upgrade.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281
  1. package release
  2. import (
  3. "fmt"
  4. "net/http"
  5. "net/url"
  6. semver "github.com/Masterminds/semver/v3"
  7. "github.com/porter-dev/porter/api/server/authz"
  8. "github.com/porter-dev/porter/api/server/handlers"
  9. "github.com/porter-dev/porter/api/server/shared"
  10. "github.com/porter-dev/porter/api/server/shared/apierrors"
  11. "github.com/porter-dev/porter/api/server/shared/config"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/helm"
  14. "github.com/porter-dev/porter/internal/models"
  15. "github.com/porter-dev/porter/internal/notifier"
  16. "github.com/porter-dev/porter/internal/notifier/slack"
  17. "github.com/porter-dev/porter/internal/stacks"
  18. "github.com/stefanmcshane/helm/pkg/release"
  19. )
  20. var createEnvSecretConstraint, _ = semver.NewConstraint(" < 0.1.0")
  21. type UpgradeReleaseHandler struct {
  22. handlers.PorterHandlerReadWriter
  23. authz.KubernetesAgentGetter
  24. }
  25. func NewUpgradeReleaseHandler(
  26. config *config.Config,
  27. decoderValidator shared.RequestDecoderValidator,
  28. writer shared.ResultWriter,
  29. ) *UpgradeReleaseHandler {
  30. return &UpgradeReleaseHandler{
  31. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  32. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  33. }
  34. }
  35. func (c *UpgradeReleaseHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  36. user, _ := r.Context().Value(types.UserScope).(*models.User)
  37. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  38. helmRelease, _ := r.Context().Value(types.ReleaseScope).(*release.Release)
  39. helmAgent, err := c.GetHelmAgent(r, cluster, "")
  40. if err != nil {
  41. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  42. return
  43. }
  44. request := &types.UpgradeReleaseRequest{}
  45. if ok := c.DecodeAndValidate(w, r, request); !ok {
  46. return
  47. }
  48. registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  49. if err != nil {
  50. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  51. return
  52. }
  53. conf := &helm.UpgradeReleaseConfig{
  54. Name: helmRelease.Name,
  55. Cluster: cluster,
  56. Repo: c.Repo(),
  57. Registries: registries,
  58. }
  59. // if the chart version is set, load a chart from the repo
  60. if request.ChartVersion != "" {
  61. cache := c.Config().URLCache
  62. chartRepoURL, foundFirst := cache.GetURL(helmRelease.Chart.Metadata.Name)
  63. if !foundFirst {
  64. cache.Update()
  65. var found bool
  66. chartRepoURL, found = cache.GetURL(helmRelease.Chart.Metadata.Name)
  67. if !found {
  68. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  69. fmt.Errorf("chart not found"),
  70. http.StatusBadRequest,
  71. ))
  72. return
  73. }
  74. }
  75. chart, err := LoadChart(c.Config(), &LoadAddonChartOpts{
  76. ProjectID: cluster.ProjectID,
  77. RepoURL: chartRepoURL,
  78. TemplateName: helmRelease.Chart.Metadata.Name,
  79. TemplateVersion: request.ChartVersion,
  80. })
  81. if err != nil {
  82. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  83. return
  84. }
  85. if err != nil {
  86. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  87. fmt.Errorf("chart not found"),
  88. http.StatusBadRequest,
  89. ))
  90. return
  91. }
  92. conf.Chart = chart
  93. }
  94. // if LatestRevision is set, check that the revision matches the latest revision in the database
  95. if request.LatestRevision != 0 {
  96. currHelmRelease, err := helmAgent.GetRelease(helmRelease.Name, 0, false)
  97. if err != nil {
  98. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  99. fmt.Errorf("could not retrieve latest revision"),
  100. http.StatusBadRequest,
  101. ))
  102. return
  103. }
  104. if currHelmRelease.Version != int(request.LatestRevision) {
  105. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  106. fmt.Errorf("The provided revision is not up to date with the current revision (you may need to refresh the deployment). Provided revision is %d, latest revision is %d. If you would like to deploy from this revision, please revert first and update the configuration.", request.LatestRevision, currHelmRelease.Version),
  107. http.StatusBadRequest,
  108. ))
  109. return
  110. }
  111. }
  112. // check if release is part of a stack
  113. stacks, err := c.Repo().Stack().ListStacks(cluster.ProjectID, cluster.ID, helmRelease.Namespace)
  114. if err != nil {
  115. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  116. return
  117. }
  118. for _, stk := range stacks {
  119. for _, res := range stk.Revisions[0].Resources {
  120. if res.Name == helmRelease.Name {
  121. conf.StackName = stk.Name
  122. conf.StackRevision = stk.Revisions[0].RevisionNumber + 1
  123. break
  124. }
  125. }
  126. }
  127. newHelmRelease, upgradeErr := helmAgent.UpgradeRelease(conf, request.Values, c.Config().DOConf,
  128. c.Config().ServerConf.DisablePullSecretsInjection)
  129. if upgradeErr == nil && newHelmRelease != nil {
  130. helmRelease = newHelmRelease
  131. }
  132. slackInts, _ := c.Repo().SlackIntegration().ListSlackIntegrationsByProjectID(cluster.ProjectID)
  133. rel, releaseErr := c.Repo().Release().ReadRelease(cluster.ID, helmRelease.Name, helmRelease.Namespace)
  134. var notifConf *types.NotificationConfig
  135. notifConf = nil
  136. if rel != nil && rel.NotificationConfig != 0 {
  137. conf, err := c.Repo().NotificationConfig().ReadNotificationConfig(rel.NotificationConfig)
  138. if err != nil {
  139. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  140. return
  141. }
  142. notifConf = conf.ToNotificationConfigType()
  143. }
  144. deplNotifier := slack.NewDeploymentNotifier(notifConf, slackInts...)
