create.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504
  1. package release
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net/http"
  6. "strings"
  7. "time"
  8. "github.com/porter-dev/porter/api/server/authz"
  9. "github.com/porter-dev/porter/api/server/handlers"
  10. "github.com/porter-dev/porter/api/server/shared"
  11. "github.com/porter-dev/porter/api/server/shared/apierrors"
  12. "github.com/porter-dev/porter/api/server/shared/config"
  13. "github.com/porter-dev/porter/api/types"
  14. "github.com/porter-dev/porter/internal/analytics"
  15. "github.com/porter-dev/porter/internal/auth/token"
  16. "github.com/porter-dev/porter/internal/encryption"
  17. "github.com/porter-dev/porter/internal/helm"
  18. "github.com/porter-dev/porter/internal/helm/loader"
  19. "github.com/porter-dev/porter/internal/integrations/ci/actions"
  20. "github.com/porter-dev/porter/internal/models"
  21. "github.com/porter-dev/porter/internal/oauth"
  22. "github.com/porter-dev/porter/internal/registry"
  23. "golang.org/x/crypto/bcrypt"
  24. "gopkg.in/yaml.v2"
  25. "helm.sh/helm/v3/pkg/release"
  26. )
  27. type CreateReleaseHandler struct {
  28. handlers.PorterHandlerReadWriter
  29. authz.KubernetesAgentGetter
  30. }
  31. func NewCreateReleaseHandler(
  32. config *config.Config,
  33. decoderValidator shared.RequestDecoderValidator,
  34. writer shared.ResultWriter,
  35. ) *CreateReleaseHandler {
  36. return &CreateReleaseHandler{
  37. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  38. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  39. }
  40. }
  41. func (c *CreateReleaseHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  42. user, _ := r.Context().Value(types.UserScope).(*models.User)
  43. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  44. namespace := r.Context().Value(types.NamespaceScope).(string)
  45. operationID := oauth.CreateRandomState()
  46. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchStartTrack(
  47. &analytics.ApplicationLaunchStartTrackOpts{
  48. ClusterScopedTrackOpts: analytics.GetClusterScopedTrackOpts(user.ID, cluster.ProjectID, cluster.ID),
  49. FlowID: operationID,
  50. },
  51. ))
  52. helmAgent, err := c.GetHelmAgent(r, cluster, "")
  53. if err != nil {
  54. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  55. return
  56. }
  57. request := &types.CreateReleaseRequest{}
  58. if ok := c.DecodeAndValidate(w, r, request); !ok {
  59. return
  60. }
  61. if request.RepoURL == "" {
  62. request.RepoURL = c.Config().ServerConf.DefaultApplicationHelmRepoURL
  63. }
  64. if request.TemplateVersion == "latest" {
  65. request.TemplateVersion = ""
  66. }
  67. chart, err := loader.LoadChartPublic(request.RepoURL, request.TemplateName, request.TemplateVersion)
  68. if err != nil {
  69. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  70. return
  71. }
  72. registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  73. if err != nil {
  74. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  75. return
  76. }
  77. conf := &helm.InstallChartConfig{
  78. Chart: chart,
  79. Name: request.Name,
  80. Namespace: namespace,
  81. Values: request.Values,
  82. Cluster: cluster,
  83. Repo: c.Repo(),
  84. Registries: registries,
  85. }
  86. helmRelease, err := helmAgent.InstallChart(conf, c.Config().DOConf)
  87. if err != nil {
  88. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  89. fmt.Errorf("error installing a new chart: %s", err.Error()),
  90. http.StatusBadRequest,
  91. ))
  92. return
  93. }
  94. release, err := createReleaseFromHelmRelease(c.Config(), cluster.ProjectID, cluster.ID, helmRelease)
  95. if err != nil {
  96. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  97. return
  98. }
  99. if request.GithubActionConfig != nil {
  100. _, _, err := createGitAction(
  101. c.Config(),
  102. user.ID,
  103. cluster.ProjectID,
  104. cluster.ID,
  105. request.GithubActionConfig,
  106. request.Name,
  107. namespace,
  108. release,
  109. )
  110. if err != nil {
  111. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  112. return
  113. }
  114. }
  115. if request.BuildConfig != nil {
  116. _, err = createBuildConfig(c.Config(), release, request.BuildConfig)
  117. }
  118. if err != nil {
  119. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  120. return
  121. }
  122. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchSuccessTrack(
  123. &analytics.ApplicationLaunchSuccessTrackOpts{
  124. ApplicationScopedTrackOpts: analytics.GetApplicationScopedTrackOpts(
  125. user.ID,
  126. cluster.ProjectID,
  127. cluster.ID,
  128. release.Name,
  129. release.Namespace,
  130. chart.Metadata.Name,
  131. ),
  132. FlowID: operationID,
  133. },
  134. ))
  135. }
  136. func createReleaseFromHelmRelease(
  137. config *config.Config,
  138. projectID, clusterID uint,
  139. helmRelease *release.Release,
  140. ) (*models.Release, error) {
  141. token, err := encryption.GenerateRandomBytes(16)
