateEnvGroupHandler(
  27. config *config.Config,
  28. decoderValidator shared.RequestDecoderValidator,
  29. writer shared.ResultWriter,
  30. ) *CreateEnvGroupHandler {
  31. return &CreateEnvGroupHandler{
  32. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  33. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  34. }
  35. }
  36. func (c *CreateEnvGroupHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  37. request := &types.CreateEnvGroupRequest{}
  38. if ok := c.DecodeAndValidate(w, r, request); !ok {
  39. return
  40. }
  41. namespace := r.Context().Value(types.NamespaceScope).(string)
  42. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  43. agent, err := c.GetAgent(r, cluster, namespace)
  44. if err != nil {
  45. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  46. return
  47. }
  48. envGroup, err := envgroup.GetEnvGroup(agent, request.Name, namespace, 0)
  49. // if the environment group exists and has MetaVersion=1, throw an error
  50. if envGroup != nil && envGroup.MetaVersion == 1 {
  51. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  52. fmt.Errorf("env group with that name already exists"),
  53. http.StatusNotFound,
  54. ))
  55. return
  56. } else if err != nil {
  57. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  58. }
  59. helmAgent, err := c.GetHelmAgent(r.Context(), r, cluster, namespace)
  60. if err != nil {
  61. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  62. return
  63. }
  64. configMap, err := envgroup.CreateEnvGroup(agent, types.ConfigMapInput{
  65. Name: request.Name,
  66. Namespace: namespace,
  67. Variables: request.Variables,
  68. SecretVariables: request.SecretVariables,
  69. })
  70. if err != nil {
  71. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  72. return
  73. }
  74. envGroup, err = envgroup.ToEnvGroup(configMap)
  75. if err != nil {
  76. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  77. return
  78. }
  79. releases, err := envgroup.GetSyncedReleases(helmAgent, configMap)
  80. if err != nil {
  81. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  82. return
  83. }
  84. res := &types.V1EnvGroupResponse{
  85. CreatedAt: envGroup.CreatedAt,
  86. Version: envGroup.Version,
  87. Name: envGroup.Name,
  88. Releases: envGroup.Applications,
  89. Variables: envGroup.Variables,
  90. }
  91. stackId, err := stacks.GetStackForEnvGroup(c.Config(), cluster.ProjectID, cluster.ID, envGroup)
  92. if err == nil && len(stackId) > 0 {
  93. res.StackID = stackId
  94. }
  95. c.WriteResult(w, r, res)
  96. // trigger rollout of new applications after writing the result
  97. errors := rolloutApplications(c.Config(), cluster, helmAgent, envGroup, configMap, releases)
  98. if len(errors) > 0 {
  99. errStrArr := make([]string, 0)
  100. for _, err := range errors {
  101. errStrArr = append(errStrArr, err.Error())
  102. }
  103. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(fmt.Errorf(strings.Join(errStrArr, ","))))
  104. return
  105. }
  106. err = postUpgrade(c.Config(), cluster.ProjectID, cluster.ID, envGroup)
  107. if err != nil {
  108. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(err))
  109. return
  110. }
  111. }
  112. func rolloutApplications(
  113. config *config.Config,
  114. cluster *models.Cluster,
  115. helmAgent *helm.Agent,
  116. envGroup *types.EnvGroup,
  117. configMap *v1.ConfigMap,
  118. releases []*release.Release,
  119. ) []error {
  120. registries, err := config.Repo.Registry().ListRegistriesByProjectID(cluster.ProjectID)
  121. if err != nil {
  122. return []error{err}
  123. }
  124. // construct the synced env section that should be written
  125. newSection := &SyncedEnvSection{
  126. Name: envGroup.Name,
  127. Version: envGroup.Version,
  128. }
  129. newSectionKeys := make([]SyncedEnvSectionKey, 0)
  130. for key, val := range configMap.Data {
  131. newSectionKeys = append(newSectionKeys, SyncedEnvSectionKey{
  132. Name: key,
  133. Secret: strings.Contains(val, "PORTERSECRET"),
  134. })
  135. }
  136. newSection.Keys = newSectionKeys
  137. // asynchronously update releases with that image repo uri
  138. var wg sync.WaitGroup
  139. mu := &sync.Mutex{}
  140. errors := make([]error, 0)
  141. for i, rel := range releases {
  142. index := i
  143. release := rel
  144. wg.Add(1)
  145. go func() {
  146. defer wg.Done()
  147. // read release via agent
  148. newConfig, err := getNewConfig(release.Config, newSection)
  149. if err != nil {
  150. mu.Lock()
  151. errors = append(errors, err)
  152. mu.Unlock()
  153. return
  154. }
  155. // if this is a job chart, update the config and set correct paused param to true
  156. if release.Chart.Name() == "job" {
  157. newConfig["paused"] = true
  158. }
  159. conf := &helm.UpgradeReleaseConfig{
  160. Name: releases[index].Name,
  161. Cluster: cluster,
  162. Repo: config.Repo,
  163. Registries: registries,
  164. Values: newConfig,
  165. }
