2
0

app_v2_github.go 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. package webhook
  2. import (
  3. "context"
  4. "fmt"
  5. "net/http"
  6. "strings"
  7. "connectrpc.com/connect"
  8. "github.com/google/go-github/v39/github"
  9. "github.com/google/uuid"
  10. porterv1 "github.com/porter-dev/api-contracts/generated/go/porter/v1"
  11. "github.com/porter-dev/porter/api/server/authz"
  12. "github.com/porter-dev/porter/api/server/handlers"
  13. "github.com/porter-dev/porter/api/server/shared"
  14. "github.com/porter-dev/porter/api/server/shared/apierrors"
  15. "github.com/porter-dev/porter/api/server/shared/config"
  16. "github.com/porter-dev/porter/api/server/shared/requestutils"
  17. "github.com/porter-dev/porter/api/types"
  18. "github.com/porter-dev/porter/api/utils"
  19. "github.com/porter-dev/porter/internal/models"
  20. "github.com/porter-dev/porter/internal/porter_app"
  21. "github.com/porter-dev/porter/internal/telemetry"
  22. )
  23. // GithubPRStatus_Closed is the status for a closed PR (closed, merged)
  24. const GithubPRStatus_Closed = "closed"
  25. // GithubWebhookHandler handles webhooks sent to /api/webhooks/github/{project_id}/{cluster_id}/{porter_app_name}
  26. type GithubWebhookHandler struct {
  27. handlers.PorterHandlerReadWriter
  28. authz.KubernetesAgentGetter
  29. }
  30. // NewGithubWebhookHandler returns a GithubWebhookHandler
  31. func NewGithubWebhookHandler(
  32. config *config.Config,
  33. decoderValidator shared.RequestDecoderValidator,
  34. writer shared.ResultWriter,
  35. ) *GithubWebhookHandler {
  36. return &GithubWebhookHandler{
  37. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  38. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  39. }
  40. }
  41. // ServeHTTP handles the webhook and deletes the deployment target if a PR has been closed
  42. func (c *GithubWebhookHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  43. ctx, span := telemetry.NewSpan(r.Context(), "serve-github-webhook")
  44. defer span.End()
  45. payload, err := github.ValidatePayload(r, []byte(c.Config().ServerConf.GithubIncomingWebhookSecret))
  46. if err != nil {
  47. err := telemetry.Error(ctx, span, err, "could not validate payload")
  48. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  49. return
  50. }
  51. event, err := github.ParseWebHook(github.WebHookType(r), payload)
  52. if err != nil {
  53. err := telemetry.Error(ctx, span, err, "could not parse webhook")
  54. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  55. return
  56. }
  57. webhookID, reqErr := requestutils.GetURLParamString(r, types.URLParamWebhookID)
  58. if reqErr != nil {
  59. err := telemetry.Error(ctx, span, nil, "error parsing porter app name")
  60. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  61. return
  62. }
  63. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "webhook-id", Value: webhookID})
  64. webhookUUID, err := uuid.Parse(webhookID)
  65. if err != nil {
  66. err := telemetry.Error(ctx, span, err, "error parsing webhook id")
  67. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  68. return
  69. }
  70. if webhookUUID == uuid.Nil {
  71. err := telemetry.Error(ctx, span, err, "webhook id is nil")
  72. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  73. return
  74. }
  75. webhook, err := c.Repo().GithubWebhook().Get(ctx, webhookUUID)
  76. if err != nil {
  77. err := telemetry.Error(ctx, span, err, "error getting github webhook")
  78. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  79. return
  80. }
  81. if webhook.ID == uuid.Nil {
  82. err := telemetry.Error(ctx, span, err, "github webhook id is nil")
  83. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  84. return
  85. }
  86. telemetry.WithAttributes(span,
  87. telemetry.AttributeKV{Key: "porter-app-id", Value: webhook.PorterAppID},
  88. telemetry.AttributeKV{Key: "cluster-id", Value: webhook.ClusterID},
  89. telemetry.AttributeKV{Key: "project-id", Value: webhook.ProjectID},
  90. )
  91. porterApp, err := c.Repo().PorterApp().ReadPorterAppByID(ctx, uint(webhook.PorterAppID))
  92. if err != nil {
  93. err := telemetry.Error(ctx, span, err, "error getting porter app")
  94. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  95. return
  96. }
  97. if porterApp.ID == 0 {
  98. err := telemetry.Error(ctx, span, err, "porter app not found")
  99. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  100. return
  101. }
  102. if porterApp.ProjectID != uint(webhook.ProjectID) {
  103. err := telemetry.Error(ctx, span, err, "porter app project id does not match")
  104. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  105. return
  106. }
  107. switch event := event.(type) {