  145. notifyOpts := &notifier.NotifyOpts{
  146. ProjectID: cluster.ProjectID,
  147. ClusterID: cluster.ID,
  148. ClusterName: cluster.Name,
  149. Name: helmRelease.Name,
  150. Namespace: helmRelease.Namespace,
  151. URL: fmt.Sprintf(
  152. "%s/applications/%s/%s/%s?project_id=%d",
  153. c.Config().ServerConf.ServerURL,
  154. url.PathEscape(cluster.Name),
  155. helmRelease.Namespace,
  156. helmRelease.Name,
  157. cluster.ProjectID,
  158. ),
  159. }
  160. if upgradeErr != nil {
  161. notifyOpts.Status = notifier.StatusHelmFailed
  162. notifyOpts.Info = upgradeErr.Error()
  163. if !cluster.NotificationsDisabled {
  164. deplNotifier.Notify(notifyOpts)
  165. }
  166. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  167. upgradeErr,
  168. http.StatusBadRequest,
  169. ))
  170. return
  171. }
  172. if helmRelease.Chart != nil && helmRelease.Chart.Metadata.Name != "job" {
  173. notifyOpts.Status = notifier.StatusHelmDeployed
  174. notifyOpts.Version = helmRelease.Version
  175. if !cluster.NotificationsDisabled {
  176. deplNotifier.Notify(notifyOpts)
  177. }
  178. }
  179. // update the github actions env if the release exists and is built from source
  180. if cName := helmRelease.Chart.Metadata.Name; cName == "job" || cName == "web" || cName == "worker" {
  181. if releaseErr == nil && rel != nil {
  182. err = UpdateReleaseRepo(c.Config(), rel, helmRelease)
  183. if err != nil {
  184. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  185. return
  186. }
  187. gitAction := rel.GitActionConfig
  188. if gitAction != nil && gitAction.ID != 0 && gitAction.GitlabIntegrationID == 0 {
  189. gaRunner, err := GetGARunner(
  190. c.Config(),
  191. user.ID,
  192. cluster.ProjectID,
  193. cluster.ID,
  194. rel.GitActionConfig,
  195. helmRelease.Name,
  196. helmRelease.Namespace,
  197. rel,
  198. helmRelease,
  199. )
  200. if err != nil {
  201. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  202. return
  203. }
  204. actionVersion, err := semver.NewVersion(gaRunner.Version)
  205. if err != nil {
  206. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  207. return
  208. }
  209. if createEnvSecretConstraint.Check(actionVersion) {
  210. if err := gaRunner.CreateEnvSecret(); err != nil {
  211. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  212. return
  213. }
  214. }
  215. }
  216. }
  217. }
  218. c.WriteResult(w, r, nil)
  219. err = postUpgrade(c.Config(), cluster.ProjectID, cluster.ID, helmRelease)
  220. if err != nil {
  221. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(err))
  222. return
  223. }
  224. }
  225. // postUpgrade runs any necessary scripting after the release has been upgraded.
  226. func postUpgrade(config *config.Config, projectID, clusterID uint, release *release.Release) error {
  227. // update the relevant helm revision number if tied to a stack resource
  228. return stacks.UpdateHelmRevision(config, projectID, clusterID, release)
  229. }