create.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681
  1. package release
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "fmt"
  7. "net/http"
  8. "strings"
  9. "time"
  10. "github.com/porter-dev/porter/internal/telemetry"
  11. "github.com/porter-dev/porter/api/server/authz"
  12. "github.com/porter-dev/porter/api/server/handlers"
  13. "github.com/porter-dev/porter/api/server/shared"
  14. "github.com/porter-dev/porter/api/server/shared/apierrors"
  15. "github.com/porter-dev/porter/api/server/shared/config"
  16. "github.com/porter-dev/porter/api/types"
  17. "github.com/porter-dev/porter/internal/analytics"
  18. "github.com/porter-dev/porter/internal/auth/token"
  19. "github.com/porter-dev/porter/internal/encryption"
  20. "github.com/porter-dev/porter/internal/helm"
  21. "github.com/porter-dev/porter/internal/helm/loader"
  22. "github.com/porter-dev/porter/internal/helm/repo"
  23. "github.com/porter-dev/porter/internal/integrations/ci/actions"
  24. "github.com/porter-dev/porter/internal/integrations/ci/gitlab"
  25. "github.com/porter-dev/porter/internal/models"
  26. "github.com/porter-dev/porter/internal/oauth"
  27. "github.com/porter-dev/porter/internal/registry"
  28. "github.com/stefanmcshane/helm/pkg/release"
  29. "golang.org/x/crypto/bcrypt"
  30. "gopkg.in/yaml.v2"
  31. v1 "k8s.io/api/core/v1"
  32. )
  33. type CreateReleaseHandler struct {
  34. handlers.PorterHandlerReadWriter
  35. authz.KubernetesAgentGetter
  36. }
  37. func NewCreateReleaseHandler(
  38. config *config.Config,
  39. decoderValidator shared.RequestDecoderValidator,
  40. writer shared.ResultWriter,
  41. ) *CreateReleaseHandler {
  42. return &CreateReleaseHandler{
  43. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  44. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  45. }
  46. }
  47. func (c *CreateReleaseHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  48. user, _ := r.Context().Value(types.UserScope).(*models.User)
  49. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  50. namespace := r.Context().Value(types.NamespaceScope).(string)
  51. operationID := oauth.CreateRandomState()
  52. ctx, span := telemetry.NewSpan(r.Context(), "serve-create-release")
  53. defer span.End()
  54. telemetry.WithAttributes(span,
  55. telemetry.AttributeKV{Key: "project-id", Value: cluster.ProjectID},
  56. telemetry.AttributeKV{Key: "cluster-id", Value: cluster.ID},
  57. telemetry.AttributeKV{Key: "user-email", Value: user.Email},
  58. telemetry.AttributeKV{Key: "namespace", Value: namespace},
  59. )
  60. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchStartTrack(
  61. &analytics.ApplicationLaunchStartTrackOpts{
  62. ClusterScopedTrackOpts: analytics.GetClusterScopedTrackOpts(user.ID, cluster.ProjectID, cluster.ID),
  63. FlowID: operationID,
  64. },
  65. ))
  66. helmAgent, err := c.GetHelmAgent(ctx, r, cluster, "")
  67. if err != nil {
  68. c.HandleAPIError(w, r, apierrors.NewErrInternal(telemetry.Error(ctx, span, err, "error getting helm agent")))
  69. return
  70. }
  71. request := &types.CreateReleaseRequest{}
  72. if ok := c.DecodeAndValidate(w, r, request); !ok {
  73. return
  74. }
  75. if request.RepoURL == "" {
  76. request.RepoURL = c.Config().ServerConf.DefaultApplicationHelmRepoURL
  77. }
  78. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "repo-url", Value: request.RepoURL})
  79. // if the repo url is not an addon or application url, validate against the helm repos
  80. if request.RepoURL != c.Config().ServerConf.DefaultAddonHelmRepoURL && request.RepoURL != c.Config().ServerConf.DefaultApplicationHelmRepoURL {
  81. // load the helm repos in the project
  82. hrs, err := c.Repo().HelmRepo().ListHelmReposByProjectID(cluster.ProjectID)
  83. if err != nil {
