cluster.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455
  1. package gorm
  2. import (
  3. "fmt"
  4. "github.com/porter-dev/porter/internal/encryption"
  5. "github.com/porter-dev/porter/internal/features"
  6. "github.com/porter-dev/porter/internal/models"
  7. "github.com/porter-dev/porter/internal/repository"
  8. "gorm.io/gorm"
  9. ints "github.com/porter-dev/porter/internal/models/integrations"
  10. )
  11. // ClusterRepository uses gorm.DB for querying the database
  12. type ClusterRepository struct {
  13. db *gorm.DB
  14. key *[32]byte
  15. }
  16. // NewClusterRepository returns a ClusterRepository which uses
  17. // gorm.DB for querying the database. It accepts an encryption key to encrypt
  18. // sensitive data
  19. func NewClusterRepository(db *gorm.DB, key *[32]byte) repository.ClusterRepository {
  20. return &ClusterRepository{db, key}
  21. }
  22. // CreateClusterCandidate creates a new cluster candidate
  23. func (repo *ClusterRepository) CreateClusterCandidate(
  24. cc *models.ClusterCandidate,
  25. ) (*models.ClusterCandidate, error) {
  26. err := repo.EncryptClusterCandidateData(cc, repo.key)
  27. if err != nil {
  28. return nil, err
  29. }
  30. project := &models.Project{}
  31. if err := repo.db.Where("id = ?", cc.ProjectID).First(&project).Error; err != nil {
  32. return nil, err
  33. }
  34. assoc := repo.db.Model(&project).Association("ClusterCandidates")
  35. if assoc.Error != nil {
  36. return nil, assoc.Error
  37. }
  38. if err := assoc.Append(cc); err != nil {
  39. return nil, err
  40. }
  41. // decrypt at the end to return
  42. err = repo.DecryptClusterCandidateData(cc, repo.key)
  43. if err != nil {
  44. return nil, err
  45. }
  46. return cc, nil
  47. }
  48. // ReadClusterCandidate finds a cluster candidate by id
  49. func (repo *ClusterRepository) ReadClusterCandidate(
  50. projectID, ccID uint,
  51. ) (*models.ClusterCandidate, error) {
  52. cc := &models.ClusterCandidate{}
  53. if err := repo.db.Preload("Resolvers").Where("project_id = ? AND id = ?", projectID, ccID).First(&cc).Error; err != nil {
  54. return nil, err
  55. }
  56. repo.DecryptClusterCandidateData(cc, repo.key)
  57. return cc, nil
  58. }
  59. // ListClusterCandidatesByProjectID finds all cluster candidates
  60. // for a given project id
  61. func (repo *ClusterRepository) ListClusterCandidatesByProjectID(
  62. projectID uint,
  63. ) ([]*models.ClusterCandidate, error) {
  64. ccs := []*models.ClusterCandidate{}
  65. if err := repo.db.Preload("Resolvers").Where("project_id = ?", projectID).Find(&ccs).Error; err != nil {
  66. return nil, err
  67. }
  68. for _, cc := range ccs {
  69. repo.DecryptClusterCandidateData(cc, repo.key)
  70. }
  71. return ccs, nil
  72. }
  73. // UpdateClusterCandidateCreatedClusterID updates the CreatedClusterID for
  74. // a candidate, after the candidate has been resolved.
  75. func (repo *ClusterRepository) UpdateClusterCandidateCreatedClusterID(
  76. id uint,
  77. createdClusterID uint,
  78. ) (*models.ClusterCandidate, error) {
  79. cc := &models.ClusterCandidate{}
  80. if err := repo.db.Where("id = ?", id).First(&cc).Error; err != nil {
  81. return nil, err
  82. }
  83. cc.CreatedClusterID = createdClusterID
  84. if err := repo.db.Save(cc).Error; err != nil {
  85. return nil, err
  86. }
  87. repo.DecryptClusterCandidateData(cc, repo.key)
  88. return cc, nil
  89. }
  90. // CreateCluster creates a new cluster
  91. func (repo *ClusterRepository) CreateCluster(
  92. cluster *models.Cluster,
  93. launchDarkluClient *features.Client,
  94. ) (*models.Cluster, error) {
  95. err := repo.EncryptClusterData(cluster, repo.key)
  96. if err != nil {
  97. return nil, err
  98. }
  99. project := &models.Project{}
  100. if err := repo.db.Where("id = ?", cluster.ProjectID).First(&project).Error; err != nil {
  101. return nil, err
  102. }
  103. if cluster.PreviewEnvsEnabled && !project.GetFeatureFlag(models.PreviewEnvsEnabled, launchDarkluClient) {
  104. // this should only work if the corresponding project has preview environments enabled
  105. cluster.PreviewEnvsEnabled = false
  106. }
  107. assoc := repo.db.Model(&project).Association("Clusters")
  108. if assoc.Error != nil {
  109. return nil, assoc.Error
