| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195 |
- package main
- import (
- "errors"
- "fmt"
- "log"
- "github.com/porter-dev/porter/api/server/shared/config/envloader"
- "github.com/porter-dev/porter/cmd/migrate/keyrotate"
- "github.com/porter-dev/porter/cmd/migrate/populate_source_config_display_name"
- "github.com/porter-dev/porter/cmd/migrate/startup_migrations"
- adapter "github.com/porter-dev/porter/internal/adapter"
- "github.com/porter-dev/porter/internal/features"
- "github.com/porter-dev/porter/internal/models"
- "github.com/porter-dev/porter/internal/repository/gorm"
- lr "github.com/porter-dev/porter/pkg/logger"
- "github.com/joeshaw/envdecode"
- pgorm "gorm.io/gorm"
- )
- func main() {
- logger := lr.NewConsole(true)
- logger.Info().Msg("running migrations")
- envConf, err := envloader.FromEnv()
- if err != nil {
- logger.Fatal().Err(err).Msg("could not load env conf")
- return
- }
- launchDarklyClient, err := features.GetClient(envConf.ServerConf.FeatureFlagClient, envConf.ServerConf.LaunchDarklySDKKey)
- if err != nil {
- logger.Fatal().Err(err).Msg("could not load launch darkly client")
- return
- }
- db, err := adapter.New(envConf.DBConf)
- if err != nil {
- logger.Fatal().Err(err).Msg("could not connect to the database")
- return
- }
- err = gorm.AutoMigrate(db, envConf.ServerConf.Debug)
- if err != nil {
- logger.Fatal().Err(err).Msg("gorm auto-migration failed")
- return
- }
- if err := db.Raw("ALTER TABLE clusters DROP CONSTRAINT IF EXISTS fk_cluster_token_caches").Error; err != nil {
- logger.Fatal().Err(err).Msg("failed to drop cluster token cache constraint")
- return
- }
- if err := db.Raw("ALTER TABLE cluster_token_caches DROP CONSTRAINT IF EXISTS fk_clusters_token_cache").Error; err != nil {
- logger.Fatal().Err(err).Msg("failed to drop clusters token cache constraint")
- return
- }
- err = db.Transaction(func(tx *pgorm.DB) error {
- if err := db.Exec("alter table aws_assume_role_chains DROP CONSTRAINT IF EXISTS fk_projects;").Error; err != nil {
- return fmt.Errorf("failed to drop fk constraint for assume role chains: %w", err)
- }
- if err := db.Exec("alter table aws_assume_role_chains ADD CONSTRAINT fk_projects FOREIGN KEY(project_id) REFERENCES projects(id);").Error; err != nil {
- return fmt.Errorf("failed to create fk constraint for assume role chains: %w", err)
- }
- if err := db.Exec("alter table aws_assume_role_chains ADD unique (project_id, source_arn, target_arn);").Error; err != nil {
- return fmt.Errorf("failed to create unique constraint for assume role chains: %w", err)
- }
- return nil
- })
- if err != nil {
- logger.Fatal().Err(err).Msg("error updating cluster control plane tables")
- }
- tx := db.Begin()
- switch tx.Dialector.Name() {
- case "sqlite":
- if err := tx.Raw("PRAGMA schema.locking_mode = EXCLUSIVE").Error; err != nil {
- tx.Rollback()
- logger.Fatal().Err(err).Msg("error acquiring lock on db_migrations")
- return
- }
- case "postgres":
- if err := tx.Raw("LOCK TABLE db_migrations IN SHARE ROW EXCLUSIVE MODE").Error; err != nil {
- tx.Rollback()
- logger.Fatal().Err(err).Msg("error acquiring lock on db_migrations")
- return
- }
- }
- dbMigration := &models.DbMigration{}
- if err := tx.Model(&models.DbMigration{}).First(dbMigration).Error; err != nil {
- if errors.Is(err, pgorm.ErrRecordNotFound) {
- dbMigration.Version = 0
- } else {
- tx.Rollback()
- logger.Fatal().Err(err).Msg("failed to check for db migration version")
- return
- }
- }
- latestMigrationVersion := startup_migrations.LatestMigrationVersion
- if dbMigration.Version < latestMigrationVersion {
- for ver, fn := range startup_migrations.StartupMigrations {
- if ver > dbMigration.Version {
- err := fn(tx, launchDarklyClient, logger)
- if err != nil {
- tx.Rollback()
- logger.Fatal().Err(err).Msg("failed to run startup migration script")
- return
- }
- }
- }
- dbMigration.Version = latestMigrationVersion
- if err := tx.Save(dbMigration).Error; err != nil {
- tx.Rollback()
- logger.Fatal().Err(err).Msg("failed to update migration version to latest")
- return
- }
- }
- tx.Commit()
- if shouldRotate, oldKeyStr, newKeyStr := shouldKeyRotate(); shouldRotate {
- oldKey := [32]byte{}
- newKey := [32]byte{}
- copy(oldKey[:], []byte(oldKeyStr))
- copy(newKey[:], []byte(newKeyStr))
- err := keyrotate.Rotate(db, &oldKey, &newKey)
- if err != nil {
- logger.Fatal().Err(err).Msg("key rotation failed")
- }
- }
- if shouldPopulateSourceConfigDisplayName() {
- err := populate_source_config_display_name.PopulateSourceConfigDisplayName(db, logger)
- if err != nil {
- logger.Fatal().Err(err).Msg("failed to populate source config display name")
- }
- }
- if err := InstanceMigrate(db, envConf.DBConf); err != nil {
- logger.Fatal().Err(err).Msg("vault migration failed")
- }
- }
- type RotateConf struct {
- // we add a dummy field to avoid empty struct issue with envdecode
- DummyField string `env:"ASDF,default=asdf"`
- OldEncryptionKey string `env:"OLD_ENCRYPTION_KEY"`
- NewEncryptionKey string `env:"NEW_ENCRYPTION_KEY"`
- }
- func shouldKeyRotate() (bool, string, string) {
- var c RotateConf
- if err := envdecode.StrictDecode(&c); err != nil {
- log.Fatalf("Failed to decode migration conf: %s", err)
- return false, "", ""
- }
- return c.OldEncryptionKey != "" && c.NewEncryptionKey != "", c.OldEncryptionKey, c.NewEncryptionKey
- }
- type PopulateSourceConfigDisplayNameConf struct {
- // we add a dummy field to avoid empty struct issue with envdecode
- DummyField string `env:"ASDF,default=asdf"`
- // if true, will populate the display name for all source configs
- PopulateSourceConfigDisplayName bool `env:"POPULATE_SOURCE_CONFIG_DISPLAY_NAME"`
- }
- func shouldPopulateSourceConfigDisplayName() bool {
- var c PopulateSourceConfigDisplayNameConf
- if err := envdecode.StrictDecode(&c); err != nil {
- log.Fatalf("Failed to decode migration conf: %s", err)
- return false
- }
- return c.PopulateSourceConfigDisplayName
- }
|