  84. c.HandleAPIError(w, r, apierrors.NewErrInternal(telemetry.Error(ctx, span, err, "error listing helm repos for project")))
  85. return
  86. }
  87. isValid := repo.ValidateRepoURL(c.Config().ServerConf.DefaultAddonHelmRepoURL, c.Config().ServerConf.DefaultApplicationHelmRepoURL, hrs, request.RepoURL)
  88. if !isValid {
  89. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  90. telemetry.Error(ctx, span, err, "invalid repo_url parameter"),
  91. http.StatusBadRequest,
  92. ))
  93. return
  94. }
  95. }
  96. if request.TemplateVersion == "latest" {
  97. request.TemplateVersion = ""
  98. }
  99. chart, err := loader.LoadChartPublic(ctx, request.RepoURL, request.TemplateName, request.TemplateVersion)
  100. if err != nil {
  101. c.HandleAPIError(w, r, apierrors.NewErrInternal(telemetry.Error(ctx, span, err, "error loading public chart")))
  102. return
  103. }
  104. registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  105. if err != nil {
  106. c.HandleAPIError(w, r, apierrors.NewErrInternal(telemetry.Error(ctx, span, err, "error listing registries")))
  107. return
  108. }
  109. k8sAgent, err := c.GetAgent(r, cluster, "")
  110. if err != nil {
  111. c.HandleAPIError(w, r, apierrors.NewErrInternal(telemetry.Error(ctx, span, err, "error getting k8s agent")))
  112. return
  113. }
  114. // create the namespace if it does not exist already
  115. _, err = k8sAgent.CreateNamespace(namespace, nil)
  116. if err != nil {
  117. c.HandleAPIError(w, r, apierrors.NewErrInternal(telemetry.Error(ctx, span, err, "error creating namespace")))
  118. return
  119. }
  120. conf := &helm.InstallChartConfig{
  121. Chart: chart,
  122. Name: request.Name,
  123. Namespace: namespace,
  124. Values: request.Values,
  125. Cluster: cluster,
  126. Repo: c.Repo(),
  127. Registries: registries,
  128. ClusterControlPlaneClient: c.Config().ClusterControlPlaneClient,
  129. }
  130. helmRelease, err := helmAgent.InstallChart(ctx, conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection)
  131. if err != nil {
  132. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  133. telemetry.Error(ctx, span, err, "error installing a new chart"),
  134. http.StatusBadRequest,
  135. ))
  136. return
  137. }
  138. configMaps := make([]*v1.ConfigMap, 0)
  139. if request.SyncedEnvGroups != nil && len(request.SyncedEnvGroups) > 0 {
  140. for _, envGroupName := range request.SyncedEnvGroups {
  141. // read the attached configmap
  142. cm, _, err := k8sAgent.GetLatestVersionedConfigMap(envGroupName, namespace)
  143. if err != nil {
  144. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(telemetry.Error(ctx, span, err, "Couldn't find the env group"), http.StatusNotFound))
  145. return
  146. }
  147. configMaps = append(configMaps, cm)
  148. }
  149. }
  150. release, err := CreateAppReleaseFromHelmRelease(ctx, c.Config(), cluster.ProjectID, cluster.ID, 0, helmRelease)
  151. if err != nil {
  152. c.HandleAPIError(w, r, apierrors.NewErrInternal(telemetry.Error(ctx, span, err, "error creating app release from helm release")))
  153. return
  154. }
  155. if len(configMaps) > 0 {
  156. for _, cm := range configMaps {
  157. _, err = k8sAgent.AddApplicationToVersionedConfigMap(cm, release.Name)
  158. if err != nil {
  159. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "release-name", Value: release.Name})
  160. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "config-map-name", Value: cm.Name})
  161. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(telemetry.Error(ctx, span, err, "Couldn't add release to the config map")))
  162. }
  163. }
  164. }
  165. if request.Tags != nil {
  166. tags, err := c.Repo().Tag().LinkTagsToRelease(request.Tags, release)
  167. if err == nil {
  168. release.Tags = append(release.Tags, tags...)