  110. }
  111. if err := assoc.Append(cluster); err != nil {
  112. return nil, err
  113. }
  114. // create a token cache by default
  115. cluster.TokenCache.ClusterID = cluster.ID
  116. if err := repo.db.Create(&cluster.TokenCache).Error; err != nil {
  117. return nil, err
  118. }
  119. cluster.TokenCacheID = cluster.TokenCache.ID
  120. if err := repo.db.Save(cluster).Error; err != nil {
  121. return nil, err
  122. }
  123. err = repo.DecryptClusterData(cluster, repo.key)
  124. if err != nil {
  125. return nil, err
  126. }
  127. return cluster, nil
  128. }
  129. // ReadCluster finds a cluster by id
  130. func (repo *ClusterRepository) ReadCluster(
  131. projectID, clusterID uint,
  132. ) (*models.Cluster, error) {
  133. cluster := &models.Cluster{}
  134. // preload Clusters association
  135. if err := repo.db.Where("project_id = ? AND id = ?", projectID, clusterID).First(&cluster).Error; err != nil {
  136. return nil, err
  137. }
  138. cache := ints.ClusterTokenCache{}
  139. if cluster.TokenCacheID != 0 {
  140. if err := repo.db.Where("id = ?", cluster.TokenCacheID).First(&cache).Error; err != nil {
  141. return nil, err
  142. }
  143. }
  144. cluster.TokenCache = cache
  145. err := repo.DecryptClusterData(cluster, repo.key)
  146. if err != nil {
  147. return nil, err
  148. }
  149. return cluster, nil
  150. }
  151. // ReadCluster finds a cluster by id
  152. func (repo *ClusterRepository) ReadClusterByInfraID(
  153. projectID, infraID uint,
  154. ) (*models.Cluster, error) {
  155. cluster := &models.Cluster{}
  156. // preload Clusters association
  157. if err := repo.db.Where("project_id = ? AND infra_id = ?", projectID, infraID).First(&cluster).Error; err != nil {
  158. return nil, err
  159. }
  160. cache := ints.ClusterTokenCache{}
  161. if cluster.TokenCacheID != 0 {
  162. if err := repo.db.Where("id = ?", cluster.TokenCacheID).First(&cache).Error; err != nil {
  163. return nil, err
  164. }
  165. }
  166. cluster.TokenCache = cache
  167. err := repo.DecryptClusterData(cluster, repo.key)
  168. if err != nil {
  169. return nil, err
  170. }
  171. return cluster, nil
  172. }
  173. // ListClustersByProjectID finds all clusters
  174. // for a given project id
  175. func (repo *ClusterRepository) ListClustersByProjectID(
  176. projectID uint,
  177. ) ([]*models.Cluster, error) {
  178. clusters := []*models.Cluster{}
  179. if err := repo.db.Where("project_id = ?", projectID).Find(&clusters).Error; err != nil {
  180. return nil, err
  181. }
  182. for _, cluster := range clusters {
  183. repo.DecryptClusterData(cluster, repo.key)
  184. }
  185. return clusters, nil
  186. }
  187. // UpdateCluster modifies an existing Cluster in the database
  188. func (repo *ClusterRepository) UpdateCluster(
  189. cluster *models.Cluster,
  190. launchDarklyClient *features.Client,
  191. ) (*models.Cluster, error) {
  192. err := repo.EncryptClusterData(cluster, repo.key)
  193. if err != nil {
  194. return nil, err
  195. }
  196. if cluster.PreviewEnvsEnabled {
  197. // this should only work if the corresponding project has preview environments enabled
  198. project := &models.Project{}
  199. if err := repo.db.Where("id = ?", cluster.ProjectID).First(project).Error; err != nil {
  200. return nil, fmt.Errorf("error fetching details about cluster's project: %w", err)
  201. }
  202. if !project.GetFeatureFlag(models.PreviewEnvsEnabled, launchDarklyClient) {
  203. cluster.PreviewEnvsEnabled = false
  204. }
  205. }
  206. if err := repo.db.Save(cluster).Error; err != nil {
  207. return nil, err
  208. }
  209. err = repo.DecryptClusterData(cluster, repo.key)
  210. if err != nil {
  211. return nil, err
  212. }
  213. return cluster, nil
  214. }
  215. // UpdateClusterTokenCache updates the token cache for a cluster
  216. func (repo *ClusterRepository) UpdateClusterTokenCache(
  217. tokenCache *ints.ClusterTokenCache,
  218. ) (*models.Cluster, error) {
  219. if tok := tokenCache.Token; len(tok) > 0 {
  220. cipherData, err := encryption.Encrypt(tok, repo.key)
  221. if err != nil {
  222. return nil, err
  223. }
  224. tokenCache.Token = cipherData
  225. }
  226. cluster := &models.Cluster{}
