| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587 |
- package namespace
- import (
- "context"
- "fmt"
- "net/http"
- "strconv"
- "strings"
- "sync"
- "sigs.k8s.io/yaml"
- "github.com/google/uuid"
- "github.com/stefanmcshane/helm/pkg/release"
- "github.com/porter-dev/porter/api/server/authz"
- "github.com/porter-dev/porter/api/server/handlers"
- "github.com/porter-dev/porter/api/server/shared"
- "github.com/porter-dev/porter/api/server/shared/apierrors"
- "github.com/porter-dev/porter/api/server/shared/config"
- "github.com/porter-dev/porter/api/types"
- "github.com/porter-dev/porter/internal/helm"
- "github.com/porter-dev/porter/internal/helm/loader"
- "github.com/porter-dev/porter/internal/kubernetes"
- "github.com/porter-dev/porter/internal/kubernetes/envgroup"
- "github.com/porter-dev/porter/internal/models"
- "github.com/porter-dev/porter/internal/repository"
- "github.com/porter-dev/porter/internal/telemetry"
- "github.com/stefanmcshane/helm/pkg/chart"
- )
- type CreateStacksEnvGroupHandler struct {
- handlers.PorterHandlerReadWriter
- authz.KubernetesAgentGetter
- }
- func NewCreateStacksEnvGroupHandler(
- config *config.Config,
- decoderValidator shared.RequestDecoderValidator,
- writer shared.ResultWriter,
- ) *CreateStacksEnvGroupHandler {
- return &CreateStacksEnvGroupHandler{
- PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
- KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
- }
- }
- func (c *CreateStacksEnvGroupHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- request := &types.CreateStacksEnvGroupRequest{}
- ctx := r.Context()
- cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster)
- ctx, span := telemetry.NewSpan(ctx, "serve-create-env-group-stacks")
- defer span.End()
- if ok := c.DecodeAndValidate(w, r, request); !ok {
- return
- }
- namespace := ctx.Value(types.NamespaceScope).(string)
- agent, err := c.GetAgent(r, cluster, namespace)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, 504, "error getting agent"))
- return
- }
- // if the environment group exists and has MetaVersion=1, throw an error
- aggregateReleases := []*release.Release{}
- for i := range request.Apps {
- namespaceStack := "porter-stack-" + request.Apps[i]
- helmAgent, err := c.GetHelmAgent(ctx, r, cluster, namespaceStack)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, 504, "error getting agent"))
- return
- }
- releases, err := envgroup.GetStackSyncedReleases(helmAgent, namespaceStack)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, 504, "error getting releases"))
- return
- }
- aggregateReleases = append(aggregateReleases, releases...)
- }
- errors := rolloutStacksApplications(c, c.Config(), cluster, request.Name, namespace, agent, aggregateReleases, r, ctx, w)
- if len(errors) > 0 {
- errStrArr := make([]string, 0)
- for _, err := range errors {
- errStrArr = append(errStrArr, err.Error())
- }
- c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrPassThroughToClient(err, 504, "error getting adding env group"))
- return
- }
- c.WriteResult(w, r, nil)
- }
- func rolloutStacksApplications(
- c *CreateStacksEnvGroupHandler,
- config *config.Config,
- cluster *models.Cluster,
- envGroupName string,
- namespace string,
- agent *kubernetes.Agent,
- releases []*release.Release,
- r *http.Request,
- ctx context.Context,
- w http.ResponseWriter,
- ) []error {
- registries, err := config.Repo.Registry().ListRegistriesByProjectID(cluster.ProjectID)
- if err != nil {
- return []error{err}
- }
- ctx, span := telemetry.NewSpan(ctx, "rollout-env-group-stacks")
- // asynchronously update releases with that image repo uri
- var wg sync.WaitGroup
- mu := &sync.Mutex{}
- errors := make([]error, 0)
- for i, rel := range releases {
- index := i
- release := rel
- wg.Add(1)
- suffix := "-r"
- releaseName := release.Name
- if strings.HasSuffix(release.Name, suffix) {
- releaseName = strings.TrimSuffix(releaseName, suffix)
- }
- cm, _, err := agent.GetLatestVersionedConfigMap(envGroupName, "porter-stack-"+releaseName)
