create.go 9.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364
  1. package stack
  2. import (
  3. "fmt"
  4. "net/http"
  5. "strings"
  6. "github.com/porter-dev/porter/api/server/authz"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/handlers/release"
  9. "github.com/porter-dev/porter/api/server/shared"
  10. "github.com/porter-dev/porter/api/server/shared/apierrors"
  11. "github.com/porter-dev/porter/api/server/shared/config"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/encryption"
  14. "github.com/porter-dev/porter/internal/kubernetes/envgroup"
  15. "github.com/porter-dev/porter/internal/models"
  16. helmrelease "helm.sh/helm/v3/pkg/release"
  17. )
  18. type StackCreateHandler struct {
  19. handlers.PorterHandlerReadWriter
  20. authz.KubernetesAgentGetter
  21. }
  22. func NewStackCreateHandler(
  23. config *config.Config,
  24. reader shared.RequestDecoderValidator,
  25. writer shared.ResultWriter,
  26. ) *StackCreateHandler {
  27. return &StackCreateHandler{
  28. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, reader, writer),
  29. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  30. }
  31. }
  32. func (p *StackCreateHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  33. proj, _ := r.Context().Value(types.ProjectScope).(*models.Project)
  34. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  35. namespace, _ := r.Context().Value(types.NamespaceScope).(string)
  36. req := &types.CreateStackRequest{}
  37. if ok := p.DecodeAndValidate(w, r, req); !ok {
  38. return
  39. }
  40. uid, err := encryption.GenerateRandomBytes(16)
  41. if err != nil {
  42. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  43. return
  44. }
  45. sourceConfigs, err := getSourceConfigModels(req.SourceConfigs)
  46. if err != nil {
  47. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  48. return
  49. }
  50. resources, err := getResourceModels(req.AppResources, sourceConfigs, p.Config().ServerConf.DefaultApplicationHelmRepoURL)
  51. if err != nil {
  52. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  53. return
  54. }
  55. nameValidator := make(map[string]bool)
  56. for _, res := range resources {
  57. if _, ok := nameValidator[res.Name]; ok {
  58. p.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("duplicate app resource name: %s", res.Name),
  59. http.StatusBadRequest))
  60. return
  61. }
  62. nameValidator[res.Name] = true
  63. }
  64. envGroups, err := getEnvGroupModels(req.EnvGroups, proj.ID, cluster.ID, namespace)
  65. if err != nil {
  66. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  67. return
  68. }
  69. nameValidator = make(map[string]bool)
  70. for _, eg := range envGroups {
  71. if _, ok := nameValidator[eg.Name]; ok {
  72. p.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("duplicate env group name: %s", eg.Name),
  73. http.StatusBadRequest))
  74. return
  75. }
  76. nameValidator[eg.Name] = true
  77. }
  78. // write stack to the database with creating status
  79. stack := &models.Stack{
  80. ProjectID: proj.ID,
  81. ClusterID: cluster.ID,
  82. Namespace: namespace,
  83. Name: req.Name,
  84. UID: uid,
  85. Revisions: []models.StackRevision{
  86. {
  87. RevisionNumber: 1,
  88. Status: string(types.StackRevisionStatusDeploying),
  89. SourceConfigs: sourceConfigs,
  90. Resources: resources,
  91. EnvGroups: envGroups,
  92. },
  93. },
  94. }
  95. stack, err = p.Repo().Stack().CreateStack(stack)
  96. if err != nil {
  97. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  98. return
  99. }
  100. // apply all env groups
  101. k8sAgent, err := p.GetAgent(r, cluster, "")
  102. if err != nil {
  103. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  104. return
  105. }
  106. envGroupDeployErrors := make([]string, 0)
  107. for _, envGroup := range req.EnvGroups {
  108. cm, err := envgroup.CreateEnvGroup(k8sAgent, types.ConfigMapInput{
  109. Name: envGroup.Name,
  110. Namespace: namespace,
  111. Variables: envGroup.Variables,
  112. SecretVariables: envGroup.SecretVariables,
  113. })
  114. if err != nil {
  115. envGroupDeployErrors = append(envGroupDeployErrors, fmt.Sprintf("error creating env group %s", envGroup.Name))
  116. }
  117. // add each of the linked applications to the env group
  118. for _, appName := range envGroup.LinkedApplications {
  119. cm, err = k8sAgent.AddApplicationToVersionedConfigMap(cm, appName)
  120. if err != nil {
  121. envGroupDeployErrors = append(envGroupDeployErrors, fmt.Sprintf("error creating env group %s", envGroup.Name))
  122. }
  123. }
  124. }
  125. revision := &stack.Revisions[0]
  126. if len(envGroupDeployErrors) > 0 {
  127. revision.Status = string(types.StackRevisionStatusFailed)
  128. revision.Reason = "EnvGroupDeployErr"
  129. revision.Message = strings.Join(envGroupDeployErrors, " , ")
  130. revision, err = p.Repo().Stack().UpdateStackRevision(revision)
  131. if err != nil {
  132. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  133. return
  134. }
  135. } else {
  136. // apply all app resources
  137. registries, err := p.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  138. if err != nil {
  139. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  140. return
  141. }
  142. helmAgent, err := p.GetHelmAgent(r, cluster, "")
  143. if err != nil {
  144. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  145. return
