postrenderer.go 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439
  1. package helm
  2. import (
  3. "bytes"
  4. "io"
  5. "net/url"
  6. "regexp"
  7. "strings"
  8. "github.com/aws/aws-sdk-go/aws/arn"
  9. "github.com/porter-dev/porter/internal/kubernetes"
  10. "github.com/porter-dev/porter/internal/models"
  11. "github.com/porter-dev/porter/internal/models/integrations"
  12. "github.com/porter-dev/porter/internal/repository"
  13. "golang.org/x/oauth2"
  14. "gopkg.in/yaml.v2"
  15. "helm.sh/helm/v3/pkg/postrender"
  16. "github.com/docker/distribution/reference"
  17. )
  18. // DockerSecretsPostRenderer is a Helm post-renderer that adds image pull secrets to
  19. // pod specs that would otherwise be unable to pull an image.
  20. //
  21. // The post-renderer currently looks for two types of registries: GCR and ECR (TODO: DOCR
  22. // and Dockerhub). It also detects if the image pull secret is necessary: if GCR image pulls
  23. // occur in a GKE cluster in the same project, or if ECR image pulls exist in an EKS cluster
  24. // in the same organization + region, an image pull is not necessary.
  25. type DockerSecretsPostRenderer struct {
  26. Cluster *models.Cluster
  27. Repo repository.Repository
  28. Agent *kubernetes.Agent
  29. Namespace string
  30. DOAuth *oauth2.Config
  31. registries map[string]*models.Registry
  32. podSpecs []resource
  33. resources []resource
  34. }
  35. // while manifests are map[string]interface{} at the top level,
  36. // nested keys will be of type map[interface{}]interface{}
  37. type resource map[interface{}]interface{}
  38. func NewDockerSecretsPostRenderer(
  39. cluster *models.Cluster,
  40. repo repository.Repository,
  41. agent *kubernetes.Agent,
  42. namespace string,
  43. regs []*models.Registry,
  44. doAuth *oauth2.Config,
  45. ) (postrender.PostRenderer, error) {
  46. // Registries is a map of registry URLs to registry ids
  47. registries := make(map[string]*models.Registry)
  48. for _, reg := range regs {
  49. regURL := reg.URL
  50. if !strings.Contains(regURL, "http") {
  51. regURL = "https://" + regURL
  52. }
  53. parsedRegURL, err := url.Parse(regURL)
  54. if err != nil {
  55. continue
  56. }
  57. addReg := parsedRegURL.Host
  58. if parsedRegURL.Path != "" {
  59. addReg += "/" + strings.Trim(parsedRegURL.Path, "/")
  60. }
  61. registries[addReg] = reg
  62. }
  63. return &DockerSecretsPostRenderer{
  64. Cluster: cluster,
  65. Repo: repo,
  66. Agent: agent,
  67. Namespace: namespace,
  68. DOAuth: doAuth,
  69. registries: registries,
  70. podSpecs: make([]resource, 0),
  71. resources: make([]resource, 0),
  72. }, nil
  73. }
  74. func (d *DockerSecretsPostRenderer) Run(
  75. renderedManifests *bytes.Buffer,
  76. ) (modifiedManifests *bytes.Buffer, err error) {
  77. bufCopy := bytes.NewBuffer(renderedManifests.Bytes())
  78. linkedRegs, err := d.getRegistriesToLink(bufCopy)
  79. // if we encountered an error here, we'll render the manifests anyway
  80. // without modification
  81. if err != nil {
  82. return renderedManifests, nil
  83. }
  84. // create the necessary secrets
  85. secrets, err := d.Agent.CreateImagePullSecrets(
  86. d.Repo,
  87. d.Namespace,
  88. linkedRegs,
  89. d.DOAuth,
  90. )
  91. if err != nil {
  92. return renderedManifests, nil
  93. }
  94. d.updatePodSpecs(secrets)
  95. modifiedManifests = bytes.NewBuffer([]byte{})
  96. encoder := yaml.NewEncoder(modifiedManifests)
  97. defer encoder.Close()
  98. for _, resource := range d.resources {
  99. err = encoder.Encode(resource)
  100. if err != nil {
  101. return nil, err
  102. }
  103. }
  104. return modifiedManifests, nil
  105. }
