upgrade_webhook.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229
  1. package release
  2. import (
  3. "fmt"
  4. "net/http"
  5. "net/url"
  6. "github.com/porter-dev/porter/api/server/authz"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/server/shared/requestutils"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/analytics"
  14. "github.com/porter-dev/porter/internal/helm"
  15. "github.com/porter-dev/porter/internal/notifier"
  16. "github.com/porter-dev/porter/internal/notifier/slack"
  17. "github.com/porter-dev/porter/internal/telemetry"
  18. "gorm.io/gorm"
  19. )
  20. type WebhookHandler struct {
  21. handlers.PorterHandlerReadWriter
  22. authz.KubernetesAgentGetter
  23. }
  24. func NewWebhookHandler(
  25. config *config.Config,
  26. decoderValidator shared.RequestDecoderValidator,
  27. writer shared.ResultWriter,
  28. ) *WebhookHandler {
  29. return &WebhookHandler{
  30. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  31. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  32. }
  33. }
  34. func (c *WebhookHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  35. ctx, span := telemetry.NewSpan(r.Context(), "serve-webhook-deploy-with-token-handler")
  36. defer span.End()
  37. token, _ := requestutils.GetURLParamString(r, types.URLParamToken)
  38. // retrieve release by token
  39. dbRelease, err := c.Repo().Release().ReadReleaseByWebhookToken(token)
  40. if err != nil {
  41. if err == gorm.ErrRecordNotFound {
  42. err = telemetry.Error(ctx, span, err, "release not found with given webhook")
  43. // throw forbidden error, since we don't want a way to verify if webhooks exist
  44. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusForbidden))
  45. return
  46. }
  47. err = telemetry.Error(ctx, span, err, "error with reading release by webhook token")
  48. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  49. return
  50. }
  51. if dbRelease == nil {
  52. err = telemetry.Error(ctx, span, nil, "release is nil with given webhook")
  53. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusForbidden))
  54. return
  55. }
  56. release := *dbRelease
  57. telemetry.WithAttributes(span,
  58. telemetry.AttributeKV{Key: "release-id", Value: release.ID},
  59. telemetry.AttributeKV{Key: "release-name", Value: release.Name},
  60. telemetry.AttributeKV{Key: "release-namespace", Value: release.Namespace},
  61. telemetry.AttributeKV{Key: "cluster-id", Value: release.ClusterID},
  62. telemetry.AttributeKV{Key: "project-id", Value: release.ProjectID},
  63. )
  64. cluster, err := c.Repo().Cluster().ReadCluster(release.ProjectID, release.ClusterID)
  65. if err != nil {
  66. if err == gorm.ErrRecordNotFound {
  67. err = telemetry.Error(ctx, span, err, "cluster not found for upgrade webhook")
  68. // throw forbidden error, since we don't want a way to verify if the cluster and project
  69. // still exist for a cluster that's been deleted
  70. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusForbidden))
  71. return
  72. }
  73. err = telemetry.Error(ctx, span, err, "error with reading cluster for upgrade webhook")
  74. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  75. return
  76. }
  77. // in this case, we retrieve the agent by passing in the namespace field directly, since
  78. // it cannot be detected from the URL
  79. helmAgent, err := c.GetHelmAgent(ctx, r, cluster, release.Namespace)
  80. if err != nil {
  81. err = telemetry.Error(ctx, span, err, "unable to get helm agent for upgrade webhook")
  82. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  83. return
  84. }
  85. request := &types.WebhookRequest{}
  86. if ok := c.DecodeAndValidate(w, r, request); !ok {
  87. return
  88. }
  89. rel, err := helmAgent.GetRelease(ctx, release.Name, 0, true)
  90. if err != nil {
  91. err = telemetry.Error(ctx, span, err, "uanble to get release for upgrade webhook")
  92. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  93. return
  94. }
  95. // repository is set to current repository by default