- if err != nil {
- return []error{err}
- }
- versionStr, ok := cm.ObjectMeta.Labels["version"]
- if !ok {
- return []error{err}
- }
- versionInt, err := strconv.Atoi(versionStr)
- if err != nil {
- return []error{err}
- }
- version := uint(versionInt)
- newSection := &SyncedEnvSection{
- Name: envGroupName,
- Version: version,
- }
- newSectionKeys := make([]SyncedEnvSectionKey, 0)
- for key, val := range cm.Data {
- newSectionKeys = append(newSectionKeys, SyncedEnvSectionKey{
- Name: key,
- Secret: strings.Contains(val, "PORTERSECRET"),
- })
- }
- newSection.Keys = newSectionKeys
- go func() {
- defer wg.Done()
- // read release via agent
- newConfig, err := getNewStacksConfig(release.Config, newSection, release)
- if err != nil {
- mu.Lock()
- errors = append(errors, err)
- mu.Unlock()
- return
- }
- // if this is a job chart, update the config and set correct paused param to true
- if release.Chart.Name() == "job" {
- newConfig["paused"] = true
- }
- if !strings.HasSuffix(release.Name, suffix) {
- if req := releases[index].Chart.Metadata.Dependencies; req != nil {
- for _, dep := range req {
- dep.Name = getType(dep.Name)
- }
- }
- metadata := &chart.Metadata{
- Name: "umbrella",
- Description: "Web application that is exposed to external traffic.",
- Version: "0.96.0",
- APIVersion: "v2",
- Home: "https://getporter.dev/",
- Icon: "https://user-images.githubusercontent.com/65516095/111255214-07d3da80-85ed-11eb-99e2-fddcbdb99bdb.png",
- Keywords: []string{
- "porter",
- "application",
- "service",
- "umbrella",
- },
- Type: "application",
- Dependencies: releases[index].Chart.Metadata.Dependencies,
- }
- charter := &chart.Chart{
- Metadata: metadata,
- }
- conf := &helm.InstallChartConfig{
- Chart: charter,
- Name: releases[index].Name,
- Namespace: "porter-stack-" + releases[index].Name,
- Values: newConfig,
- Cluster: cluster,
- Repo: config.Repo,
- Registries: registries,
- }
- helmAgent, err := c.GetHelmAgent(ctx, r, cluster, "porter-stack-"+releases[index].Name)
- if err != nil {
- fmt.Println("Could Not Get Helm Agent ")
- return
- }
- _, err = helmAgent.UpgradeInstallChart(ctx, conf, config.DOConf, config.ServerConf.DisablePullSecretsInjection)
- if err != nil {
- mu.Lock()
- errors = append(errors, err)
- mu.Unlock()
- return
- }
- } else {
- helmAgent, err := c.GetHelmAgent(ctx, r, cluster, "porter-stack-"+releaseName)
- if err != nil {
- fmt.Println("Could Not Get Helm Agent ")
- return
- }
- helmRelease, err := helmAgent.GetRelease(ctx, rel.Name, 0, false)
- if err != nil {
- telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "creating-pre-deploy-job", Value: true})
- conf, err := createReleaseJobChart(
- ctx,
- releaseName,
- newConfig,
- c.Config().ServerConf.DefaultApplicationHelmRepoURL,
- registries,
- cluster,
- c.Repo(),
- )
- if err != nil {
- err = telemetry.Error(ctx, span, err, "error making config for pre-deploy job chart")
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
- return
- }
- _, err = helmAgent.InstallChart(ctx, conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection)
- if err != nil {
- err = telemetry.Error(ctx, span, err, "error installing pre-deploy job chart")
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
- _, uninstallChartErr := helmAgent.UninstallChart(ctx, fmt.Sprintf("%s-r", releaseName))
- if uninstallChartErr != nil {
- uninstallChartErr = telemetry.Error(ctx, span, err, "error uninstalling pre-deploy job chart after failed install")
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(uninstallChartErr, http.StatusInternalServerError))
- }
- return
- }
- } else {
- telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "updating-pre-deploy-job", Value: true})
- chart, err := loader.LoadChartPublic(ctx, c.Config().Metadata.DefaultAppHelmRepoURL, "job", "")
- if err != nil {
- err = telemetry.Error(ctx, span, err, "error loading latest job chart")
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
- return
- }
- conf := &helm.UpgradeReleaseConfig{