  169. }
  170. }
  171. if request.BuildConfig != nil {
  172. _, err = createBuildConfig(ctx, c.Config(), release, request.BuildConfig)
  173. }
  174. if err != nil {
  175. c.HandleAPIError(w, r, apierrors.NewErrInternal(telemetry.Error(ctx, span, err, "error building config")))
  176. return
  177. }
  178. if request.GitActionConfig != nil {
  179. _, _, err := createGitAction(
  180. ctx,
  181. c.Config(),
  182. user.ID,
  183. cluster.ProjectID,
  184. cluster.ID,
  185. request.GitActionConfig,
  186. request.Name,
  187. namespace,
  188. release,
  189. )
  190. if err != nil {
  191. unwrappedErr := errors.Unwrap(err)
  192. if unwrappedErr != nil {
  193. if errors.Is(unwrappedErr, actions.ErrProtectedBranch) {
  194. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(telemetry.Error(ctx, span, err, "error creating git action on protected branch"), http.StatusConflict))
  195. } else if errors.Is(unwrappedErr, actions.ErrCreatePRForProtectedBranch) {
  196. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(telemetry.Error(ctx, span, err, "error creating PR on protected branch"), http.StatusPreconditionFailed))
  197. }
  198. } else {
  199. c.HandleAPIError(w, r, apierrors.NewErrInternal(telemetry.Error(ctx, span, err, "error creating git action")))
  200. return
  201. }
  202. }
  203. }
  204. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchSuccessTrack(
  205. &analytics.ApplicationLaunchSuccessTrackOpts{
  206. ApplicationScopedTrackOpts: analytics.GetApplicationScopedTrackOpts(
  207. user.ID,
  208. cluster.ProjectID,
  209. cluster.ID,
  210. release.Name,
  211. release.Namespace,
  212. chart.Metadata.Name,
  213. ),
  214. FlowID: operationID,
  215. },
  216. ))
  217. w.WriteHeader(http.StatusCreated)
  218. }
  219. func CreateAppReleaseFromHelmRelease(
  220. ctx context.Context,
  221. config *config.Config,
  222. projectID, clusterID, stackResourceID uint,
  223. helmRelease *release.Release,
  224. ) (*models.Release, error) {
  225. ctx, span := telemetry.NewSpan(ctx, "create-app-release-from-helm-release")
  226. defer span.End()
  227. telemetry.WithAttributes(span,
  228. telemetry.AttributeKV{Key: "project-id", Value: projectID},
  229. telemetry.AttributeKV{Key: "cluster-id", Value: clusterID},
  230. telemetry.AttributeKV{Key: "stack-resource-id", Value: stackResourceID},
  231. telemetry.AttributeKV{Key: "helm-release-name", Value: helmRelease.Name},
  232. )
  233. token, err := encryption.GenerateRandomBytes(16)
  234. if err != nil {
  235. return nil, err
  236. }
  237. // create release with webhook token in db
  238. image, ok := helmRelease.Config["image"].(map[string]interface{})
  239. if !ok {
  240. return nil, telemetry.Error(ctx, span, nil, "Could not find field image in config")
  241. }
  242. repository := image["repository"]
  243. repoStr, ok := repository.(string)
  244. if !ok {
  245. return nil, telemetry.Error(ctx, span, nil, "Could not find field repository in config")
  246. }
  247. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "repo-uri", Value: repoStr})
  248. release := &models.Release{
  249. ClusterID: clusterID,
  250. ProjectID: projectID,
  251. Namespace: helmRelease.Namespace,
  252. Name: helmRelease.Name,
  253. WebhookToken: token,
  254. ImageRepoURI: repoStr,
  255. StackResourceID: stackResourceID,
  256. }
  257. return config.Repo.Release().CreateRelease(release)
  258. }
  259. func CreateAddonReleaseFromHelmRelease(
  260. config *config.Config,
  261. projectID, clusterID, stackResourceID uint,
  262. helmRelease *release.Release,
  263. ) (*models.Release, error) {
  264. release := &models.Release{
  265. ClusterID: clusterID,
  266. ProjectID: projectID,
  267. Namespace: helmRelease.Namespace,
  268. Name: helmRelease.Name,
  269. StackResourceID: stackResourceID,
  270. }
  271. return config.Repo.Release().CreateRelease(release)
  272. }
  273. func createGitAction(
  274. ctx context.Context,
