postrenderer.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514
  1. package helm
  2. import (
  3. "bytes"
  4. "io"
  5. "net/url"
  6. "regexp"
  7. "strings"
  8. "github.com/aws/aws-sdk-go/aws/arn"
  9. "github.com/porter-dev/porter/internal/kubernetes"
  10. "github.com/porter-dev/porter/internal/models"
  11. "github.com/porter-dev/porter/internal/models/integrations"
  12. "github.com/porter-dev/porter/internal/repository"
  13. "golang.org/x/oauth2"
  14. "gopkg.in/yaml.v2"
  15. "helm.sh/helm/v3/pkg/postrender"
  16. "github.com/docker/distribution/reference"
  17. )
  18. // DockerSecretsPostRenderer is a Helm post-renderer that adds image pull secrets to
  19. // pod specs that would otherwise be unable to pull an image.
  20. //
  21. // The post-renderer currently looks for two types of registries: GCR and ECR (TODO: DOCR
  22. // and Dockerhub). It also detects if the image pull secret is necessary: if GCR image pulls
  23. // occur in a GKE cluster in the same project, or if ECR image pulls exist in an EKS cluster
  24. // in the same organization + region, an image pull is not necessary.
  25. type DockerSecretsPostRenderer struct {
  26. Cluster *models.Cluster
  27. Repo repository.Repository
  28. Agent *kubernetes.Agent
  29. Namespace string
  30. DOAuth *oauth2.Config
  31. registries map[string]*models.Registry
  32. podSpecs []resource
  33. resources []resource
  34. }
  35. // while manifests are map[string]interface{} at the top level,
  36. // nested keys will be of type map[interface{}]interface{}
  37. type resource map[interface{}]interface{}
  38. func NewDockerSecretsPostRenderer(
  39. cluster *models.Cluster,
  40. repo repository.Repository,
  41. agent *kubernetes.Agent,
  42. namespace string,
  43. regs []*models.Registry,
  44. doAuth *oauth2.Config,
  45. ) (postrender.PostRenderer, error) {
  46. // Registries is a map of registry URLs to registry ids
  47. registries := make(map[string]*models.Registry)
  48. for _, reg := range regs {
  49. regURL := reg.URL
  50. if !strings.Contains(regURL, "http") {
  51. regURL = "https://" + regURL
  52. }
  53. parsedRegURL, err := url.Parse(regURL)
  54. if err != nil {
  55. continue
  56. }
  57. addReg := parsedRegURL.Host
  58. if parsedRegURL.Path != "" {
  59. addReg += "/" + strings.Trim(parsedRegURL.Path, "/")
  60. }
  61. registries[addReg] = reg
  62. }
  63. return &DockerSecretsPostRenderer{
  64. Cluster: cluster,
  65. Repo: repo,
  66. Agent: agent,
  67. Namespace: namespace,
  68. DOAuth: doAuth,
  69. registries: registries,
  70. podSpecs: make([]resource, 0),
  71. resources: make([]resource, 0),
  72. }, nil
  73. }
  74. func (d *DockerSecretsPostRenderer) Run(
  75. renderedManifests *bytes.Buffer,
  76. ) (modifiedManifests *bytes.Buffer, err error) {
  77. bufCopy := bytes.NewBuffer(renderedManifests.Bytes())
  78. linkedRegs, err := d.getRegistriesToLink(bufCopy)
  79. // if we encountered an error here, we'll render the manifests anyway
  80. // without modification
  81. if err != nil {
  82. return renderedManifests, nil
  83. }
  84. // Check to see if the resources loaded into the postrenderer contain a configmap
  85. // with a manifest that needs secrets generation as well. If this is the case, create and
  86. // run another postrenderer for this specific manifest.
