loader.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219
  1. package loader
  2. import (
  3. "fmt"
  4. "net/http"
  5. "strconv"
  6. gorillaws "github.com/gorilla/websocket"
  7. "github.com/porter-dev/porter/api/server/shared/apierrors/alerter"
  8. "github.com/porter-dev/porter/api/server/shared/config"
  9. "github.com/porter-dev/porter/api/server/shared/config/env"
  10. "github.com/porter-dev/porter/api/server/shared/websocket"
  11. "github.com/porter-dev/porter/internal/adapter"
  12. "github.com/porter-dev/porter/internal/analytics"
  13. "github.com/porter-dev/porter/internal/auth/sessionstore"
  14. "github.com/porter-dev/porter/internal/auth/token"
  15. "github.com/porter-dev/porter/internal/helm/urlcache"
  16. "github.com/porter-dev/porter/internal/integrations/bind"
  17. "github.com/porter-dev/porter/internal/kubernetes"
  18. "github.com/porter-dev/porter/internal/kubernetes/local"
  19. "github.com/porter-dev/porter/internal/notifier"
  20. "github.com/porter-dev/porter/internal/notifier/sendgrid"
  21. "github.com/porter-dev/porter/internal/oauth"
  22. "github.com/porter-dev/porter/internal/repository/gorm"
  23. lr "github.com/porter-dev/porter/internal/logger"
  24. )
  25. type EnvConfigLoader struct{}
  26. func NewEnvLoader() config.ConfigLoader {
  27. return &EnvConfigLoader{}
  28. }
  29. func (e *EnvConfigLoader) LoadConfig() (res *config.Config, err error) {
  30. envConf, err := FromEnv()
  31. if err != nil {
  32. return nil, err
  33. }
  34. sc := envConf.ServerConf
  35. res = &config.Config{
  36. Logger: lr.NewConsole(sc.Debug),
  37. ServerConf: sc,
  38. DBConf: envConf.DBConf,
  39. RedisConf: envConf.RedisConf,
  40. }
  41. res.Metadata = config.MetadataFromConf(envConf.ServerConf)
  42. db, err := adapter.New(envConf.DBConf)
  43. if err != nil {
  44. return nil, err
  45. }
  46. res.DB = db
  47. err = gorm.AutoMigrate(db)
  48. if err != nil {
  49. return nil, err
  50. }
  51. var key [32]byte
  52. for i, b := range []byte(envConf.DBConf.EncryptionKey) {
  53. key[i] = b
  54. }
  55. res.Repo = gorm.NewRepository(db, &key)
  56. // create the session store
  57. res.Store, err = sessionstore.NewStore(
  58. &sessionstore.NewStoreOpts{
  59. SessionRepository: res.Repo.Session(),
  60. CookieSecrets: envConf.ServerConf.CookieSecrets,
  61. },
  62. )
  63. if err != nil {
  64. return nil, err
  65. }
  66. res.TokenConf = &token.TokenGeneratorConf{
  67. TokenSecret: envConf.ServerConf.TokenGeneratorSecret,
  68. }
  69. res.UserNotifier = &notifier.EmptyUserNotifier{}
  70. if res.Metadata.Email {
  71. res.UserNotifier = sendgrid.NewUserNotifier(&sendgrid.Client{
  72. APIKey: envConf.ServerConf.SendgridAPIKey,
  73. PWResetTemplateID: envConf.ServerConf.SendgridPWResetTemplateID,
  74. PWGHTemplateID: envConf.ServerConf.SendgridPWGHTemplateID,
  75. VerifyEmailTemplateID: envConf.ServerConf.SendgridVerifyEmailTemplateID,
  76. ProjectInviteTemplateID: envConf.ServerConf.SendgridProjectInviteTemplateID,
  77. SenderEmail: envConf.ServerConf.SendgridSenderEmail,
  78. })
  79. }
  80. res.Alerter = alerter.NoOpAlerter{}
  81. if envConf.ServerConf.SentryDSN != "" {
  82. res.Alerter, err = alerter.NewSentryAlerter(envConf.ServerConf.SentryDSN, envConf.ServerConf.SentryEnv)
  83. }
  84. if sc.DOClientID != "" && sc.DOClientSecret != "" {
