chipling commited on
Commit
91e5323
·
verified ·
1 Parent(s): fed2e5c

Update routers/deploy.py

Browse files
Files changed (1) hide show
  1. routers/deploy.py +0 -251
routers/deploy.py CHANGED
@@ -18,11 +18,6 @@ router = APIRouter()
18
 
19
  deployed_projects = {}
20
 
21
-
22
- GITHUB_WEBHOOK_SECRET = os.getenv("GITHUB_WEBHOOK_SECRET", "your_github_webhook_secret_here_CHANGE_THIS")
23
- if GITHUB_WEBHOOK_SECRET == "your_github_webhook_secret_here_CHANGE_THIS":
24
- print("WARNING: GITHUB_WEBHOOK_SECRET is not set. Webhook security is compromised.")
25
-
26
  # --- Helper Functions ---
27
 
28
  # Function to recursively find a file (case-insensitive) within a directory
@@ -39,147 +34,6 @@ def _find_file_in_project(filename: str, root_dir: str) -> str | None:
39
  return None
40
 
41
  # Function to build and deploy a Docker container from a project path
42
- async def _build_and_deploy(project_id: str, project_path: str, app_name: str, existing_container_name: str = None):
43
- """
44
- Handles the Docker build and deployment process for a given project.
45
- If an existing_container_name is provided, it attempts to stop and remove it first.
46
- Manages ngrok tunnels for the deployed application.
47
- """
48
- docker_client = docker.from_env()
49
-
50
- # Define consistent naming for Docker image and container
51
- image_name = f"{app_name.lower()}_{project_id[:8]}"
52
- container_name = f"{image_name}_container"
53
-
54
- try:
55
- # Step 1: Clean up old containers and images if they exist
56
- # Stop and remove the previously deployed container for this project
57
- if existing_container_name:
58
- print(f"Attempting to stop and remove existing container: {existing_container_name}")
59
- try:
60
- old_container = docker_client.containers.get(existing_container_name)
61
- old_container.stop(timeout=5) # Give 5 seconds to stop gracefully
62
- old_container.remove(force=True)
63
- print(f"Successfully stopped and removed old container: {existing_container_name}")
64
- except docker.errors.NotFound:
65
- print(f"Existing container {existing_container_name} not found, proceeding with new deployment.")
66
- except Exception as e:
67
- print(f"Error stopping/removing old container {existing_container_name}: {e}")
68
-
69
- # Remove any exited or created containers that might be lingering from previous runs
70
- # (This is a general cleanup, not specific to this project_id, but good practice)
71
- for c in docker_client.containers.list(all=True):
72
- if c.status in ["created", "exited"]: # Only remove non-running containers
73
- # Be cautious: only remove containers clearly associated with this deployment logic
74
- # For more robust logic, might check labels or names more strictly
75
- if c.name.startswith(f"{app_name.lower()}_{project_id[:8]}") or c.name.startswith(f"ngrok-"):
76
- print(f"Removing leftover container {c.name} ({c.id}) with status {c.status}")
77
- try:
78
- c.remove(force=True)
79
- except Exception as e:
80
- print(f"Error removing leftover container {c.name}: {e}")
81
-
82
- # Step 2: Build Docker image
83
- print(f"Building Docker image from {project_path} with tag: {image_name}")
84
- image, build_logs_generator = docker_client.images.build(path=project_path, tag=image_name, rm=True)
85
- # Process build logs (can be streamed to UI in a real application)
86
- for log_line in build_logs_generator:
87
- if 'stream' in log_line:
88
- print(f"[BUILD LOG] {log_line['stream'].strip()}")
89
- elif 'error' in log_line:
90
- print(f"[BUILD ERROR] {log_line['error'].strip()}")
91
-
92
- print(f"Docker image built successfully: {image.id}")
93
-
94
- # Step 3: Run new Docker container
95
- print(f"Running new container {container_name} from image {image_name}")
96
- container = docker_client.containers.run(
97
- image=image_name,
98
- ports={"8080/tcp": None}, # Docker will assign a random host port for 8080/tcp
99
- name=container_name,
100
- detach=True, # Run in background
101
- mem_limit="512m", # Limit memory usage
102
- nano_cpus=1_000_000_000, # Limit CPU usage to 1 full core (1 billion nano-CPUs)
103
- read_only=True, # Make container filesystem read-only (except tmpfs)
104