  87. for i, res := range d.resources {
  88. kindVal, hasKind := res["kind"]
  89. if !hasKind {
  90. continue
  91. }
  92. kind, ok := kindVal.(string)
  93. if !ok {
  94. continue
  95. }
  96. if kind == "ConfigMap" {
  97. labelVal := getNestedResource(res, "metadata", "labels")
  98. if labelVal == nil {
  99. continue
  100. }
  101. porterLabelVal, exists := labelVal["getporter.dev/manifest"]
  102. if !exists {
  103. continue
  104. }
  105. if labelValStr, ok := porterLabelVal.(string); ok && labelValStr == "true" {
  106. data := getNestedResource(res, "data")
  107. manifestData, exists := data["manifest"]
  108. if !exists {
  109. continue
  110. }
  111. manifestDataStr, ok := manifestData.(string)
  112. if !ok {
  113. continue
  114. }
  115. dCopy := &DockerSecretsPostRenderer{
  116. Cluster: d.Cluster,
  117. Repo: d.Repo,
  118. Agent: d.Agent,
  119. Namespace: d.Namespace,
  120. DOAuth: d.DOAuth,
  121. registries: d.registries,
  122. podSpecs: make([]resource, 0),
  123. resources: make([]resource, 0),
  124. }
  125. newData, err := dCopy.Run(bytes.NewBufferString(manifestDataStr))
  126. if err != nil {
  127. continue
  128. }
  129. data["manifest"] = string(newData.Bytes())
  130. d.resources[i] = res
  131. }
  132. }
  133. }
  134. // create the necessary secrets
  135. secrets, err := d.Agent.CreateImagePullSecrets(
  136. d.Repo,
  137. d.Namespace,
  138. linkedRegs,
  139. d.DOAuth,
  140. )
  141. if err != nil {
  142. return renderedManifests, nil
  143. }
  144. d.updatePodSpecs(secrets)
  145. modifiedManifests = bytes.NewBuffer([]byte{})
  146. encoder := yaml.NewEncoder(modifiedManifests)
  147. defer encoder.Close()
  148. for _, resource := range d.resources {
  149. err = encoder.Encode(resource)
  150. if err != nil {
  151. return nil, err
  152. }
  153. }
  154. return modifiedManifests, nil
  155. }
  156. func (d *DockerSecretsPostRenderer) getRegistriesToLink(renderedManifests *bytes.Buffer) (map[string]*models.Registry, error) {
  157. // create a map of registry names to registries: these are the registries
  158. // that a secret will be generated for, if it does not exist
  159. linkedRegs := make(map[string]*models.Registry)
  160. err := d.decodeRenderedManifests(renderedManifests)
  161. if err != nil {
  162. return linkedRegs, err
  163. }
  164. // read the pod specs into the post-renderer object
  165. d.getPodSpecs(d.resources)
  166. for _, podSpec := range d.podSpecs {
  167. // get all images
  168. images := d.getImageList(podSpec)
  169. // read the image url
  170. for _, image := range images {
  171. regName, err := getRegNameFromImageRef(image)
  172. if err != nil {
  173. continue
  174. }
  175. // check if the integration is native to the cluster/registry combination
  176. isNative := d.isRegistryNative(regName)
  177. if isNative {
  178. continue
  179. }
  180. reg, exists := d.registries[regName]
  181. if !exists {
  182. continue
  183. }
  184. // if the registry exists, add it to the map
  185. linkedRegs[regName] = reg
  186. }
  187. }
  188. return linkedRegs, nil
  189. }
  190. func (d *DockerSecretsPostRenderer) decodeRenderedManifests(
  191. renderedManifests *bytes.Buffer,
  192. ) error {
  193. // use the yaml decoder to parse the multi-document yaml.
  194. decoder := yaml.NewDecoder(renderedManifests)
  195. for {
  196. res := make(resource)
  197. err := decoder.Decode(&res)
  198. if err == io.EOF {
  199. break
  200. }
  201. if err != nil {
  202. return err
  203. }
  204. d.resources = append(d.resources, res)
  205. }
  206. return nil
  207. }
  208. func (d *DockerSecretsPostRenderer) getPodSpecs(resources []resource) {
  209. for _, res := range resources {
  210. kindVal, hasKind := res["kind"]
  211. if !hasKind {
  212. continue
  213. }
  214. kind, ok := kindVal.(string)
  215. if !ok {
  216. continue
  217. }
  218. // manifests of list type will have an items field, items should
  219. // be recursively parsed
  220. if itemsVal, isList := res["items"]; isList {
  221. if items, ok := itemsVal.([]interface{}); ok {
  222. // convert items to resource
  223. resArr := make([]resource, 0)
  224. for _, item := range items {
  225. if arrVal, ok := item.(resource); ok {
  226. resArr = append(resArr, arrVal)
  227. }
  228. }
  229. d.getPodSpecs(resArr)
  230. }
  231. continue
  232. }
  233. // otherwise, get the pod spec based on the type of resource
  234. podSpec := getPodSpecFromResource(kind, res)
  235. if podSpec == nil {
  236. continue
  237. }
  238. d.podSpecs = append(d.podSpecs, podSpec)
  239. }
  240. return
  241. }
  242. func (d *DockerSecretsPostRenderer) updatePodSpecs(secrets map[string]string) {
  243. for _, podSpec := range d.podSpecs {
  244. containersVal, hasContainers := podSpec["containers"]