- Name: helmRelease.Name,
- Cluster: cluster,
- Repo: c.Repo(),
- Registries: registries,
- Values: newConfig,
- Chart: chart,
- }
- _, err = helmAgent.UpgradeReleaseByValues(ctx, conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection, false)
- if err != nil {
- err = telemetry.Error(ctx, span, err, "error upgrading pre-deploy job chart")
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
- return
- }
- }
- }
- }()
- app, err := c.Repo().PorterApp().ReadPorterAppByName(cluster.ID, releases[index].Name)
- ctx, span := telemetry.NewSpan(ctx, "serve-update-porter-app")
- updatedPorterApp, err := c.Repo().PorterApp().UpdatePorterApp(app)
- if err != nil {
- err = telemetry.Error(ctx, span, err, "error writing updated app to DB")
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
- return []error{err}
- }
- imageInfo := attemptToGetImageInfoFromRelease(releases[i].Config)
- _, err = createPorterAppEvent(ctx, "SUCCESS", updatedPorterApp.ID, releases[i].Version+1, imageInfo.Tag, c.Repo().PorterAppEvent())
- if err != nil {
- err = telemetry.Error(ctx, span, err, "error creating porter app event")
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
- return []error{err}
- }
- }
- wg.Wait()
- return errors
- }
- func getNewStacksConfig(curr map[string]interface{}, syncedEnvSection *SyncedEnvSection, release *release.Release) (map[string]interface{}, error) {
- // look for container.env.synced
- aggEnvConf := make(map[string]interface{})
- for _, dep := range release.Chart.Metadata.Dependencies {
- envConf, err := getStacksNestedMap(curr, dep.Name, "container", "env")
- normalKeys, ok := envConf["normal"].(map[string]interface{})
- if !ok {
- fmt.Println("Normal Keys", normalKeys)
- }
- if err != nil {
- return nil, err
- }
- for k, v := range envConf {
- aggEnvConf[k] = v
- }
- syncedEnvInter, syncedEnvExists := envConf["synced"]
- if !syncedEnvExists {
- return curr, nil
- } else {
- syncedArr := make([]*SyncedEnvSection, 0)
- syncedArrInter, ok := syncedEnvInter.([]interface{})
- if !ok {
- return nil, fmt.Errorf("could not convert to synced env section: not an array")
- }
- for _, syncedArrInterObj := range syncedArrInter {
- syncedArrObj := &SyncedEnvSection{}
- syncedArrInterObjMap, ok := syncedArrInterObj.(map[string]interface{})
- if !ok {
- continue
- }
- if nameField, nameFieldExists := syncedArrInterObjMap["name"]; nameFieldExists {
- syncedArrObj.Name, ok = nameField.(string)
- if !ok {
- continue
- }
- }
- if versionField, versionFieldExists := syncedArrInterObjMap["version"]; versionFieldExists {
- versionFloat, ok := versionField.(float64)
- if !ok {
- continue
- }
- syncedArrObj.Version = uint(versionFloat)
- }
- if keyField, keyFieldExists := syncedArrInterObjMap["keys"]; keyFieldExists {
- keyFieldInterArr, ok := keyField.([]interface{})
- if !ok {
- continue
- }
- keyFieldMapArr := make([]map[string]interface{}, 0)
- for _, keyFieldInter := range keyFieldInterArr {
- mapConv, ok := keyFieldInter.(map[string]interface{})
- if !ok {
- continue
- }
- // check if mapConv["name"] is in normalKeys
- keyName, ok := mapConv["name"].(string) // check if "name" key exists and is a string
- if !ok {
- continue
- }
- if _, exists := normalKeys[keyName]; !exists {
- keyFieldMapArr = append(keyFieldMapArr, mapConv)
- }
- }
- keyFieldRes := make([]SyncedEnvSectionKey, 0)
- for _, keyFieldMap := range keyFieldMapArr {
- toAdd := SyncedEnvSectionKey{}
- if nameField, nameFieldExists := keyFieldMap["name"]; nameFieldExists {
- toAdd.Name, ok = nameField.(string)
- if !ok {
- continue
- }
- // only append if not in aggEnvConf
- if _, exists := aggEnvConf[toAdd.Name]; !exists {
- if secretField, secretFieldExists := keyFieldMap["secret"]; secretFieldExists {
- toAdd.Secret, ok = secretField.(bool)
- if !ok {
- continue
- }
- }
- keyFieldRes = append(keyFieldRes, toAdd)
- }
- }
- }
- syncedArrObj.Keys = keyFieldRes
- }
- syncedArr = append(syncedArr, syncedArrObj)
- }
- resArr := make([]SyncedEnvSection, 0)
- foundMatch := false