  166. _, err = helmAgent.UpgradeReleaseByValues(context.Background(), conf, config.DOConf, config.ServerConf.DisablePullSecretsInjection, false)
  167. if err != nil {
  168. mu.Lock()
  169. errors = append(errors, err)
  170. mu.Unlock()
  171. return
  172. }
  173. }()
  174. }
  175. wg.Wait()
  176. return errors
  177. }
  178. type SyncedEnvSection struct {
  179. Name string `json:"name" yaml:"name"`
  180. Version uint `json:"version" yaml:"version"`
  181. Keys []SyncedEnvSectionKey `json:"keys" yaml:"keys"`
  182. }
  183. type SyncedEnvSectionKey struct {
  184. Name string `json:"name" yaml:"name"`
  185. Secret bool `json:"secret" yaml:"secret"`
  186. }
  187. func getNewConfig(curr map[string]interface{}, syncedEnvSection *SyncedEnvSection) (map[string]interface{}, error) {
  188. // look for container.env.synced
  189. envConf, err := getNestedMap(curr, "container", "env")
  190. if err != nil {
  191. return nil, err
  192. }
  193. syncedEnvInter, syncedEnvExists := envConf["synced"]
  194. if !syncedEnvExists {
  195. return curr, nil
  196. } else {
  197. syncedArr := make([]*SyncedEnvSection, 0)
  198. syncedArrInter, ok := syncedEnvInter.([]interface{})
  199. if !ok {
  200. return nil, fmt.Errorf("could not convert to synced env section: not an array")
  201. }
  202. for _, syncedArrInterObj := range syncedArrInter {
  203. syncedArrObj := &SyncedEnvSection{}
  204. syncedArrInterObjMap, ok := syncedArrInterObj.(map[string]interface{})
  205. if !ok {
  206. continue
  207. }
  208. if nameField, nameFieldExists := syncedArrInterObjMap["name"]; nameFieldExists {
  209. syncedArrObj.Name, ok = nameField.(string)
  210. if !ok {
  211. continue
  212. }
  213. }
  214. if versionField, versionFieldExists := syncedArrInterObjMap["version"]; versionFieldExists {
  215. versionFloat, ok := versionField.(float64)
  216. if !ok {
  217. continue
  218. }
  219. syncedArrObj.Version = uint(versionFloat)
  220. }
  221. if keyField, keyFieldExists := syncedArrInterObjMap["keys"]; keyFieldExists {
  222. keyFieldInterArr, ok := keyField.([]interface{})
  223. if !ok {
  224. continue
  225. }
  226. keyFieldMapArr := make([]map[string]interface{}, 0)
  227. for _, keyFieldInter := range keyFieldInterArr {
  228. mapConv, ok := keyFieldInter.(map[string]interface{})
  229. if !ok {
  230. continue
  231. }
  232. keyFieldMapArr = append(keyFieldMapArr, mapConv)
  233. }
  234. keyFieldRes := make([]SyncedEnvSectionKey, 0)
  235. for _, keyFieldMap := range keyFieldMapArr {
  236. toAdd := SyncedEnvSectionKey{}
  237. if nameField, nameFieldExists := keyFieldMap["name"]; nameFieldExists {
  238. toAdd.Name, ok = nameField.(string)
  239. if !ok {
  240. continue
  241. }
  242. }
  243. if secretField, secretFieldExists := keyFieldMap["secret"]; secretFieldExists {
  244. toAdd.Secret, ok = secretField.(bool)
  245. if !ok {
  246. continue
  247. }
  248. }
  249. keyFieldRes = append(keyFieldRes, toAdd)
  250. }
  251. syncedArrObj.Keys = keyFieldRes
  252. }
  253. syncedArr = append(syncedArr, syncedArrObj)
  254. }
  255. resArr := make([]SyncedEnvSection, 0)
  256. foundMatch := false
  257. for _, candidate := range syncedArr {
  258. if candidate.Name == syncedEnvSection.Name {
  259. resArr = append(resArr, *syncedEnvSection)
  260. foundMatch = true
  261. } else {
  262. resArr = append(resArr, *candidate)
  263. }
  264. }
  265. if !foundMatch {
  266. return curr, nil
  267. }
  268. envConf["synced"] = resArr
  269. }
  270. // to remove all types that Helm may not be able to work with, we marshal to and from
  271. // yaml for good measure. Otherwise we get silly error messages like:
  272. // Upgrade failed: template: web/templates/deployment.yaml:138:40: executing \"web/templates/deployment.yaml\"
  273. // at <$syncedEnv.keys>: can't evaluate field keys in type namespace.SyncedEnvSection
  274. currYAML, err := yaml.Marshal(curr)
  275. if err != nil {
  276. return nil, err
  277. }
  278. res := make(map[string]interface{})
  279. err = yaml.Unmarshal([]byte(currYAML), &res)
  280. if err != nil {
  281. return nil, err
  282. }
  283. return res, nil
  284. }
  285. func getNestedMap(obj map[string]interface{}, fields ...string) (map[string]interface{}, error) {
  286. var res map[string]interface{}
  287. curr := obj
  288. for _, field := range fields {
  289. objField, ok := curr[field]
  290. if !ok {
  291. return nil, fmt.Errorf("%s not found", field)
  292. }
  293. res, ok = objField.(map[string]interface{})
  294. if !ok {
  295. return nil, fmt.Errorf("%s is not a nested object", field)
  296. }
  297. curr = res
  298. }
  299. return res, nil
  300. }
  301. // postUpgrade runs any necessary scripting after the release has been upgraded.
  302. func postUpgrade(config *config.Config, projectID, clusterID uint, envGroup *types.EnvGroup) error {
  303. // update the relevant env group version number if tied to a stack resource
  304. return stacks.UpdateEnvGroupVersion(config, projectID, clusterID, envGroup)
  305. }