  245. if !hasContainers {
  246. continue
  247. }
  248. containers, ok := containersVal.([]interface{})
  249. if !ok {
  250. continue
  251. }
  252. imagePullSecrets := make([]map[string]interface{}, 0)
  253. if existingPullSecrets, ok := podSpec["imagePullSecrets"]; ok {
  254. if existing, ok := existingPullSecrets.([]map[string]interface{}); ok {
  255. imagePullSecrets = existing
  256. }
  257. }
  258. for _, container := range containers {
  259. _container, ok := container.(resource)
  260. if !ok {
  261. continue
  262. }
  263. image, ok := _container["image"].(string)
  264. if !ok {
  265. continue
  266. }
  267. regName, err := getRegNameFromImageRef(image)
  268. if err != nil {
  269. continue
  270. }
  271. if secretName, ok := secrets[regName]; ok && secretName != "" {
  272. imagePullSecrets = append(imagePullSecrets, map[string]interface{}{
  273. "name": secretName,
  274. })
  275. }
  276. }
  277. if len(imagePullSecrets) > 0 {
  278. podSpec["imagePullSecrets"] = imagePullSecrets
  279. }
  280. }
  281. }
  282. func (d *DockerSecretsPostRenderer) getImageList(podSpec resource) []string {
  283. images := make([]string, 0)
  284. containersVal, hasContainers := podSpec["containers"]
  285. if !hasContainers {
  286. return images
  287. }
  288. containers, ok := containersVal.([]interface{})
  289. if !ok {
  290. return images
  291. }
  292. for _, container := range containers {
  293. _container, ok := container.(resource)
  294. if !ok {
  295. continue
  296. }
  297. image, ok := _container["image"].(string)
  298. if !ok {
  299. continue
  300. }
  301. images = append(images, image)
  302. }
  303. return images
  304. }
  305. var ecrPattern = regexp.MustCompile(`(^[a-zA-Z0-9][a-zA-Z0-9-_]*)\.dkr\.ecr(\-fips)?\.([a-zA-Z0-9][a-zA-Z0-9-_]*)\.amazonaws\.com(\.cn)?`)
  306. func (d *DockerSecretsPostRenderer) isRegistryNative(regName string) bool {
  307. isNative := false
  308. if strings.Contains(regName, "gcr") && d.Cluster.AuthMechanism == models.GCP {
  309. // get the project id of the cluster
  310. gcpInt, err := d.Repo.GCPIntegration.ReadGCPIntegration(d.Cluster.GCPIntegrationID)
  311. if err != nil {
  312. return false
  313. }
  314. gkeProjectID, err := integrations.GCPProjectIDFromJSON(gcpInt.GCPKeyData)
  315. if err != nil {
  316. return false
  317. }
  318. // parse the project id of the gcr url
  319. if regNameArr := strings.Split(regName, "/"); len(regNameArr) >= 2 {
  320. gcrProjectID := regNameArr[1]
  321. isNative = gcrProjectID == gkeProjectID
  322. }
  323. } else if strings.Contains(regName, "ecr") && d.Cluster.AuthMechanism == models.AWS {
  324. matches := ecrPattern.FindStringSubmatch(regName)
  325. if len(matches) < 3 {
  326. return false
  327. }
  328. eksAccountID := matches[1]
  329. eksRegion := matches[3]
  330. awsInt, err := d.Repo.AWSIntegration.ReadAWSIntegration(d.Cluster.AWSIntegrationID)
  331. if err != nil {
  332. return false
  333. }
  334. err = awsInt.PopulateAWSArn()
  335. if err != nil {
  336. return false
  337. }
  338. parsedARN, err := arn.Parse(awsInt.AWSArn)
  339. if err != nil {
  340. return false
  341. }
  342. isNative = parsedARN.AccountID == eksAccountID && parsedARN.Region == eksRegion
  343. }
  344. return isNative
  345. }
  346. func getPodSpecFromResource(kind string, res resource) resource {
  347. switch kind {
  348. case "Pod":
  349. return getNestedResource(res, "spec")
  350. case "DaemonSet", "Deployment", "Job", "ReplicaSet", "ReplicationController", "StatefulSet":
  351. return getNestedResource(res, "spec", "template", "spec")
  352. case "PodTemplate":
  353. return getNestedResource(res, "template", "spec")
  354. case "CronJob":
  355. return getNestedResource(res, "spec", "jobTemplate", "spec", "template", "spec")
  356. }
  357. return nil
  358. }
  359. func getNestedResource(res resource, keys ...string) resource {
  360. curr := res
  361. var ok bool
  362. for _, key := range keys {
  363. curr, ok = curr[key].(resource)
  364. if !ok {
  365. return nil
  366. }
  367. }
  368. return curr
  369. }
  370. func getRegNameFromImageRef(image string) (string, error) {
  371. named, err := reference.ParseNormalizedNamed(image)
  372. if err != nil {
  373. return "", err
  374. }
  375. domain := reference.Domain(named)
  376. path := reference.Path(named)
  377. var regName string
  378. // if registry is dockerhub, leave the image name as-is
  379. if strings.Contains(domain, "docker.io") {
  380. regName = "index.docker.io/" + path
  381. } else {
  382. regName = domain
  383. if pathArr := strings.Split(path, "/"); len(pathArr) > 1 {
  384. regName += "/" + strings.Join(pathArr[:len(pathArr)-1], "/")
  385. }
  386. }
  387. return regName, nil
  388. }