2
0

create.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580
  1. package release
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net/http"
  6. "strings"
  7. "time"
  8. "github.com/porter-dev/porter/api/server/authz"
  9. "github.com/porter-dev/porter/api/server/handlers"
  10. "github.com/porter-dev/porter/api/server/shared"
  11. "github.com/porter-dev/porter/api/server/shared/apierrors"
  12. "github.com/porter-dev/porter/api/server/shared/config"
  13. "github.com/porter-dev/porter/api/types"
  14. "github.com/porter-dev/porter/internal/analytics"
  15. "github.com/porter-dev/porter/internal/auth/token"
  16. "github.com/porter-dev/porter/internal/encryption"
  17. "github.com/porter-dev/porter/internal/helm"
  18. "github.com/porter-dev/porter/internal/helm/loader"
  19. "github.com/porter-dev/porter/internal/integrations/ci/actions"
  20. "github.com/porter-dev/porter/internal/integrations/ci/gitlab"
  21. "github.com/porter-dev/porter/internal/models"
  22. "github.com/porter-dev/porter/internal/oauth"
  23. "github.com/porter-dev/porter/internal/registry"
  24. "golang.org/x/crypto/bcrypt"
  25. "gopkg.in/yaml.v2"
  26. "helm.sh/helm/v3/pkg/release"
  27. v1 "k8s.io/api/core/v1"
  28. )
  29. type CreateReleaseHandler struct {
  30. handlers.PorterHandlerReadWriter
  31. authz.KubernetesAgentGetter
  32. }
  33. func NewCreateReleaseHandler(
  34. config *config.Config,
  35. decoderValidator shared.RequestDecoderValidator,
  36. writer shared.ResultWriter,
  37. ) *CreateReleaseHandler {
  38. return &CreateReleaseHandler{
  39. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  40. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  41. }
  42. }
  43. func (c *CreateReleaseHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  44. user, _ := r.Context().Value(types.UserScope).(*models.User)
  45. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  46. namespace := r.Context().Value(types.NamespaceScope).(string)
  47. operationID := oauth.CreateRandomState()
  48. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchStartTrack(
  49. &analytics.ApplicationLaunchStartTrackOpts{
  50. ClusterScopedTrackOpts: analytics.GetClusterScopedTrackOpts(user.ID, cluster.ProjectID, cluster.ID),
  51. FlowID: operationID,
  52. },
  53. ))
  54. helmAgent, err := c.GetHelmAgent(r, cluster, "")
  55. if err != nil {
  56. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  57. return
  58. }
  59. request := &types.CreateReleaseRequest{}
  60. if ok := c.DecodeAndValidate(w, r, request); !ok {
  61. return
  62. }
  63. if request.RepoURL == "" {
  64. request.RepoURL = c.Config().ServerConf.DefaultApplicationHelmRepoURL
  65. }
  66. if request.TemplateVersion == "latest" {
  67. request.TemplateVersion = ""
  68. }
  69. chart, err := loader.LoadChartPublic(request.RepoURL, request.TemplateName, request.TemplateVersion)
  70. if err != nil {
  71. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  72. return
  73. }
  74. registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  75. if err != nil {
  76. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  77. return
  78. }
  79. conf := &helm.InstallChartConfig{
  80. Chart: chart,
  81. Name: request.Name,
  82. Namespace: namespace,
  83. Values: request.Values,
  84. Cluster: cluster,
  85. Repo: c.Repo(),
  86. Registries: registries,
  87. }
  88. helmRelease, err := helmAgent.InstallChart(conf, c.Config().DOConf)
  89. if err != nil {
  90. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  91. fmt.Errorf("error installing a new chart: %s", err.Error()),
  92. http.StatusBadRequest,
  93. ))
  94. return
  95. }
  96. k8sAgent, err := c.GetAgent(r, cluster, "")
  97. if err != nil {
  98. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  99. return
  100. }
  101. configMaps := make([]*v1.ConfigMap, 0)
  102. if request.SyncedEnvGroups != nil && len(request.SyncedEnvGroups) > 0 {
  103. for _, envGroupName := range request.SyncedEnvGroups {
  104. // read the attached configmap
  105. cm, _, err := k8sAgent.GetLatestVersionedConfigMap(envGroupName, namespace)
  106. if err != nil {
  107. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("Couldn't find the env group"), http.StatusNotFound))
  108. return
  109. }
  110. configMaps = append(configMaps, cm)
  111. }
  112. }
  113. release, err := createReleaseFromHelmRelease(c.Config(), cluster.ProjectID, cluster.ID, helmRelease)
  114. if err != nil {
  115. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  116. return
  117. }
  118. if len(configMaps) > 0 {
  119. for _, cm := range configMaps {
  120. _, err = k8sAgent.AddApplicationToVersionedConfigMap(cm, release.Name)
  121. if err != nil {
  122. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(fmt.Errorf("Couldn't add %s to the config map %s", release.Name, cm.Name)))
  123. }
  124. }
  125. }
  126. if request.Tags != nil {
  127. tags, err := c.Repo().Tag().LinkTagsToRelease(request.Tags, release)
  128. if err == nil {
  129. release.Tags = append(release.Tags, tags...)