- tmpfs={"/tmp": ""}, # Mount an in-memory tmpfs for /tmp directory
105
- user="1001:1001" # Run as a non-root user (important for security)
106
- )
107
- print(f"Container started with ID: {container.id}")
108
-
109
- # Wait a moment for the container to fully start and expose its port
110
- time.sleep(5) # Increased sleep to give the application within the container more time
111
-
112
- # Retrieve the dynamically assigned host port for the container's 8080 port
113
- port_info = docker_client.api.port(container.id, 8080)
114
- if not port_info:
115
- # If port 8080 is not exposed, the container likely failed to start or is not exposing correctly
116
- print(f"Error: Port 8080 not exposed by container {container.id}. Inspecting container logs...")
117
- try:
118
- container_logs = container.logs().decode('utf-8')
119
- print(f"Container logs:\n{container_logs}")
120
- except Exception as log_e:
121
- print(f"Could not retrieve container logs: {log_e}")
122
- container.stop()
123
- container.remove(force=True)
124
- raise Exception("Port 8080 not exposed by container or container failed to start correctly. Check container logs.")
125
-
126
- host_port = port_info[0]['HostPort']
127
- print(f"Container {container.id} is accessible on host port: {host_port}")
128
-
129
- # Step 4: Manage ngrok tunnel
130
- # Check if an ngrok tunnel already exists for this project and close it
131
- if project_id in deployed_projects and deployed_projects[project_id].get('ngrok_tunnel'):
132
- existing_tunnel = deployed_projects[project_id]['ngrok_tunnel']
133
- print(f"Closing existing ngrok tunnel: {existing_tunnel.public_url}")
134
- try:
135
- existing_tunnel.disconnect()
136
- except Exception as ngrok_disconnect_e:
137
- print(f"Error disconnecting existing ngrok tunnel: {ngrok_disconnect_e}")
138
- deployed_projects[project_id]['ngrok_tunnel'] = None # Clear the reference
139
-
140
- # Connect a new ngrok tunnel to the dynamically assigned host port
141
- print(f"Connecting new ngrok tunnel to host port {host_port}")
142
- tunnel = ngrok.connect(host_port, bind_tls=True) # bind_tls=True for HTTPS
143
- public_url = tunnel.public_url
144
- print(f"Ngrok public URL for {app_name}: {public_url}")
145
-
146
- # Step 5: Update global state with new deployment details
147
- # Ensure the project_id exists in deployed_projects before updating
148
- if project_id not in deployed_projects:
149
- deployed_projects[project_id] = {} # Initialize if not already present (should be by deploy_from_git)
150
-
151
- deployed_projects[project_id].update({
152
- "container_id": container.id,
153
- "container_name": container_name,
154
- "ngrok_tunnel": tunnel,
155
- "public_url": public_url,
156
- "status": "deployed" # Set status to deployed on success
157
- })
158
-
159
- return public_url, container_name
160
-
161
- except docker.errors.BuildError as e:
162
- print(f"Docker build error: {e}")
163
- # Capture and return detailed build logs for better debugging
164
- build_logs_str = "\n".join([str(log_line.get('stream', '')).strip() for log_line in e.build_log if 'stream' in log_line])
165
- if project_id in deployed_projects:
166
- deployed_projects[project_id]["status"] = "failed"
167
- raise HTTPException(status_code=500, detail=f"Docker build failed: {e.msg}\nLogs:\n{build_logs_str}")
168
- except docker.errors.ContainerError as e:
169
- print(f"Docker container runtime error: {e}")
170
- if project_id in deployed_projects:
171
- deployed_projects[project_id]["status"] = "failed"
172
- raise HTTPException(status_code=500, detail=f"Container failed during runtime: {e.stderr.decode()}")
173
- except docker.errors.APIError as e:
174
- print(f"Docker API error: {e}")
175
- if project_id in deployed_projects:
176
- deployed_projects[project_id]["status"] = "failed"
177
- raise HTTPException(status_code=500, detail=f"Docker daemon or API error: {e.explanation}")
178
- except Exception as e:
179
- print(f"General deployment error: {e}")
180
- if project_id in deployed_projects:
181
- deployed_projects[project_id]["status"] = "failed"
182
- raise HTTPException(status_code=500, detail=f"Deployment process failed unexpectedly: {str(e)}")
183
 
