validate.go 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235
  1. package porter_app
  2. import (
  3. "encoding/base64"
  4. "net/http"
  5. "connectrpc.com/connect"
  6. "github.com/google/uuid"
  7. porterv1 "github.com/porter-dev/api-contracts/generated/go/porter/v1"
  8. "github.com/porter-dev/api-contracts/generated/go/helpers"
  9. "github.com/porter-dev/porter/internal/telemetry"
  10. "github.com/porter-dev/porter/api/server/handlers"
  11. "github.com/porter-dev/porter/api/server/shared"
  12. "github.com/porter-dev/porter/api/server/shared/apierrors"
  13. "github.com/porter-dev/porter/api/server/shared/config"
  14. "github.com/porter-dev/porter/api/types"
  15. "github.com/porter-dev/porter/internal/models"
  16. )
  17. // ValidatePorterAppHandler is handles requests to the /apps/validate endpoint
  18. type ValidatePorterAppHandler struct {
  19. handlers.PorterHandlerReadWriter
  20. }
  21. // NewValidatePorterAppHandler returns a new ValidatePorterAppHandler
  22. func NewValidatePorterAppHandler(
  23. config *config.Config,
  24. decoderValidator shared.RequestDecoderValidator,
  25. writer shared.ResultWriter,
  26. ) *ValidatePorterAppHandler {
  27. return &ValidatePorterAppHandler{
  28. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  29. }
  30. }
  31. // ServiceDeletions are deletions to apply to a specific service
  32. type ServiceDeletions struct {
  33. DomainNames []string `json:"domain_names"`
  34. IngressAnnotationKeys []string `json:"ingress_annotation_keys"`
  35. }
  36. // Deletions are the names of services and env variables to delete
  37. type Deletions struct {
  38. ServiceNames []string `json:"service_names"`
  39. Predeploy []string `json:"predeploy"`
  40. EnvVariableNames []string `json:"env_variable_names"`
  41. EnvGroupNames []string `json:"env_group_names"`
  42. ServiceDeletions map[string]ServiceDeletions `json:"service_deletions"`
  43. }
  44. // ValidatePorterAppRequest is the request object for the /apps/validate endpoint
  45. type ValidatePorterAppRequest struct {
  46. AppName string `json:"app_name"`
  47. Base64AppProto string `json:"b64_app_proto"`
  48. Base64AppOverrides string `json:"b64_app_overrides"`
  49. DeploymentTargetId string `json:"deployment_target_id"`
  50. CommitSHA string `json:"commit_sha"`
  51. Deletions Deletions `json:"deletions"`
  52. }
  53. // ValidatePorterAppResponse is the response object for the /apps/validate endpoint
  54. type ValidatePorterAppResponse struct {
  55. ValidatedBase64AppProto string `json:"validate_b64_app_proto"`
  56. }
  57. // ServeHTTP translates requests into protobuf objects and forwards them to the cluster control plane, returning the result
  58. func (c *ValidatePorterAppHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  59. ctx, span := telemetry.NewSpan(r.Context(), "serve-validate-porter-app")
  60. defer span.End()
  61. project, _ := ctx.Value(types.ProjectScope).(*models.Project)
  62. cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster)
  63. telemetry.WithAttributes(span,
  64. telemetry.AttributeKV{Key: "project-id", Value: project.ID},
  65. telemetry.AttributeKV{Key: "cluster-id", Value: cluster.ID},
  66. )
  67. if !project.GetFeatureFlag(models.ValidateApplyV2, c.Config().LaunchDarklyClient) {
  68. err := telemetry.Error(ctx, span, nil, "project does not have validate apply v2 enabled")
  69. c.HandleAPIError(w, r, apierrors.NewErrForbidden(err))
  70. return
  71. }
  72. request := &ValidatePorterAppRequest{}
  73. if ok := c.DecodeAndValidate(w, r, request); !ok {
  74. err := telemetry.Error(ctx, span, nil, "error decoding request")
  75. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  76. return
  77. }
  78. appProto := &porterv1.PorterApp{}
  79. if request.Base64AppProto == "" {
  80. if request.AppName == "" {
  81. err := telemetry.Error(ctx, span, nil, "app name is empty and no base64 proto provided")
  82. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  83. return
  84. }
  85. appProto.Name = request.AppName
  86. } else {
  87. decoded, err := base64.StdEncoding.DecodeString(request.Base64AppProto)
  88. if err != nil {
  89. err := telemetry.Error(ctx, span, err, "error decoding base yaml")
  90. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  91. return
  92. }
  93. err = helpers.UnmarshalContractObject(decoded, appProto)
  94. if err != nil {
  95. err := telemetry.Error(ctx, span, err, "error unmarshalling app proto")