  108. case *github.PullRequestEvent:
  109. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "pr-action-type", Value: event.GetAction()})
  110. if event.GetAction() != GithubPRStatus_Closed {
  111. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "event-processed", Value: false})
  112. c.WriteResult(w, r, nil)
  113. return
  114. }
  115. branch := event.GetPullRequest().GetHead().GetRef()
  116. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "event-branch", Value: branch})
  117. _ = cancelPendingWorkflows(ctx, cancelPendingWorkflowsInput{
  118. appName: porterApp.Name,
  119. repoID: porterApp.GitRepoID,
  120. repoName: porterApp.RepoName,
  121. githubAppSecret: c.Config().ServerConf.GithubAppSecret,
  122. githubAppID: c.Config().ServerConf.GithubAppID,
  123. event: event,
  124. })
  125. namespace := utils.ValidDNSLabel(branch)
  126. deploymentTarget, err := c.Repo().DeploymentTarget().DeploymentTargetBySelectorAndSelectorType(
  127. uint(webhook.ProjectID),
  128. uint(webhook.ClusterID),
  129. namespace,
  130. string(models.DeploymentTargetSelectorType_Namespace),
  131. )
  132. if err != nil {
  133. err := telemetry.Error(ctx, span, err, "error getting deployment target")
  134. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  135. return
  136. }
  137. if deploymentTarget.ID == uuid.Nil || !deploymentTarget.Preview {
  138. c.WriteResult(w, r, nil)
  139. return
  140. }
  141. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "deployment-target-id", Value: deploymentTarget.ID.String()})
  142. if deploymentTarget.ClusterID != webhook.ClusterID {
  143. err := telemetry.Error(ctx, span, nil, "deployment target cluster id does not match")
  144. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  145. return
  146. }
  147. deleteTargetReq := connect.NewRequest(&porterv1.DeleteDeploymentTargetRequest{
  148. ProjectId: int64(webhook.ProjectID),
  149. DeploymentTargetId: deploymentTarget.ID.String(),
  150. })
  151. _, err = c.Config().ClusterControlPlaneClient.DeleteDeploymentTarget(ctx, deleteTargetReq)
  152. if err != nil {
  153. err := telemetry.Error(ctx, span, err, "error deleting deployment target")
  154. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  155. return
  156. }
  157. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "event-processed", Value: true})
  158. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "pr-id", Value: event.GetPullRequest().GetID()})
  159. }
  160. c.WriteResult(w, r, nil)
  161. }
  162. type cancelPendingWorkflowsInput struct {
  163. appName string
  164. repoID uint
  165. repoName string
  166. githubAppSecret []byte
  167. githubAppID string
  168. event *github.PullRequestEvent
  169. }
  170. func cancelPendingWorkflows(ctx context.Context, inp cancelPendingWorkflowsInput) error {
  171. ctx, span := telemetry.NewSpan(ctx, "cancel-pending-workflows")
  172. defer span.End()
  173. if inp.repoID == 0 {
  174. return telemetry.Error(ctx, span, nil, "repo id is 0")
  175. }
  176. if inp.repoName == "" {
  177. return telemetry.Error(ctx, span, nil, "repo name is empty")
  178. }
  179. if inp.appName == "" {
  180. return telemetry.Error(ctx, span, nil, "app name is empty")
  181. }
  182. if inp.githubAppSecret == nil {
  183. return telemetry.Error(ctx, span, nil, "github app secret is nil")
  184. }
  185. if inp.githubAppID == "" {
  186. return telemetry.Error(ctx, span, nil, "github app id is empty")
  187. }
  188. client, err := porter_app.GetGithubClientByRepoID(ctx, inp.repoID, inp.githubAppSecret, inp.githubAppID)
  189. if err != nil {
  190. return telemetry.Error(ctx, span, err, "error getting github client")
  191. }
  192. repoDetails := strings.Split(inp.repoName, "/")
  193. if len(repoDetails) != 2 {
  194. return telemetry.Error(ctx, span, nil, "repo name is invalid")
  195. }
  196. owner := repoDetails[0]
  197. repo := repoDetails[1]
  198. pendingStatusOptions := []string{"in_progress", "queued", "requested", "waiting"}
  199. for _, status := range pendingStatusOptions {
  200. runs, _, err := client.Actions.ListWorkflowRunsByFileName(
  201. ctx, owner, repo, fmt.Sprintf("porter_preview_%s.yml", inp.appName),
  202. &github.ListWorkflowRunsOptions{
  203. Branch: inp.event.GetPullRequest().GetHead().GetRef(),
  204. Status: status,
  205. },
  206. )
  207. if err != nil {
  208. return telemetry.Error(ctx, span, err, "error listing workflow runs")
  209. }
  210. for _, run := range runs.WorkflowRuns {
  211. _, err := client.Actions.CancelWorkflowRunByID(
  212. ctx, owner, repo, run.GetID(),
  213. )
  214. if err != nil {
  215. return telemetry.Error(ctx, span, err, "error cancelling workflow run")
  216. }
  217. }
  218. }
  219. return nil
  220. }