app_v2_github.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154
  1. package webhook
  2. import (
  3. "net/http"
  4. "connectrpc.com/connect"
  5. "github.com/google/go-github/v41/github"
  6. "github.com/google/uuid"
  7. porterv1 "github.com/porter-dev/api-contracts/generated/go/porter/v1"
  8. "github.com/porter-dev/porter/api/server/authz"
  9. "github.com/porter-dev/porter/api/server/handlers"
  10. "github.com/porter-dev/porter/api/server/shared"
  11. "github.com/porter-dev/porter/api/server/shared/apierrors"
  12. "github.com/porter-dev/porter/api/server/shared/config"
  13. "github.com/porter-dev/porter/api/server/shared/requestutils"
  14. "github.com/porter-dev/porter/api/types"
  15. "github.com/porter-dev/porter/internal/models"
  16. "github.com/porter-dev/porter/internal/telemetry"
  17. )
  18. type GithubWebhookHandler struct {
  19. handlers.PorterHandlerReadWriter
  20. authz.KubernetesAgentGetter
  21. }
  22. func NewGithubWebhookHandler(
  23. config *config.Config,
  24. decoderValidator shared.RequestDecoderValidator,
  25. writer shared.ResultWriter,
  26. ) *GithubWebhookHandler {
  27. return &GithubWebhookHandler{
  28. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  29. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  30. }
  31. }
  32. func (c *GithubWebhookHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  33. ctx, span := telemetry.NewSpan(r.Context(), "serve-github-webhook")
  34. defer span.End()
  35. payload, err := github.ValidatePayload(r, []byte(c.Config().ServerConf.GithubIncomingWebhookSecret))
  36. if err != nil {
  37. err := telemetry.Error(ctx, span, err, "could not validate payload")
  38. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  39. return
  40. }
  41. event, err := github.ParseWebHook(github.WebHookType(r), payload)
  42. if err != nil {
  43. err := telemetry.Error(ctx, span, err, "could not parse webhook")
  44. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  45. return
  46. }
  47. appName, reqErr := requestutils.GetURLParamString(r, types.URLParamPorterAppName)
  48. if reqErr != nil {
  49. err := telemetry.Error(ctx, span, nil, "error parsing porter app name")
  50. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  51. return
  52. }
  53. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "application-name", Value: appName})
  54. clusterID, reqErr := requestutils.GetURLParamUint(r, types.URLParamClusterID)
  55. if reqErr != nil {
  56. err := telemetry.Error(ctx, span, nil, "error parsing cluster id")
  57. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  58. return
  59. }
  60. projectID, reqErr := requestutils.GetURLParamUint(r, types.URLParamProjectID)
  61. if reqErr != nil {
  62. err := telemetry.Error(ctx, span, nil, "error parsing project id")
  63. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  64. return
  65. }
  66. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "project-id", Value: projectID})
  67. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "cluster-id", Value: clusterID})
  68. porterApps, err := c.Repo().PorterApp().ReadPorterAppsByProjectIDAndName(projectID, appName)
  69. if err != nil {
  70. err := telemetry.Error(ctx, span, err, "error getting porter app from repo")
  71. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  72. return
  73. }
  74. if len(porterApps) == 0 {
  75. err := telemetry.Error(ctx, span, err, "error getting porter app from repo")
  76. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  77. return
  78. }
  79. if len(porterApps) > 1 {
  80. err := telemetry.Error(ctx, span, err, "multiple porter apps returned; unable to determine which one to use")
  81. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  82. return
  83. }
  84. app := porterApps[0]
  85. if app.ID == 0 {
  86. err := telemetry.Error(ctx, span, err, "porter app id is missing")
  87. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  88. return
  89. }
  90. if app.ClusterID != clusterID {
  91. err := telemetry.Error(ctx, span, err, "porter app cluster id does not match")
  92. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  93. return
  94. }
  95. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "porter-app-id", Value: app.ID})
  96. switch event := event.(type) {
  97. case *github.PullRequestEvent:
  98. if event.GetAction() != "closed" {
  99. c.WriteResult(w, r, nil)
  100. return
  101. }
  102. branch := event.GetPullRequest().GetHead().GetRef()
  103. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "event-branch", Value: branch})
  104. deploymentTarget, err := c.Repo().DeploymentTarget().DeploymentTargetBySelectorAndSelectorType(
  105. projectID,
  106. clusterID,
  107. branch,
  108. string(models.DeploymentTargetSelectorType_Namespace),
  109. )
  110. if err != nil {
  111. err := telemetry.Error(ctx, span, err, "error getting deployment target")
  112. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  113. return
  114. }
  115. if deploymentTarget.ID == uuid.Nil || !deploymentTarget.Preview {
  116. c.WriteResult(w, r, nil)
  117. return
  118. }
  119. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "deployment-target-id", Value: deploymentTarget.ID.String()})
  120. deleteTargetReq := connect.NewRequest(&porterv1.DeleteDeploymentTargetRequest{
  121. ProjectId: int64(projectID),
  122. ClusterId: int64(clusterID),
  123. DeploymentTargetId: deploymentTarget.ID.String(),
  124. })
  125. _, err = c.Config().ClusterControlPlaneClient.DeleteDeploymentTarget(ctx, deleteTargetReq)
  126. if err != nil {
  127. err := telemetry.Error(ctx, span, err, "error deleting deployment target")
  128. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  129. return
  130. }
  131. }
  132. c.WriteResult(w, r, nil)
  133. }