  96. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  97. return
  98. }
  99. }
  100. if appProto.Name == "" {
  101. err := telemetry.Error(ctx, span, nil, "app proto name is empty")
  102. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  103. return
  104. }
  105. telemetry.WithAttributes(span,
  106. telemetry.AttributeKV{Key: "app-name", Value: appProto.Name},
  107. telemetry.AttributeKV{Key: "deployment-target-id", Value: request.DeploymentTargetId},
  108. telemetry.AttributeKV{Key: "commit-sha", Value: request.CommitSHA},
  109. )
  110. var overrides *porterv1.PorterApp
  111. var baseDeploymentTargetID string
  112. if request.Base64AppOverrides != "" {
  113. decoded, err := base64.StdEncoding.DecodeString(request.Base64AppOverrides)
  114. if err != nil {
  115. err := telemetry.Error(ctx, span, err, "error decoding base yaml")
  116. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  117. return
  118. }
  119. overrides = &porterv1.PorterApp{}
  120. err = helpers.UnmarshalContractObject(decoded, overrides)
  121. if err != nil {
  122. err := telemetry.Error(ctx, span, err, "error unmarshalling app proto")
  123. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  124. return
  125. }
  126. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "validated-with-overrides", Value: true})
  127. // once we support many deployment targets, this will need to be updated to use whatever deployment target has been selected as the base
  128. defaultDeploymentTarget, err := c.Repo().DeploymentTarget().DeploymentTargetBySelectorAndSelectorType(project.ID, cluster.ID, DeploymentTargetSelector_Default, DeploymentTargetSelectorType_Default)
  129. if err != nil {
  130. err := telemetry.Error(ctx, span, err, "error getting default deployment target from repo")
  131. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  132. return
  133. }
  134. if defaultDeploymentTarget.ID == uuid.Nil {
  135. err := telemetry.Error(ctx, span, err, "default deployment target not found")
  136. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  137. return
  138. }
  139. baseDeploymentTargetID = defaultDeploymentTarget.ID.String()
  140. }
  141. var serviceDeletions map[string]*porterv1.ServiceDeletions
  142. if request.Deletions.ServiceDeletions != nil {
  143. serviceDeletions = make(map[string]*porterv1.ServiceDeletions)
  144. for k, v := range request.Deletions.ServiceDeletions {
  145. serviceDeletions[k] = &porterv1.ServiceDeletions{
  146. DomainNames: v.DomainNames,
  147. IngressAnnotations: v.IngressAnnotationKeys,
  148. }
  149. }
  150. }
  151. validateReq := connect.NewRequest(&porterv1.ValidatePorterAppRequest{
  152. ProjectId: int64(project.ID),
  153. DeploymentTargetId: request.DeploymentTargetId,
  154. CommitSha: request.CommitSHA,
  155. App: appProto,
  156. AppOverrides: overrides,
  157. Deletions: &porterv1.Deletions{
  158. ServiceNames: request.Deletions.ServiceNames,
  159. PredeployNames: request.Deletions.Predeploy,
  160. EnvVariableNames: request.Deletions.EnvVariableNames,
  161. EnvGroupNames: request.Deletions.EnvGroupNames,
  162. ServiceDeletions: serviceDeletions,
  163. },
  164. BaseDeploymentTargetId: baseDeploymentTargetID,
  165. })
  166. ccpResp, err := c.Config().ClusterControlPlaneClient.ValidatePorterApp(ctx, validateReq)
  167. if err != nil {
  168. err := telemetry.Error(ctx, span, err, "error calling ccp validate porter app")
  169. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  170. return
  171. }
  172. if ccpResp == nil {
  173. err := telemetry.Error(ctx, span, err, "ccp resp is nil")
  174. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  175. return
  176. }
  177. if ccpResp.Msg == nil {
  178. err := telemetry.Error(ctx, span, err, "ccp resp msg is nil")
  179. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  180. return
  181. }
  182. if ccpResp.Msg.App == nil {
  183. err := telemetry.Error(ctx, span, err, "ccp resp app is nil")
  184. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  185. return
  186. }
  187. encoded, err := helpers.MarshalContractObject(ctx, ccpResp.Msg.App)
  188. if err != nil {
  189. err := telemetry.Error(ctx, span, err, "error marshalling app proto back to json")
  190. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  191. return
  192. }
  193. b64 := base64.StdEncoding.EncodeToString(encoded)
  194. response := &ValidatePorterAppResponse{
  195. ValidatedBase64AppProto: b64,
  196. }
  197. c.WriteResult(w, r, response)
  198. }