app_v2_github.go 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169
  1. package webhook
  2. import (
  3. "net/http"
  4. "connectrpc.com/connect"
  5. "github.com/google/go-github/v41/github"
  6. "github.com/google/uuid"
  7. porterv1 "github.com/porter-dev/api-contracts/generated/go/porter/v1"
  8. "github.com/porter-dev/porter/api/server/authz"
  9. "github.com/porter-dev/porter/api/server/handlers"
  10. "github.com/porter-dev/porter/api/server/shared"
  11. "github.com/porter-dev/porter/api/server/shared/apierrors"
  12. "github.com/porter-dev/porter/api/server/shared/config"
  13. "github.com/porter-dev/porter/api/server/shared/requestutils"
  14. "github.com/porter-dev/porter/api/types"
  15. "github.com/porter-dev/porter/internal/models"
  16. "github.com/porter-dev/porter/internal/telemetry"
  17. )
  18. // GithubPRStatus_Closed is the status for a closed PR (closed, merged)
  19. const GithubPRStatus_Closed = "closed"
  20. // GithubWebhookHandler handles webhooks sent to /api/webhooks/github/{project_id}/{cluster_id}/{porter_app_name}
  21. type GithubWebhookHandler struct {
  22. handlers.PorterHandlerReadWriter
  23. authz.KubernetesAgentGetter
  24. }
  25. // NewGithubWebhookHandler returns a GithubWebhookHandler
  26. func NewGithubWebhookHandler(
  27. config *config.Config,
  28. decoderValidator shared.RequestDecoderValidator,
  29. writer shared.ResultWriter,
  30. ) *GithubWebhookHandler {
  31. return &GithubWebhookHandler{
  32. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  33. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  34. }
  35. }
  36. // ServeHTTP handles the webhook and deletes the deployment target if a PR has been closed
  37. func (c *GithubWebhookHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  38. ctx, span := telemetry.NewSpan(r.Context(), "serve-github-webhook")
  39. defer span.End()
  40. payload, err := github.ValidatePayload(r, []byte(c.Config().ServerConf.GithubIncomingWebhookSecret))
  41. if err != nil {
  42. err := telemetry.Error(ctx, span, err, "could not validate payload")
  43. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  44. return
  45. }
  46. event, err := github.ParseWebHook(github.WebHookType(r), payload)
  47. if err != nil {
  48. err := telemetry.Error(ctx, span, err, "could not parse webhook")
  49. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  50. return
  51. }
  52. appName, reqErr := requestutils.GetURLParamString(r, types.URLParamPorterAppName)
  53. if reqErr != nil {
  54. err := telemetry.Error(ctx, span, nil, "error parsing porter app name")
  55. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  56. return
  57. }
  58. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "application-name", Value: appName})
  59. clusterID, reqErr := requestutils.GetURLParamUint(r, types.URLParamClusterID)
  60. if reqErr != nil {
  61. err := telemetry.Error(ctx, span, nil, "error parsing cluster id")
  62. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  63. return
  64. }
  65. projectID, reqErr := requestutils.GetURLParamUint(r, types.URLParamProjectID)
  66. if reqErr != nil {
  67. err := telemetry.Error(ctx, span, nil, "error parsing project id")
  68. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  69. return
  70. }
  71. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "project-id", Value: projectID})
  72. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "cluster-id", Value: clusterID})
  73. porterApps, err := c.Repo().PorterApp().ReadPorterAppsByProjectIDAndName(projectID, appName)
  74. if err != nil {
  75. err := telemetry.Error(ctx, span, err, "error getting porter app from repo")
  76. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  77. return
  78. }
  79. if len(porterApps) == 0 {
  80. err := telemetry.Error(ctx, span, err, "error getting porter app from repo")
  81. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  82. return
  83. }
  84. if len(porterApps) > 1 {
  85. err := telemetry.Error(ctx, span, err, "multiple porter apps returned; unable to determine which one to use")
  86. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  87. return
  88. }
  89. app := porterApps[0]
  90. if app.ID == 0 {
  91. err := telemetry.Error(ctx, span, err, "porter app id is missing")
  92. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  93. return
  94. }
  95. if app.ClusterID != clusterID {
  96. err := telemetry.Error(ctx, span, err, "porter app cluster id does not match")
  97. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  98. return
  99. }
  100. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "porter-app-id", Value: app.ID})
  101. switch event := event.(type) {
  102. case *github.PullRequestEvent:
  103. if event.GetAction() != GithubPRStatus_Closed {
  104. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "event-processed", Value: false})
  105. c.WriteResult(w, r, nil)
  106. return
  107. }
  108. branch := event.GetPullRequest().GetHead().GetRef()
  109. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "event-branch", Value: branch})
  110. deploymentTarget, err := c.Repo().DeploymentTarget().DeploymentTargetBySelectorAndSelectorType(
  111. projectID,
  112. clusterID,
  113. branch,
  114. string(models.DeploymentTargetSelectorType_Namespace),
  115. )
  116. if err != nil {
  117. err := telemetry.Error(ctx, span, err, "error getting deployment target")
  118. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  119. return
  120. }
  121. if deploymentTarget.ID == uuid.Nil || !deploymentTarget.Preview {
  122. c.WriteResult(w, r, nil)
  123. return
  124. }
  125. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "deployment-target-id", Value: deploymentTarget.ID.String()})
  126. if deploymentTarget.ClusterID != int(clusterID) {
  127. err := telemetry.Error(ctx, span, err, "deployment target cluster id does not match")
  128. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  129. return
  130. }
  131. deleteTargetReq := connect.NewRequest(&porterv1.DeleteDeploymentTargetRequest{
  132. ProjectId: int64(projectID),
  133. DeploymentTargetId: deploymentTarget.ID.String(),
  134. })
  135. _, err = c.Config().ClusterControlPlaneClient.DeleteDeploymentTarget(ctx, deleteTargetReq)
  136. if err != nil {
  137. err := telemetry.Error(ctx, span, err, "error deleting deployment target")
  138. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  139. return
  140. }
  141. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "event-processed", Value: true})
  142. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "pr-id", Value: event.GetPullRequest().GetID()})
  143. }
  144. c.WriteResult(w, r, nil)
  145. }