  130. }
  131. }
  132. if request.GitActionConfig != nil {
  133. _, _, err := createGitAction(
  134. c.Config(),
  135. user.ID,
  136. cluster.ProjectID,
  137. cluster.ID,
  138. request.GitActionConfig,
  139. request.Name,
  140. namespace,
  141. release,
  142. )
  143. if err != nil {
  144. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  145. return
  146. }
  147. }
  148. if request.BuildConfig != nil {
  149. _, err = createBuildConfig(c.Config(), release, request.BuildConfig)
  150. }
  151. if err != nil {
  152. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  153. return
  154. }
  155. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchSuccessTrack(
  156. &analytics.ApplicationLaunchSuccessTrackOpts{
  157. ApplicationScopedTrackOpts: analytics.GetApplicationScopedTrackOpts(
  158. user.ID,
  159. cluster.ProjectID,
  160. cluster.ID,
  161. release.Name,
  162. release.Namespace,
  163. chart.Metadata.Name,
  164. ),
  165. FlowID: operationID,
  166. },
  167. ))
  168. }
  169. func createReleaseFromHelmRelease(
  170. config *config.Config,
  171. projectID, clusterID uint,
  172. helmRelease *release.Release,
  173. ) (*models.Release, error) {
  174. token, err := encryption.GenerateRandomBytes(16)
  175. if err != nil {
  176. return nil, err
  177. }
  178. // create release with webhook token in db
  179. image, ok := helmRelease.Config["image"].(map[string]interface{})
  180. if !ok {
  181. return nil, fmt.Errorf("Could not find field image in config")
  182. }
  183. repository := image["repository"]
  184. repoStr, ok := repository.(string)
  185. if !ok {
  186. return nil, fmt.Errorf("Could not find field repository in config")
  187. }
  188. release := &models.Release{
  189. ClusterID: clusterID,
  190. ProjectID: projectID,
  191. Namespace: helmRelease.Namespace,
  192. Name: helmRelease.Name,
  193. WebhookToken: token,
  194. ImageRepoURI: repoStr,
  195. }
  196. return config.Repo.Release().CreateRelease(release)
  197. }
  198. func createGitAction(
  199. config *config.Config,
  200. userID, projectID, clusterID uint,
  201. request *types.CreateGitActionConfigRequest,
  202. name, namespace string,
  203. release *models.Release,
  204. ) (*types.GitActionConfig, []byte, error) {
  205. // if the registry was provisioned through Porter, create a repository if necessary
  206. if release != nil && request.RegistryID != 0 {
  207. // read the registry
  208. reg, err := config.Repo.Registry().ReadRegistry(projectID, request.RegistryID)
  209. if err != nil {
  210. return nil, nil, err
  211. }
  212. _reg := registry.Registry(*reg)
  213. regAPI := &_reg
  214. // parse the name from the registry
  215. nameSpl := strings.Split(request.ImageRepoURI, "/")
  216. repoName := nameSpl[len(nameSpl)-1]
  217. err = regAPI.CreateRepository(config.Repo, repoName)
  218. if err != nil {
  219. return nil, nil, err
  220. }
  221. }
  222. isDryRun := release == nil
  223. repoSplit := strings.Split(request.GitRepo, "/")
  224. if len(repoSplit) != 2 {
  225. return nil, nil, fmt.Errorf("invalid formatting of repo name")
  226. }
  227. encoded := ""
  228. var err error
  229. // if this isn't a dry run, generate the token
  230. if !isDryRun {
  231. encoded, err = getToken(config, userID, projectID, clusterID, request)
  232. if err != nil {
  233. return nil, nil, err
  234. }
  235. }
  236. var workflowYAML []byte
  237. var gitErr error
  238. if request.GitlabIntegrationID != 0 {
  239. giRunner := &gitlab.GitlabCI{
  240. ServerURL: config.ServerConf.ServerURL,
  241. GitRepoOwner: repoSplit[0],
  242. GitRepoName: repoSplit[1],
  243. GitBranch: request.GitBranch,
  244. Repo: config.Repo,
  245. ProjectID: projectID,
  246. ClusterID: clusterID,
  247. UserID: userID,
  248. IntegrationID: request.GitlabIntegrationID,