  275. config *config.Config,
  276. userID, projectID, clusterID uint,
  277. request *types.CreateGitActionConfigRequest,
  278. name, namespace string,
  279. release *models.Release,
  280. ) (*types.GitActionConfig, []byte, error) {
  281. ctx, span := telemetry.NewSpan(ctx, "create-git-action")
  282. defer span.End()
  283. telemetry.WithAttributes(span,
  284. telemetry.AttributeKV{Key: "project-id", Value: projectID},
  285. telemetry.AttributeKV{Key: "cluster-id", Value: clusterID},
  286. telemetry.AttributeKV{Key: "user-id", Value: userID},
  287. telemetry.AttributeKV{Key: "name", Value: name},
  288. telemetry.AttributeKV{Key: "namespace", Value: namespace},
  289. )
  290. // if the registry was provisioned through Porter, create a repository if necessary
  291. if release != nil && request.RegistryID != 0 {
  292. // read the registry
  293. reg, err := config.Repo.Registry().ReadRegistry(projectID, request.RegistryID)
  294. if err != nil {
  295. return nil, nil, telemetry.Error(ctx, span, err, "could not read repo registry")
  296. }
  297. _reg := registry.Registry(*reg)
  298. regAPI := &_reg
  299. // parse the name from the registry
  300. nameSpl := strings.Split(request.ImageRepoURI, "/")
  301. repoName := nameSpl[len(nameSpl)-1]
  302. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "repo-name", Value: repoName})
  303. err = regAPI.CreateRepository(ctx, config, repoName)
  304. if err != nil {
  305. return nil, nil, telemetry.Error(ctx, span, err, "could not create repo")
  306. }
  307. }
  308. isDryRun := release == nil
  309. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "is-dry-run", Value: isDryRun})
  310. encoded := ""
  311. var err error
  312. // if this isn't a dry run, generate the token
  313. if !isDryRun {
  314. encoded, err = getToken(ctx, config, userID, projectID, clusterID, request)
  315. if err != nil {
  316. return nil, nil, telemetry.Error(ctx, span, err, "error getting token")
  317. }
  318. }
  319. var workflowYAML []byte
  320. var gitErr error
  321. if request.GitlabIntegrationID != 0 {
  322. giRunner := &gitlab.GitlabCI{
  323. ServerURL: config.ServerConf.ServerURL,
  324. GitRepoPath: request.GitRepo,
  325. GitBranch: request.GitBranch,
  326. Repo: config.Repo,
  327. ProjectID: projectID,
  328. ClusterID: clusterID,
  329. UserID: userID,
  330. IntegrationID: request.GitlabIntegrationID,
  331. PorterConf: config,
  332. ReleaseName: name,
  333. ReleaseNamespace: namespace,
  334. FolderPath: request.FolderPath,
  335. PorterToken: encoded,
  336. }
  337. gitErr = giRunner.Setup()
  338. } else {
  339. repoSplit := strings.Split(request.GitRepo, "/")
  340. if len(repoSplit) != 2 {
  341. return nil, nil, fmt.Errorf("invalid formatting of repo name")
  342. }
  343. // create the commit in the git repo
  344. gaRunner := &actions.GithubActions{
  345. InstanceName: config.ServerConf.InstanceName,
  346. ServerURL: config.ServerConf.ServerURL,
  347. GithubOAuthIntegration: nil,
  348. GithubAppID: config.GithubAppConf.AppID,
  349. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  350. GithubInstallationID: request.GitRepoID,
  351. GitRepoName: repoSplit[1],
  352. GitRepoOwner: repoSplit[0],
  353. Repo: config.Repo,
  354. ProjectID: projectID,
  355. ClusterID: clusterID,
  356. ReleaseName: name,
  357. ReleaseNamespace: namespace,
  358. GitBranch: request.GitBranch,
  359. DockerFilePath: request.DockerfilePath,
  360. FolderPath: request.FolderPath,
  361. ImageRepoURL: request.ImageRepoURI,
  362. PorterToken: encoded,
  363. Version: "v0.1.0",
  364. ShouldCreateWorkflow: request.ShouldCreateWorkflow,
  365. DryRun: release == nil,
  366. }
  367. // Save the github err for after creating the git action config. However, we
  368. // need to call Setup() in order to get the workflow file before writing the
  369. // action config, in the case of a dry run, since the dry run does not create
  370. // a git action config.