  106. func (d *DockerSecretsPostRenderer) getRegistriesToLink(renderedManifests *bytes.Buffer) (map[string]*models.Registry, error) {
  107. // create a map of registry names to registries: these are the registries
  108. // that a secret will be generated for, if it does not exist
  109. linkedRegs := make(map[string]*models.Registry)
  110. err := d.decodeRenderedManifests(renderedManifests)
  111. if err != nil {
  112. return linkedRegs, err
  113. }
  114. // read the pod specs into the post-renderer object
  115. d.getPodSpecs(d.resources)
  116. for _, podSpec := range d.podSpecs {
  117. // get all images
  118. images := d.getImageList(podSpec)
  119. // read the image url
  120. for _, image := range images {
  121. named, err := reference.ParseNormalizedNamed(image)
  122. if err != nil {
  123. continue
  124. }
  125. domain := reference.Domain(named)
  126. path := reference.Path(named)
  127. regName := domain
  128. if pathArr := strings.Split(path, "/"); len(pathArr) > 1 {
  129. regName += "/" + strings.Join(pathArr[:len(pathArr)-1], "/")
  130. }
  131. // check if the integration is native to the cluster/registry combination
  132. isNative := d.isRegistryNative(regName)
  133. if isNative {
  134. continue
  135. }
  136. reg, exists := d.registries[regName]
  137. if !exists {
  138. continue
  139. }
  140. // if the registry exists, add it to the map
  141. linkedRegs[regName] = reg
  142. }
  143. }
  144. return linkedRegs, nil
  145. }
  146. func (d *DockerSecretsPostRenderer) decodeRenderedManifests(
  147. renderedManifests *bytes.Buffer,
  148. ) error {
  149. // use the yaml decoder to parse the multi-document yaml.
  150. decoder := yaml.NewDecoder(renderedManifests)
  151. for {
  152. res := make(resource)
  153. err := decoder.Decode(&res)
  154. if err == io.EOF {
  155. break
  156. }
  157. if err != nil {
  158. return err
  159. }
  160. d.resources = append(d.resources, res)
  161. }
  162. return nil
  163. }
  164. func (d *DockerSecretsPostRenderer) getPodSpecs(resources []resource) {
  165. for _, res := range resources {
  166. kindVal, hasKind := res["kind"]
  167. if !hasKind {
  168. continue
  169. }
  170. kind, ok := kindVal.(string)
  171. if !ok {
  172. continue
  173. }
  174. // manifests of list type will have an items field, items should
  175. // be recursively parsed
  176. if itemsVal, isList := res["items"]; isList {
  177. if items, ok := itemsVal.([]interface{}); ok {
  178. // convert items to resource
  179. resArr := make([]resource, 0)
  180. for _, item := range items {
  181. if arrVal, ok := item.(resource); ok {
  182. resArr = append(resArr, arrVal)
  183. }
  184. }
  185. d.getPodSpecs(resArr)
  186. }
  187. continue
  188. }
  189. // otherwise, get the pod spec based on the type of resource
  190. podSpec := getPodSpecFromResource(kind, res)
  191. if podSpec == nil {
  192. continue
  193. }
  194. d.podSpecs = append(d.podSpecs, podSpec)
  195. }
  196. return
  197. }
  198. func (d *DockerSecretsPostRenderer) updatePodSpecs(secrets map[string]string) {
  199. for _, podSpec := range d.podSpecs {
  200. containersVal, hasContainers := podSpec["containers"]
  201. if !hasContainers {
  202. continue
  203. }
  204. containers, ok := containersVal.([]interface{})
  205. if !ok {
  206. continue
  207. }
  208. imagePullSecrets := make([]map[string]interface{}, 0)
  209. if existingPullSecrets, ok := podSpec["imagePullSecrets"]; ok {
  210. if existing, ok := existingPullSecrets.([]map[string]interface{}); ok {
  211. imagePullSecrets = existing
  212. }
  213. }
  214. for _, container := range containers {
  215. _container, ok := container.(resource)
  216. if !ok {
  217. continue
  218. }
  219. image, ok := _container["image"].(string)
  220. if !ok {