- for _, candidate := range syncedArr {
- if candidate.Name == syncedEnvSection.Name {
- resArr = append(resArr, *filterEnvConf(syncedEnvSection, normalKeys))
- foundMatch = true
- } else {
- resArr = append(resArr, *candidate)
- }
- }
- if !foundMatch {
- return curr, nil
- }
- envConf["synced"] = resArr
- }
- }
- // to remove all types that Helm may not be able to work with, we marshal to and from
- // yaml for good measure. Otherwise we get silly error messages like:
- // Upgrade failed: template: web/templates/deployment.yaml:138:40: executing \"web/templates/deployment.yaml\"
- // at <$syncedEnv.keys>: can't evaluate field keys in type namespace.SyncedEnvSection
- currYAML, err := yaml.Marshal(curr)
- if err != nil {
- return nil, err
- }
- res := make(map[string]interface{})
- err = yaml.Unmarshal([]byte(currYAML), &res)
- if err != nil {
- return nil, err
- }
- return res, nil
- }
- func getStacksNestedMap(obj map[string]interface{}, fields ...string) (map[string]interface{}, error) {
- var res map[string]interface{}
- curr := obj
- for _, field := range fields {
- objField, ok := curr[field]
- if !ok {
- return nil, fmt.Errorf("%s not found", field)
- }
- res, ok = objField.(map[string]interface{})
- if !ok {
- return nil, fmt.Errorf("%s is not a nested object", field)
- }
- curr = res
- }
- return res, nil
- }
- func filterEnvConf(syncedEnv *SyncedEnvSection, normalEnv map[string]interface{}) *SyncedEnvSection {
- // filter out keys that are already in normalEnv
- keys := make([]SyncedEnvSectionKey, 0)
- for _, key := range syncedEnv.Keys {
- if _, exists := normalEnv[key.Name]; !exists {
- keys = append(keys, key)
- }
- }
- syncedEnv.Keys = keys
- return syncedEnv
- }
- // postUpgrade runs any necessary scripting after the release has been upgraded.
- // func postStacksUpgrade(config *config.Config, projectID, clusterID uint, envGroup *types.EnvGroup) error {
- // // update the relevant env group version number if tied to a stack resource
- // return stacks.UpdateEnvGroupVersion(config, projectID, clusterID, envGroup)
- // }
- func getType(name string) string {
- if strings.HasSuffix(name, "-web") {
- return "web"
- } else if strings.HasSuffix(name, "-wkr") {
- return "worker"
- } else if strings.HasSuffix(name, "-job") {
- return "job"
- }
- return ""
- }
- func createPorterAppEvent(ctx context.Context, status string, appID uint, revision int, tag string, repo repository.PorterAppEventRepository) (*models.PorterAppEvent, error) {
- event := models.PorterAppEvent{
- ID: uuid.New(),
- Status: status,
- Type: "DEPLOY",
- TypeExternalSource: "KUBERNETES",
- PorterAppID: appID,
- Metadata: map[string]any{
- "revision": revision,
- "image_tag": tag,
- },
- }
- err := repo.CreateEvent(ctx, &event)
- if err != nil {
- return nil, err
- }
- if event.ID == uuid.Nil {
- return nil, err
- }
- return &event, nil
- }
- func attemptToGetImageInfoFromRelease(values map[string]interface{}) types.ImageInfo {
- imageInfo := types.ImageInfo{}
- if values == nil {
- return imageInfo
- }
- globalImage, err := getNestedMap(values, "global", "image")
- if err != nil {
- return imageInfo
- }
- repoVal, okRepo := globalImage["repository"]
- tagVal, okTag := globalImage["tag"]
- if okRepo && okTag {
- imageInfo.Repository = repoVal.(string)
- imageInfo.Tag = tagVal.(string)
- }
- return imageInfo
- }
- func createReleaseJobChart(
- ctx context.Context,
- stackName string,
- values map[string]interface{},
- repoUrl string,
- registries []*models.Registry,
- cluster *models.Cluster,
- repo repository.Repository,
- ) (*helm.InstallChartConfig, error) {
- chart, err := loader.LoadChartPublic(ctx, repoUrl, "job", "")
- if err != nil {
- return nil, err
- }
- releaseName := fmt.Sprintf("%s-r", stackName)
- namespace := fmt.Sprintf("porter-stack-%s", stackName)
- return &helm.InstallChartConfig{
- Chart: chart,
- Name: releaseName,
- Namespace: namespace,
- Values: values,
- Cluster: cluster,
- Repo: repo,
- Registries: registries,
- }, nil
- }
|