  371. workflowYAML, gitErr = gaRunner.Setup()
  372. if gaRunner.DryRun {
  373. if gitErr != nil {
  374. return nil, nil, telemetry.Error(ctx, span, gitErr, "error setting up git")
  375. }
  376. return nil, workflowYAML, nil
  377. }
  378. }
  379. // handle write to the database
  380. ga, err := config.Repo.GitActionConfig().CreateGitActionConfig(&models.GitActionConfig{
  381. ReleaseID: release.ID,
  382. GitRepo: request.GitRepo,
  383. GitBranch: request.GitBranch,
  384. ImageRepoURI: request.ImageRepoURI,
  385. GitRepoID: request.GitRepoID,
  386. GitlabIntegrationID: request.GitlabIntegrationID,
  387. DockerfilePath: request.DockerfilePath,
  388. FolderPath: request.FolderPath,
  389. IsInstallation: true,
  390. Version: "v0.1.0",
  391. })
  392. if err != nil {
  393. return nil, nil, telemetry.Error(ctx, span, err, "error creating git action config")
  394. }
  395. // update the release in the db with the image repo uri
  396. release.ImageRepoURI = ga.ImageRepoURI
  397. _, err = config.Repo.Release().UpdateRelease(release)
  398. if err != nil {
  399. return nil, nil, telemetry.Error(ctx, span, err, "error updating release")
  400. }
  401. return ga.ToGitActionConfigType(), workflowYAML, gitErr
  402. }
  403. func getToken(
  404. ctx context.Context,
  405. config *config.Config,
  406. userID, projectID, clusterID uint,
  407. request *types.CreateGitActionConfigRequest,
  408. ) (string, error) {
  409. ctx, span := telemetry.NewSpan(ctx, "get-git-action-token")
  410. defer span.End()
  411. telemetry.WithAttributes(span,
  412. telemetry.AttributeKV{Key: "project-id", Value: projectID},
  413. telemetry.AttributeKV{Key: "cluster-id", Value: clusterID},
  414. telemetry.AttributeKV{Key: "user-id", Value: userID},
  415. )
  416. // create a policy for the token
  417. policy := []*types.PolicyDocument{
  418. {
  419. Scope: types.ProjectScope,
  420. Verbs: types.ReadWriteVerbGroup(),
  421. Children: map[types.PermissionScope]*types.PolicyDocument{
  422. types.ClusterScope: {
  423. Scope: types.ClusterScope,
  424. Verbs: types.ReadWriteVerbGroup(),
  425. },
  426. types.RegistryScope: {
  427. Scope: types.RegistryScope,
  428. Verbs: types.ReadVerbGroup(),
  429. },
  430. types.HelmRepoScope: {
  431. Scope: types.HelmRepoScope,
  432. Verbs: types.ReadVerbGroup(),
  433. },
  434. },
  435. },
  436. }
  437. uid, err := encryption.GenerateRandomBytes(16)
  438. if err != nil {
  439. return "", telemetry.Error(ctx, span, err, "error generating uid")
  440. }
  441. policyBytes, err := json.Marshal(policy)
  442. if err != nil {
  443. return "", telemetry.Error(ctx, span, err, "error marshalling policy into json")
  444. }
  445. policyModel := &models.Policy{
  446. ProjectID: projectID,
  447. UniqueID: uid,
  448. CreatedByUserID: userID,
  449. Name: strings.ToLower(fmt.Sprintf("repo-%s-token-policy", request.GitRepo)),
  450. PolicyBytes: policyBytes,
  451. }
  452. policyModel, err = config.Repo.Policy().CreatePolicy(policyModel)
  453. if err != nil {
  454. return "", telemetry.Error(ctx, span, err, "error creating policy")
  455. }
  456. // create the token in the database
  457. tokenUID, err := encryption.GenerateRandomBytes(16)
  458. if err != nil {
  459. return "", telemetry.Error(ctx, span, err, "error generating tokenUID")
  460. }
  461. secretKey, err := encryption.GenerateRandomBytes(16)
  462. if err != nil {
  463. return "", telemetry.Error(ctx, span, err, "error generating secret key")
  464. }
  465. // hash the secret key for storage in the db
  466. hashedToken, err := bcrypt.GenerateFromPassword([]byte(secretKey), 8)
  467. if err != nil {
  468. return "", telemetry.Error(ctx, span, err, "error generating hashedToken")
  469. }