  96. repository := rel.Config["image"].(map[string]interface{})["repository"]
  97. currTag := rel.Config["image"].(map[string]interface{})["tag"]
  98. gitAction := release.GitActionConfig
  99. if gitAction != nil && gitAction.ID != 0 && (repository == "porterdev/hello-porter" || repository == "public.ecr.aws/o1j4x7p4/hello-porter") {
  100. repository = gitAction.ImageRepoURI
  101. } else if gitAction != nil && gitAction.ID != 0 && (repository == "porterdev/hello-porter-job" || repository == "public.ecr.aws/o1j4x7p4/hello-porter-job") {
  102. repository = gitAction.ImageRepoURI
  103. }
  104. image := map[string]interface{}{}
  105. image["repository"] = repository
  106. image["tag"] = request.Commit
  107. if request.Commit == "" {
  108. image["tag"] = currTag
  109. }
  110. rel.Config["image"] = image
  111. if rel.Config["auto_deploy"] == false {
  112. err = telemetry.Error(ctx, span, err, "deploy")
  113. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  114. return
  115. }
  116. registries, err := c.Repo().Registry().ListRegistriesByProjectID(release.ProjectID)
  117. if err != nil {
  118. err = telemetry.Error(ctx, span, err, "unable to list registries for upgrade webhook")
  119. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  120. return
  121. }
  122. conf := &helm.UpgradeReleaseConfig{
  123. Name: release.Name,
  124. Cluster: cluster,
  125. Repo: c.Repo(),
  126. Registries: registries,
  127. Values: rel.Config,
  128. }
  129. slackInts, _ := c.Repo().SlackIntegration().ListSlackIntegrationsByProjectID(release.ProjectID)
  130. var notifConf *types.NotificationConfig
  131. notifConf = nil
  132. if release.NotificationConfig != 0 {
  133. conf, err := c.Repo().NotificationConfig().ReadNotificationConfig(release.NotificationConfig)
  134. if err != nil {
  135. err = telemetry.Error(ctx, span, err, "unable to read notification config for upgrade webhook")
  136. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  137. return
  138. }
  139. notifConf = conf.ToNotificationConfigType()
  140. }
  141. deplNotifier := slack.NewDeploymentNotifier(notifConf, slackInts...)
  142. notifyOpts := &notifier.NotifyOpts{
  143. ProjectID: release.ProjectID,
  144. ClusterID: cluster.ID,
  145. ClusterName: cluster.Name,
  146. Name: rel.Name,
  147. Namespace: rel.Namespace,
  148. URL: fmt.Sprintf(
  149. "%s/applications/%s/%s/%s?project_id=%d",
  150. c.Config().ServerConf.ServerURL,
  151. url.PathEscape(cluster.Name),
  152. release.Namespace,
  153. rel.Name,
  154. cluster.ProjectID,
  155. ),
  156. }
  157. rel, err = helmAgent.UpgradeReleaseByValues(ctx, conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection, false)
  158. if err != nil {
  159. notifyOpts.Status = notifier.StatusHelmFailed
  160. notifyOpts.Info = err.Error()
  161. if !cluster.NotificationsDisabled {
  162. deplNotifier.Notify(notifyOpts)
  163. }
  164. err = telemetry.Error(ctx, span, err, "unable to upgrade release for upgrade webhook")
  165. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  166. return
  167. }
  168. if rel.Chart != nil && rel.Chart.Metadata.Name != "job" {
  169. notifyOpts.Status = notifier.StatusHelmDeployed
  170. notifyOpts.Version = rel.Version
  171. if !cluster.NotificationsDisabled {
  172. deplNotifier.Notify(notifyOpts)
  173. }
  174. }
  175. c.Config().AnalyticsClient.Track(analytics.ApplicationDeploymentWebhookTrack(&analytics.ApplicationDeploymentWebhookTrackOpts{
  176. ImageURI: fmt.Sprintf("%v", repository),
  177. ApplicationScopedTrackOpts: analytics.GetApplicationScopedTrackOpts(
  178. 0,
  179. release.ProjectID,
  180. release.ClusterID,
  181. release.Name,
  182. release.Namespace,
  183. rel.Chart.Metadata.Name,
  184. ),
  185. }))
  186. c.WriteResult(w, r, nil)
  187. err = postUpgrade(c.Config(), cluster.ProjectID, cluster.ID, rel)
  188. if err != nil {
  189. err = telemetry.Error(ctx, span, err, "error while running post upgrade hooks")
  190. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  191. return
  192. }
  193. }