  249. PorterConf: config,
  250. ReleaseName: name,
  251. ReleaseNamespace: namespace,
  252. FolderPath: request.FolderPath,
  253. PorterToken: encoded,
  254. }
  255. gitErr = giRunner.Setup()
  256. } else {
  257. // create the commit in the git repo
  258. gaRunner := &actions.GithubActions{
  259. InstanceName: config.ServerConf.InstanceName,
  260. ServerURL: config.ServerConf.ServerURL,
  261. GithubOAuthIntegration: nil,
  262. GithubAppID: config.GithubAppConf.AppID,
  263. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  264. GithubInstallationID: request.GitRepoID,
  265. GitRepoName: repoSplit[1],
  266. GitRepoOwner: repoSplit[0],
  267. Repo: config.Repo,
  268. ProjectID: projectID,
  269. ClusterID: clusterID,
  270. ReleaseName: name,
  271. ReleaseNamespace: namespace,
  272. GitBranch: request.GitBranch,
  273. DockerFilePath: request.DockerfilePath,
  274. FolderPath: request.FolderPath,
  275. ImageRepoURL: request.ImageRepoURI,
  276. PorterToken: encoded,
  277. Version: "v0.1.0",
  278. ShouldCreateWorkflow: request.ShouldCreateWorkflow,
  279. DryRun: release == nil,
  280. }
  281. // Save the github err for after creating the git action config. However, we
  282. // need to call Setup() in order to get the workflow file before writing the
  283. // action config, in the case of a dry run, since the dry run does not create
  284. // a git action config.
  285. workflowYAML, githubErr := gaRunner.Setup()
  286. if gaRunner.DryRun {
  287. if githubErr != nil {
  288. return nil, nil, githubErr
  289. }
  290. return nil, workflowYAML, nil
  291. }
  292. }
  293. // handle write to the database
  294. ga, err := config.Repo.GitActionConfig().CreateGitActionConfig(&models.GitActionConfig{
  295. ReleaseID: release.ID,
  296. GitRepo: request.GitRepo,
  297. GitBranch: request.GitBranch,
  298. ImageRepoURI: request.ImageRepoURI,
  299. GitRepoID: request.GitRepoID,
  300. GitlabIntegrationID: request.GitlabIntegrationID,
  301. DockerfilePath: request.DockerfilePath,
  302. FolderPath: request.FolderPath,
  303. IsInstallation: true,
  304. Version: "v0.1.0",
  305. })
  306. if err != nil {
  307. return nil, nil, err
  308. }
  309. // update the release in the db with the image repo uri
  310. release.ImageRepoURI = ga.ImageRepoURI
  311. _, err = config.Repo.Release().UpdateRelease(release)
  312. if err != nil {
  313. return nil, nil, err
  314. }
  315. if gitErr != nil {
  316. return nil, nil, gitErr
  317. }
  318. return ga.ToGitActionConfigType(), workflowYAML, nil
  319. }
  320. func getToken(
  321. config *config.Config,
  322. userID, projectID, clusterID uint,
  323. request *types.CreateGitActionConfigRequest,
  324. ) (string, error) {
  325. // create a policy for the token
  326. policy := []*types.PolicyDocument{
  327. {
  328. Scope: types.ProjectScope,
  329. Verbs: types.ReadWriteVerbGroup(),
  330. Children: map[types.PermissionScope]*types.PolicyDocument{
  331. types.ClusterScope: {
  332. Scope: types.ClusterScope,
  333. Verbs: types.ReadWriteVerbGroup(),
  334. },
  335. types.RegistryScope: {
  336. Scope: types.RegistryScope,
  337. Verbs: types.ReadVerbGroup(),
  338. },
  339. types.HelmRepoScope: {
  340. Scope: types.HelmRepoScope,
  341. Verbs: types.ReadVerbGroup(),
  342. },
  343. },
  344. },
  345. }
  346. uid, err := encryption.GenerateRandomBytes(16)
  347. if err != nil {
  348. return "", err
  349. }
  350. policyBytes, err := json.Marshal(policy)
  351. if err != nil {
  352. return "", err
  353. }
  354. policyModel := &models.Policy{
  355. ProjectID: projectID,
  356. UniqueID: uid,
  357. CreatedByUserID: userID,
  358. Name: strings.ToLower(fmt.Sprintf("repo-%s-token-policy", request.GitRepo)),
  359. PolicyBytes: policyBytes,
  360. }