184
  # --- API Endpoints ---
185
 
@@ -287,111 +141,6 @@ async def deploy_from_git(repo_url: str = Form(...), app_name: str = Form(...)):
287
  print(f"Error during initial _build_and_deploy for project {project_id}: {e}")
288
  raise HTTPException(status_code=500, detail=f"Initial deployment failed unexpectedly: {str(e)}")
289
 
290
- @router.post("/webhook/github")
291
- async def github_webhook(request: Request, background_tasks: BackgroundTasks):
292
- """
293
- Endpoint to receive GitHub webhook events (e.g., push events) and trigger redeployments.
294
- """
295
- # --- Security: Verify GitHub Webhook Signature ---
296
- # This is CRUCIAL to ensure the webhook is from GitHub and hasn't been tampered with.
297
- # For production, DO NOT comment this out.
298
- signature_header = request.headers.get("X-Hub-Signature-256")
299
- if not signature_header:
300
- raise HTTPException(status_code=403, detail="X-Hub-Signature-256 header missing.")
301
-
302
- # Read the raw request body once to use for hashing
303
- body = await request.body()
304
-
305
- try:
306
- # Calculate expected signature
307
- sha_name, signature = signature_header.split("=", 1)
308
- if sha_name != "sha256":
309
- raise HTTPException(status_code=400, detail="Invalid X-Hub-Signature-256 algorithm. Only sha256 supported.")
310
-
311
- # Use HMAC-SHA256 with your secret key to hash the raw request body
312
- # Ensure the secret is encoded to bytes
313
- mac = hmac.new(GITHUB_WEBHOOK_SECRET.encode("utf-8"), body, hashlib.sha256)
314
-
315
- # Compare the calculated hash with the signature received from GitHub
316
- if not hmac.compare_digest(mac.hexdigest(), signature):
317
- raise HTTPException(status_code=403, detail="Invalid GitHub signature.")
318
- except Exception as e:
319
- print(f"Webhook signature verification failed: {e}")
320
- raise HTTPException(status_code=403, detail="Signature verification failed.")
321
-
322
- # Parse the JSON payload from the webhook
323
- payload = await request.json()
324
- github_event = request.headers.get("X-GitHub-Event")
325
-
326
- print(f"Received GitHub '{github_event}' webhook for repository: {payload.get('repository', {}).get('full_name')}")
327
-
328
- # Process only 'push' events
329
- if github_event != "push":
330
- return JSONResponse({"message": f"Received '{github_event}' event, but only 'push' events are processed."}, status_code=200)
331
-
332
- # Get the repository URL from the webhook payload
333
- repo_url_from_webhook = payload.get("repository", {}).get("html_url") # Prefer html_url or clone_url
334
- if not repo_url_from_webhook:
335
- raise HTTPException(status_code=400, detail="Repository URL not found in webhook payload.")
336
-
337
- # Find the project linked to this repository in our in-memory storage
338
- project_to_redeploy = None
339
- project_id_to_redeploy = None
340
- for project_id, project_data in deployed_projects.items():
341
- # Match based on repo_url. A more robust solution might normalize URLs or use repository IDs.
342
- if project_data.get("repo_url") == repo_url_from_webhook:
343
- project_to_redeploy = project_data
344
- project_id_to_redeploy = project_id
345
- break
346
-
347
- if not project_to_redeploy:
348
- print(f"No active project found for repository: {repo_url_from_webhook}. Webhook ignored.")
349
- return JSONResponse({"message": "No associated project found for this repository, ignoring webhook."}, status_code=200)
350
-
351
- print(f"Received push for {repo_url_from_webhook}. Triggering redeployment for project {project_id_to_redeploy} ({project_to_redeploy['app_name']}).")
352
-
353
- # Step 1: Pull the latest changes from the Git repository
354
- project_path = project_to_redeploy["project_path"]
355
- try:
356
- repo = git.Repo(project_path)
357
- origin = repo.remotes.origin
358
- print(f"Pulling latest changes for {repo_url_from_webhook} into {project_path}")
359
- origin.pull() # Pull the latest changes from the remote
360
- print("Latest changes pulled successfully.")
361
- except git.exc.GitCommandError as e:
362
- print(f"Failed to pull latest changes for {repo_url_from_webhook}: {e.stderr.decode()}")
363
- # Update project status to failed if pull fails
364
- deployed_projects[project_id_to_redeploy]["status"] = "failed"
365
- return JSONResponse({"error": f"Failed to pull latest changes: {e.stderr.decode()}"}, status_code=500)
366
- except Exception as e:
367
- print(f"Unexpected error during git pull: {e}")
368
- deployed_projects[project_id_to_redeploy]["status"] = "failed"
369
- return JSONResponse({"error": f"An unexpected error occurred during git pull: {str(e)}"}, status_code=500)
370
-
371
- # Step 2: Trigger redeployment in a background task
372
- # Using FastAPI's BackgroundTasks ensures the webhook endpoint returns immediately,
373
- # preventing timeouts for GitHub, while the redeployment happens asynchronously.
374
-
375
- # Get the current container name for proper cleanup in _build_and_deploy
376
- current_container_name = project_to_redeploy.get("container_name")
377
-
378
- # Add the build and deploy task to background tasks
379
- background_tasks.add_task(
380
- _build_and_deploy,
381
- project_id_to_redeploy,
382
- project_path,
383
- project_to_redeploy["app_name"],
384
- current_container_name # Pass existing container name for cleanup
385
- )
386
-
387
- # Update project status to indicate redeployment is in progress
388
- deployed_projects[project_id_to_redeploy]["status"] = "redeploying"
389
-
390
- return JSONResponse(
391
- {"message": f"Redeployment for project {project_id_to_redeploy} initiated from GitHub webhook."},
392
- background=background_tasks,
393
- status_code=202 # 202 Accepted: request has been accepted for processing
394
- )
395
 
396
  # --- Cleanup Endpoint (Optional, for manual testing/management) ---
397
  @router.post("/project/delete/{project_id}")
 
18
 
19
  deployed_projects = {}
20
 
 
 
 
 
 
21
  # --- Helper Functions ---
22
 
23
  # Function to recursively find a file (case-insensitive) within a directory
 
34
  return None
35
 
36
  # Function to build and deploy a Docker container from a project path
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
37
 
38
  # --- API Endpoints ---
39
 
 
141
  print(f"Error during initial _build_and_deploy for project {project_id}: {e}")
142
  raise HTTPException(status_code=500, detail=f"Initial deployment failed unexpectedly: {str(e)}")
143
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
144
 
145
  # --- Cleanup Endpoint (Optional, for manual testing/management) ---
146
  @router.post("/project/delete/{project_id}")