  227. if err := repo.db.Where("id = ?", tokenCache.ClusterID).First(&cluster).Error; err != nil {
  228. return nil, err
  229. }
  230. if cluster.TokenCacheID == 0 {
  231. tokenCache.ClusterID = cluster.ID
  232. if err := repo.db.Create(tokenCache).Error; err != nil {
  233. return nil, err
  234. }
  235. cluster.TokenCacheID = tokenCache.ID
  236. if err := repo.db.Save(cluster).Error; err != nil {
  237. return nil, err
  238. }
  239. } else {
  240. prev := &ints.ClusterTokenCache{}
  241. if err := repo.db.Where("id = ?", cluster.TokenCacheID).First(prev).Error; err != nil {
  242. return nil, err
  243. }
  244. prev.Token = tokenCache.Token
  245. prev.Expiry = tokenCache.Expiry
  246. prev.ClusterID = cluster.ID
  247. if err := repo.db.Save(prev).Error; err != nil {
  248. return nil, err
  249. }
  250. }
  251. return cluster, nil
  252. }
  253. // DeleteCluster removes a cluster from the db
  254. func (repo *ClusterRepository) DeleteCluster(
  255. cluster *models.Cluster,
  256. ) error {
  257. // clear TokenCache association
  258. if err := repo.db.Where("id = ?", cluster.TokenCacheID).Delete(&ints.ClusterTokenCache{}).Error; err != nil {
  259. return err
  260. }
  261. if err := repo.db.Where("id = ?", cluster.ID).Delete(&models.Cluster{}).Error; err != nil {
  262. return err
  263. }
  264. return nil
  265. }
  266. // EncryptClusterData will encrypt the user's service account data before writing
  267. // to the DB
  268. func (repo *ClusterRepository) EncryptClusterData(
  269. cluster *models.Cluster,
  270. key *[32]byte,
  271. ) error {
  272. if len(cluster.CertificateAuthorityData) > 0 {
  273. cipherData, err := encryption.Encrypt(cluster.CertificateAuthorityData, key)
  274. if err != nil {
  275. return err
  276. }
  277. cluster.CertificateAuthorityData = cipherData
  278. }
  279. if tok := cluster.TokenCache.Token; len(tok) > 0 {
  280. cipherData, err := encryption.Encrypt(tok, key)
  281. if err != nil {
  282. return err
  283. }
  284. cluster.TokenCache.Token = cipherData
  285. }
  286. return nil
  287. }
  288. // EncryptClusterCandidateData will encrypt the service account candidate data before
  289. // writing to the DB
  290. func (repo *ClusterRepository) EncryptClusterCandidateData(
  291. cc *models.ClusterCandidate,
  292. key *[32]byte,
  293. ) error {
  294. if len(cc.AWSClusterIDGuess) > 0 {
  295. cipherData, err := encryption.Encrypt(cc.AWSClusterIDGuess, key)
  296. if err != nil {
  297. return err
  298. }
  299. cc.AWSClusterIDGuess = cipherData
  300. }
  301. if len(cc.Kubeconfig) > 0 {
  302. cipherData, err := encryption.Encrypt(cc.Kubeconfig, key)
  303. if err != nil {
  304. return err
  305. }
  306. cc.Kubeconfig = cipherData
  307. }
  308. return nil
  309. }
  310. // DecryptClusterData will decrypt the user's service account data before
  311. // returning it from the DB
  312. func (repo *ClusterRepository) DecryptClusterData(
  313. cluster *models.Cluster,
  314. key *[32]byte,
  315. ) error {
  316. if len(cluster.CertificateAuthorityData) > 0 {
  317. plaintext, err := encryption.Decrypt(cluster.CertificateAuthorityData, key)
  318. if err != nil {
  319. return err
  320. }
  321. cluster.CertificateAuthorityData = plaintext
  322. }
  323. if tok := cluster.TokenCache.Token; len(tok) > 0 {
  324. plaintext, err := encryption.Decrypt(tok, key)
  325. // in the case that the token cache is down, set empty token
  326. if err != nil {
  327. cluster.TokenCache.Token = []byte{}
  328. } else {
  329. cluster.TokenCache.Token = plaintext
  330. }
  331. }
  332. return nil
  333. }
  334. // DecryptClusterCandidateData will decrypt the service account candidate data before
  335. // returning it from the DB
  336. func (repo *ClusterRepository) DecryptClusterCandidateData(
  337. cc *models.ClusterCandidate,
  338. key *[32]byte,
  339. ) error {
  340. if len(cc.AWSClusterIDGuess) > 0 {
  341. plaintext, err := encryption.Decrypt(cc.AWSClusterIDGuess, key)
  342. if err != nil {
  343. return err
  344. }
  345. cc.AWSClusterIDGuess = plaintext
  346. }
  347. if len(cc.Kubeconfig) > 0 {
  348. plaintext, err := encryption.Decrypt(cc.Kubeconfig, key)
  349. if err != nil {
  350. return err
  351. }
  352. cc.Kubeconfig = plaintext
  353. }
  354. return nil
  355. }