  221. continue
  222. }
  223. named, err := reference.ParseNormalizedNamed(image)
  224. if err != nil {
  225. continue
  226. }
  227. domain := reference.Domain(named)
  228. path := reference.Path(named)
  229. regName := domain
  230. if pathArr := strings.Split(path, "/"); len(pathArr) > 1 {
  231. regName += "/" + strings.Join(pathArr[:len(pathArr)-1], "/")
  232. }
  233. if secretName, ok := secrets[regName]; ok && secretName != "" {
  234. imagePullSecrets = append(imagePullSecrets, map[string]interface{}{
  235. "name": secretName,
  236. })
  237. }
  238. }
  239. if len(imagePullSecrets) > 0 {
  240. podSpec["imagePullSecrets"] = imagePullSecrets
  241. }
  242. }
  243. }
  244. func (d *DockerSecretsPostRenderer) getImageList(podSpec resource) []string {
  245. images := make([]string, 0)
  246. containersVal, hasContainers := podSpec["containers"]
  247. if !hasContainers {
  248. return images
  249. }
  250. containers, ok := containersVal.([]interface{})
  251. if !ok {
  252. return images
  253. }
  254. for _, container := range containers {
  255. _container, ok := container.(resource)
  256. if !ok {
  257. continue
  258. }
  259. image, ok := _container["image"].(string)
  260. if !ok {
  261. continue
  262. }
  263. images = append(images, image)
  264. }
  265. return images
  266. }
  267. var ecrPattern = regexp.MustCompile(`(^[a-zA-Z0-9][a-zA-Z0-9-_]*)\.dkr\.ecr(\-fips)?\.([a-zA-Z0-9][a-zA-Z0-9-_]*)\.amazonaws\.com(\.cn)?`)
  268. func (d *DockerSecretsPostRenderer) isRegistryNative(regName string) bool {
  269. isNative := false
  270. if strings.Contains(regName, "gcr") && d.Cluster.AuthMechanism == models.GCP {
  271. // get the project id of the cluster
  272. gcpInt, err := d.Repo.GCPIntegration.ReadGCPIntegration(d.Cluster.GCPIntegrationID)
  273. if err != nil {
  274. return false
  275. }
  276. gkeProjectID, err := integrations.GCPProjectIDFromJSON(gcpInt.GCPKeyData)
  277. if err != nil {
  278. return false
  279. }
  280. // parse the project id of the gcr url
  281. if regNameArr := strings.Split(regName, "/"); len(regNameArr) >= 2 {
  282. gcrProjectID := regNameArr[1]
  283. isNative = gcrProjectID == gkeProjectID
  284. }
  285. } else if strings.Contains(regName, "ecr") && d.Cluster.AuthMechanism == models.AWS {
  286. matches := ecrPattern.FindStringSubmatch(regName)
  287. if len(matches) < 3 {
  288. return false
  289. }
  290. eksAccountID := matches[1]
  291. eksRegion := matches[3]
  292. awsInt, err := d.Repo.AWSIntegration.ReadAWSIntegration(d.Cluster.AWSIntegrationID)
  293. if err != nil {
  294. return false
  295. }
  296. err = awsInt.PopulateAWSArn()
  297. if err != nil {
  298. return false
  299. }
  300. parsedARN, err := arn.Parse(awsInt.AWSArn)
  301. if err != nil {
  302. return false
  303. }
  304. isNative = parsedARN.AccountID == eksAccountID && parsedARN.Region == eksRegion
  305. }
  306. return isNative
  307. }
  308. func getPodSpecFromResource(kind string, res resource) resource {
  309. switch kind {
  310. case "Pod":
  311. return getNestedResource(res, "spec")
  312. case "DaemonSet", "Deployment", "Job", "ReplicaSet", "ReplicationController", "StatefulSet":
  313. return getNestedResource(res, "spec", "template", "spec")
  314. case "PodTemplate":
  315. return getNestedResource(res, "template", "spec")
  316. case "CronJob":
  317. return getNestedResource(res, "spec", "jobTemplate", "spec", "template", "spec")
  318. }
  319. return nil
  320. }
  321. func getNestedResource(res resource, keys ...string) resource {
  322. curr := res
  323. var ok bool
  324. for _, key := range keys {
  325. curr, ok = curr[key].(resource)
  326. if !ok {
  327. return nil
  328. }
  329. }
  330. return curr
  331. }