  470. expiresAt := time.Now().Add(time.Hour * 24 * 365)
  471. apiToken := &models.APIToken{
  472. UniqueID: tokenUID,
  473. ProjectID: projectID,
  474. CreatedByUserID: userID,
  475. Expiry: &expiresAt,
  476. Revoked: false,
  477. PolicyUID: policyModel.UniqueID,
  478. PolicyName: policyModel.Name,
  479. Name: strings.ToLower(fmt.Sprintf("repo-%s-token", request.GitRepo)),
  480. SecretKey: hashedToken,
  481. }
  482. apiToken, err = config.Repo.APIToken().CreateAPIToken(apiToken)
  483. if err != nil {
  484. return "", telemetry.Error(ctx, span, err, "error creating api token")
  485. }
  486. // generate porter jwt token
  487. jwt, err := token.GetStoredTokenForAPI(userID, projectID, apiToken.UniqueID, secretKey)
  488. if err != nil {
  489. return "", telemetry.Error(ctx, span, err, "error getting stored token for api")
  490. }
  491. return jwt.EncodeToken(config.TokenConf)
  492. }
  493. func createBuildConfig(
  494. ctx context.Context,
  495. config *config.Config,
  496. release *models.Release,
  497. bcRequest *types.CreateBuildConfigRequest,
  498. ) (*types.BuildConfig, error) {
  499. ctx, span := telemetry.NewSpan(ctx, "create-build-config")
  500. defer span.End()
  501. data, err := json.Marshal(bcRequest.Config)
  502. if err != nil {
  503. return nil, telemetry.Error(ctx, span, err, "error marshalling build config request")
  504. }
  505. // handle write to the database
  506. bc, err := config.Repo.BuildConfig().CreateBuildConfig(&models.BuildConfig{
  507. Builder: bcRequest.Builder,
  508. Buildpacks: strings.Join(bcRequest.Buildpacks, ","),
  509. Config: data,
  510. })
  511. if err != nil {
  512. return nil, telemetry.Error(ctx, span, err, "error creating build config")
  513. }
  514. release.BuildConfig = bc.ID
  515. _, err = config.Repo.Release().UpdateRelease(release)
  516. if err != nil {
  517. return nil, telemetry.Error(ctx, span, err, "error updating release")
  518. }
  519. return bc.ToBuildConfigType(), nil
  520. }
  521. type containerEnvConfig struct {
  522. Container struct {
  523. Env struct {
  524. Normal map[string]string `yaml:"normal"`
  525. } `yaml:"env"`
  526. } `yaml:"container"`
  527. }
  528. func GetGARunner(
  529. ctx context.Context,
  530. config *config.Config,
  531. userID, projectID, clusterID uint,
  532. ga *models.GitActionConfig,
  533. name, namespace string,
  534. release *models.Release,
  535. helmRelease *release.Release,
  536. ) (*actions.GithubActions, error) {
  537. ctx, span := telemetry.NewSpan(ctx, "get-ga-runner")
  538. defer span.End()
  539. cEnv := &containerEnvConfig{}
  540. rawValues, err := yaml.Marshal(helmRelease.Config)
  541. if err == nil {
  542. err = yaml.Unmarshal(rawValues, cEnv)
  543. // if unmarshal error, just set to empty map
  544. if err != nil {
  545. cEnv.Container.Env.Normal = make(map[string]string)
  546. }
  547. }
  548. repoSplit := strings.Split(ga.GitRepo, "/")
  549. if len(repoSplit) != 2 {
  550. return nil, telemetry.Error(ctx, span, nil, "invalid formatting of repo name")
  551. }
  552. // create the commit in the git repo
  553. return &actions.GithubActions{
  554. ServerURL: config.ServerConf.ServerURL,
  555. GithubOAuthIntegration: nil,
  556. BuildEnv: cEnv.Container.Env.Normal,
  557. GithubAppID: config.GithubAppConf.AppID,
  558. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  559. GithubInstallationID: ga.GitRepoID,
  560. GitRepoName: repoSplit[1],
  561. GitRepoOwner: repoSplit[0],
  562. Repo: config.Repo,
  563. ProjectID: projectID,
  564. ClusterID: clusterID,
  565. ReleaseName: name,
  566. GitBranch: ga.GitBranch,
  567. DockerFilePath: ga.DockerfilePath,
  568. FolderPath: ga.FolderPath,
  569. ImageRepoURL: ga.ImageRepoURI,
  570. Version: "v0.1.0",
  571. }, nil
  572. }