  146. }
  147. helmReleaseMap := make(map[string]*helmrelease.Release)
  148. deployErrs := make([]string, 0)
  149. for _, appResource := range req.AppResources {
  150. rel, err := applyAppResource(&applyAppResourceOpts{
  151. config: p.Config(),
  152. projectID: proj.ID,
  153. namespace: namespace,
  154. cluster: cluster,
  155. registries: registries,
  156. helmAgent: helmAgent,
  157. request: appResource,
  158. stackName: stack.Name,
  159. stackRevision: stack.Revisions[0].RevisionNumber,
  160. })
  161. if err != nil {
  162. deployErrs = append(deployErrs, err.Error())
  163. } else {
  164. helmReleaseMap[fmt.Sprintf("%s/%s", namespace, appResource.Name)] = rel
  165. }
  166. }
  167. // update stack revision status
  168. if len(deployErrs) > 0 {
  169. revision.Status = string(types.StackRevisionStatusFailed)
  170. revision.Reason = "DeployError"
  171. revision.Message = strings.Join(deployErrs, " , ")
  172. } else {
  173. revision.Status = string(types.StackRevisionStatusDeployed)
  174. }
  175. revision, err = p.Repo().Stack().UpdateStackRevision(revision)
  176. if err != nil {
  177. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  178. return
  179. }
  180. saveErrs := make([]string, 0)
  181. for _, resource := range revision.Resources {
  182. if rel, exists := helmReleaseMap[fmt.Sprintf("%s/%s", namespace, resource.Name)]; exists {
  183. _, err = release.CreateAppReleaseFromHelmRelease(p.Config(), proj.ID, cluster.ID, resource.ID, rel)
  184. if err != nil {
  185. saveErrs = append(saveErrs, fmt.Sprintf("the resource %s/%s could not be saved right now", namespace, resource.Name))
  186. }
  187. }
  188. }
  189. if len(saveErrs) > 0 {
  190. revision.Reason = "SaveError"
  191. revision.Message = strings.Join(saveErrs, " , ")
  192. revision, err = p.Repo().Stack().UpdateStackRevision(revision)
  193. if err != nil {
  194. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  195. return
  196. }
  197. }
  198. }
  199. if revision.Status != string(types.StackRevisionStatusFailed) && len(revision.Reason) == 0 {
  200. revision.Reason = "CreationSuccess"
  201. revision.Message = "Stack deployed successfully"
  202. revision, err = p.Repo().Stack().UpdateStackRevision(revision)
  203. if err != nil {
  204. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  205. return
  206. }
  207. }
  208. // read the stack again to get the latest revision info
  209. stack, err = p.Repo().Stack().ReadStackByStringID(proj.ID, stack.UID)
  210. if err != nil {
  211. p.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  212. return
  213. }
  214. w.WriteHeader(http.StatusCreated)
  215. p.WriteResult(w, r, stack.ToStackType())
  216. }
  217. func getSourceConfigModels(sourceConfigs []*types.CreateStackSourceConfigRequest) ([]models.StackSourceConfig, error) {
  218. res := make([]models.StackSourceConfig, 0)
  219. // for now, only write source configs which are deployed as a docker image
  220. // TODO: add parsing/writes for git-based sources
  221. for _, sourceConfig := range sourceConfigs {
  222. if sourceConfig.StackSourceConfigBuild == nil {
  223. uid, err := encryption.GenerateRandomBytes(16)
  224. if err != nil {
  225. return nil, err
  226. }
  227. res = append(res, models.StackSourceConfig{
  228. UID: uid,
  229. DisplayName: sourceConfig.DisplayName,
  230. Name: sourceConfig.Name,
  231. ImageRepoURI: sourceConfig.ImageRepoURI,
  232. ImageTag: sourceConfig.ImageTag,
  233. })
  234. }
  235. }
  236. return res, nil
  237. }
  238. func getResourceModels(appResources []*types.CreateStackAppResourceRequest, sourceConfigs []models.StackSourceConfig, defaultRepoURL string) ([]models.StackResource, error) {
  239. res := make([]models.StackResource, 0)
  240. for _, appResource := range appResources {
  241. if appResource.TemplateRepoURL == "" {
  242. appResource.TemplateRepoURL = defaultRepoURL
  243. }
  244. uid, err := encryption.GenerateRandomBytes(16)
  245. if err != nil {
  246. return nil, err
  247. }
  248. var linkedSourceConfigUID string
  249. for _, sourceConfig := range sourceConfigs {
  250. if sourceConfig.Name == appResource.SourceConfigName {
  251. linkedSourceConfigUID = sourceConfig.UID
  252. }
  253. }
  254. if linkedSourceConfigUID == "" {
  255. return nil, fmt.Errorf("source config %s does not exist in source config list", appResource.SourceConfigName)
  256. }
  257. res = append(res, models.StackResource{
  258. Name: appResource.Name,
  259. UID: uid,
  260. StackSourceConfigUID: linkedSourceConfigUID,
  261. TemplateRepoURL: appResource.TemplateRepoURL,
  262. TemplateName: appResource.TemplateName,
  263. TemplateVersion: appResource.TemplateVersion,
  264. HelmRevisionID: 1,
  265. })
  266. }
  267. return res, nil
  268. }
  269. func getEnvGroupModels(envGroups []*types.CreateStackEnvGroupRequest, projID, clusterID uint, namespace string) ([]models.StackEnvGroup, error) {
  270. res := make([]models.StackEnvGroup, 0)
  271. for _, envGroup := range envGroups {
  272. uid, err := encryption.GenerateRandomBytes(16)
  273. if err != nil {
  274. return nil, err
  275. }
  276. res = append(res, models.StackEnvGroup{
  277. Name: envGroup.Name,
  278. UID: uid,
  279. EnvGroupVersion: 1,
  280. ProjectID: projID,
  281. ClusterID: clusterID,
  282. Namespace: namespace,
  283. })
  284. }
  285. return res, nil
  286. }