  85. res.DOConf = oauth.NewDigitalOceanClient(&oauth.Config{
  86. ClientID: sc.DOClientID,
  87. ClientSecret: sc.DOClientSecret,
  88. Scopes: []string{"read", "write"},
  89. BaseURL: sc.ServerURL,
  90. })
  91. }
  92. if sc.GoogleClientID != "" && sc.GoogleClientSecret != "" {
  93. res.GoogleConf = oauth.NewGoogleClient(&oauth.Config{
  94. ClientID: sc.GoogleClientID,
  95. ClientSecret: sc.GoogleClientSecret,
  96. Scopes: []string{
  97. "openid",
  98. "profile",
  99. "email",
  100. },
  101. BaseURL: sc.ServerURL,
  102. })
  103. }
  104. if sc.GithubClientID != "" && sc.GithubClientSecret != "" {
  105. res.GithubConf = oauth.NewGithubClient(&oauth.Config{
  106. ClientID: sc.GithubClientID,
  107. ClientSecret: sc.GithubClientSecret,
  108. Scopes: []string{"read:user", "user:email"},
  109. BaseURL: sc.ServerURL,
  110. })
  111. }
  112. if sc.GithubAppClientID != "" &&
  113. sc.GithubAppClientSecret != "" &&
  114. sc.GithubAppName != "" &&
  115. sc.GithubAppWebhookSecret != "" &&
  116. sc.GithubAppSecretPath != "" &&
  117. sc.GithubAppID != "" {
  118. if AppID, err := strconv.ParseInt(sc.GithubAppID, 10, 64); err == nil {
  119. res.GithubAppConf = oauth.NewGithubAppClient(&oauth.Config{
  120. ClientID: sc.GithubAppClientID,
  121. ClientSecret: sc.GithubAppClientSecret,
  122. Scopes: []string{"read:user"},
  123. BaseURL: sc.ServerURL,
  124. }, sc.GithubAppName, sc.GithubAppWebhookSecret, sc.GithubAppSecretPath, AppID)
  125. }
  126. }
  127. if sc.SlackClientID != "" && sc.SlackClientSecret != "" {
  128. res.SlackConf = oauth.NewSlackClient(&oauth.Config{
  129. ClientID: sc.SlackClientID,
  130. ClientSecret: sc.SlackClientSecret,
  131. Scopes: []string{
  132. "incoming-webhook",
  133. "team:read",
  134. },
  135. BaseURL: sc.ServerURL,
  136. })
  137. }
  138. res.WSUpgrader = &websocket.Upgrader{
  139. WSUpgrader: &gorillaws.Upgrader{
  140. ReadBufferSize: 1024,
  141. WriteBufferSize: 1024,
  142. CheckOrigin: func(r *http.Request) bool {
  143. origin := r.Header.Get("Origin")
  144. return origin == sc.ServerURL
  145. },
  146. },
  147. }
  148. res.URLCache = urlcache.Init(sc.DefaultApplicationHelmRepoURL, sc.DefaultAddonHelmRepoURL)
  149. provAgent, err := getProvisionerAgent(sc)
  150. if err != nil {
  151. return nil, err
  152. }
  153. res.ProvisionerAgent = provAgent
  154. if res.ProvisionerAgent != nil && res.RedisConf.Enabled {
  155. res.Metadata.Provisioning = true
  156. }
  157. res.AnalyticsClient = analytics.InitializeAnalyticsSegmentClient(sc.SegmentClientKey, res.Logger)
  158. if sc.BindAPIKey != "" && sc.BindAPIServerURL != "" {
  159. res.BindClient = bind.NewClient(sc.BindAPIServerURL, sc.BindAPIKey)
  160. }
  161. return res, nil
  162. }
  163. func getProvisionerAgent(sc *env.ServerConf) (*kubernetes.Agent, error) {
  164. if sc.ProvisionerCluster == "kubeconfig" && sc.SelfKubeconfig != "" {
  165. agent, err := local.GetSelfAgentFromFileConfig(sc.SelfKubeconfig)
  166. if err != nil {
  167. return nil, fmt.Errorf("could not get in-cluster agent: %v", err)
  168. }
  169. return agent, nil
  170. } else if sc.ProvisionerCluster == "kubeconfig" {
  171. return nil, fmt.Errorf(`"kubeconfig" cluster option requires path to kubeconfig`)
  172. }
  173. agent, _ := kubernetes.GetAgentInClusterConfig()
  174. return agent, nil
  175. }