  361. policyModel, err = config.Repo.Policy().CreatePolicy(policyModel)
  362. if err != nil {
  363. return "", err
  364. }
  365. // create the token in the database
  366. tokenUID, err := encryption.GenerateRandomBytes(16)
  367. if err != nil {
  368. return "", err
  369. }
  370. secretKey, err := encryption.GenerateRandomBytes(16)
  371. if err != nil {
  372. return "", err
  373. }
  374. // hash the secret key for storage in the db
  375. hashedToken, err := bcrypt.GenerateFromPassword([]byte(secretKey), 8)
  376. if err != nil {
  377. return "", err
  378. }
  379. expiresAt := time.Now().Add(time.Hour * 24 * 365)
  380. apiToken := &models.APIToken{
  381. UniqueID: tokenUID,
  382. ProjectID: projectID,
  383. CreatedByUserID: userID,
  384. Expiry: &expiresAt,
  385. Revoked: false,
  386. PolicyUID: policyModel.UniqueID,
  387. PolicyName: policyModel.Name,
  388. Name: strings.ToLower(fmt.Sprintf("repo-%s-token", request.GitRepo)),
  389. SecretKey: hashedToken,
  390. }
  391. apiToken, err = config.Repo.APIToken().CreateAPIToken(apiToken)
  392. if err != nil {
  393. return "", err
  394. }
  395. // generate porter jwt token
  396. jwt, err := token.GetStoredTokenForAPI(userID, projectID, apiToken.UniqueID, secretKey)
  397. if err != nil {
  398. return "", err
  399. }
  400. return jwt.EncodeToken(config.TokenConf)
  401. }
  402. func createBuildConfig(
  403. config *config.Config,
  404. release *models.Release,
  405. bcRequest *types.CreateBuildConfigRequest,
  406. ) (*types.BuildConfig, error) {
  407. data, err := json.Marshal(bcRequest.Config)
  408. if err != nil {
  409. return nil, err
  410. }
  411. // handle write to the database
  412. bc, err := config.Repo.BuildConfig().CreateBuildConfig(&models.BuildConfig{
  413. Builder: bcRequest.Builder,
  414. Buildpacks: strings.Join(bcRequest.Buildpacks, ","),
  415. Config: data,
  416. })
  417. if err != nil {
  418. return nil, err
  419. }
  420. release.BuildConfig = bc.ID
  421. _, err = config.Repo.Release().UpdateRelease(release)
  422. if err != nil {
  423. return nil, err
  424. }
  425. return bc.ToBuildConfigType(), nil
  426. }
  427. type containerEnvConfig struct {
  428. Container struct {
  429. Env struct {
  430. Normal map[string]string `yaml:"normal"`
  431. } `yaml:"env"`
  432. } `yaml:"container"`
  433. }
  434. func getGARunner(
  435. config *config.Config,
  436. userID, projectID, clusterID uint,
  437. ga *models.GitActionConfig,
  438. name, namespace string,
  439. release *models.Release,
  440. helmRelease *release.Release,
  441. ) (*actions.GithubActions, error) {
  442. cEnv := &containerEnvConfig{}
  443. rawValues, err := yaml.Marshal(helmRelease.Config)
  444. if err == nil {
  445. err = yaml.Unmarshal(rawValues, cEnv)
  446. // if unmarshal error, just set to empty map
  447. if err != nil {
  448. cEnv.Container.Env.Normal = make(map[string]string)
  449. }
  450. }
  451. repoSplit := strings.Split(ga.GitRepo, "/")
  452. if len(repoSplit) != 2 {
  453. return nil, fmt.Errorf("invalid formatting of repo name")
  454. }
  455. // create the commit in the git repo
  456. return &actions.GithubActions{
  457. ServerURL: config.ServerConf.ServerURL,
  458. GithubOAuthIntegration: nil,
  459. BuildEnv: cEnv.Container.Env.Normal,
  460. GithubAppID: config.GithubAppConf.AppID,
  461. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  462. GithubInstallationID: ga.GitRepoID,
  463. GitRepoName: repoSplit[1],
  464. GitRepoOwner: repoSplit[0],
  465. Repo: config.Repo,
  466. ProjectID: projectID,
  467. ClusterID: clusterID,
  468. ReleaseName: name,
  469. GitBranch: ga.GitBranch,
  470. DockerFilePath: ga.DockerfilePath,
  471. FolderPath: ga.FolderPath,
  472. ImageRepoURL: ga.ImageRepoURI,
  473. Version: "v0.1.0",
  474. }, nil
  475. }