  142. if err != nil {
  143. return nil, err
  144. }
  145. // create release with webhook token in db
  146. image, ok := helmRelease.Config["image"].(map[string]interface{})
  147. if !ok {
  148. return nil, fmt.Errorf("Could not find field image in config")
  149. }
  150. repository := image["repository"]
  151. repoStr, ok := repository.(string)
  152. if !ok {
  153. return nil, fmt.Errorf("Could not find field repository in config")
  154. }
  155. release := &models.Release{
  156. ClusterID: clusterID,
  157. ProjectID: projectID,
  158. Namespace: helmRelease.Namespace,
  159. Name: helmRelease.Name,
  160. WebhookToken: token,
  161. ImageRepoURI: repoStr,
  162. }
  163. return config.Repo.Release().CreateRelease(release)
  164. }
  165. func createGitAction(
  166. config *config.Config,
  167. userID, projectID, clusterID uint,
  168. request *types.CreateGitActionConfigRequest,
  169. name, namespace string,
  170. release *models.Release,
  171. ) (*types.GitActionConfig, []byte, error) {
  172. // if the registry was provisioned through Porter, create a repository if necessary
  173. if release != nil && request.RegistryID != 0 {
  174. // read the registry
  175. reg, err := config.Repo.Registry().ReadRegistry(projectID, request.RegistryID)
  176. if err != nil {
  177. return nil, nil, err
  178. }
  179. _reg := registry.Registry(*reg)
  180. regAPI := &_reg
  181. // parse the name from the registry
  182. nameSpl := strings.Split(request.ImageRepoURI, "/")
  183. repoName := nameSpl[len(nameSpl)-1]
  184. err = regAPI.CreateRepository(config.Repo, repoName)
  185. if err != nil {
  186. return nil, nil, err
  187. }
  188. }
  189. repoSplit := strings.Split(request.GitRepo, "/")
  190. if len(repoSplit) != 2 {
  191. return nil, nil, fmt.Errorf("invalid formatting of repo name")
  192. }
  193. encoded, err := getToken(config, userID, projectID, clusterID, request)
  194. if err != nil {
  195. return nil, nil, err
  196. }
  197. // create the commit in the git repo
  198. gaRunner := &actions.GithubActions{
  199. InstanceName: config.ServerConf.InstanceName,
  200. ServerURL: config.ServerConf.ServerURL,
  201. GithubOAuthIntegration: nil,
  202. GithubAppID: config.GithubAppConf.AppID,
  203. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  204. GithubInstallationID: request.GitRepoID,
  205. GitRepoName: repoSplit[1],
  206. GitRepoOwner: repoSplit[0],
  207. Repo: config.Repo,
  208. ProjectID: projectID,
  209. ClusterID: clusterID,
  210. ReleaseName: name,
  211. ReleaseNamespace: namespace,
  212. GitBranch: request.GitBranch,
  213. DockerFilePath: request.DockerfilePath,
  214. FolderPath: request.FolderPath,
  215. ImageRepoURL: request.ImageRepoURI,
  216. PorterToken: encoded,
  217. Version: "v0.1.0",
  218. ShouldCreateWorkflow: request.ShouldCreateWorkflow,
  219. DryRun: release == nil,
  220. }
  221. // Save the github err for after creating the git action config. However, we
  222. // need to call Setup() in order to get the workflow file before writing the
  223. // action config, in the case of a dry run, since the dry run does not create
  224. // a git action config.
  225. workflowYAML, githubErr := gaRunner.Setup()
  226. if gaRunner.DryRun {
  227. if githubErr != nil {
  228. return nil, nil, githubErr
  229. }
  230. return nil, workflowYAML, nil
  231. }
  232. // handle write to the database
  233. ga, err := config.Repo.GitActionConfig().CreateGitActionConfig(&models.GitActionConfig{
  234. ReleaseID: release.ID,
  235. GitRepo: request.GitRepo,
  236. GitBranch: request.GitBranch,
  237. ImageRepoURI: request.ImageRepoURI,
  238. GitRepoID: request.GitRepoID,
  239. DockerfilePath: request.DockerfilePath,
  240. FolderPath: request.FolderPath,
  241. IsInstallation: true,
  242. Version: "v0.1.0",
  243. })
  244. if err != nil {
  245. return nil, nil, err
  246. }
  247. // update the release in the db with the image repo uri
  248. release.ImageRepoURI = ga.ImageRepoURI
  249. _, err = config.Repo.Release().UpdateRelease(release)
  250. if err != nil {
  251. return nil, nil, err
  252. }
  253. if githubErr != nil {
  254. return nil, nil, githubErr
  255. }
  256. return ga.ToGitActionConfigType(), workflowYAML, nil
  257. }
  258. func getToken(
  259. config *config.Config,
  260. userID, projectID, clusterID uint,
  261. request *types.CreateGitActionConfigRequest,
  262. ) (string, error) {
  263. // create a policy for the token
  264. policy := []*types.PolicyDocument{
  265. {
  266. Scope: types.ProjectScope,
  267. // This token allows no API verbs at the project level, meaning child resources need to explicitly
  268. // declare granted verbs and scopes. Thus we do not allow repo-scoped tokens to access things like
  269. // project settings or infra.
  270. Verbs: []types.APIVerb{},
  271. Children: map[types.PermissionScope]*types.PolicyDocument{
  272. types.ClusterScope: {
  273. Scope: types.ClusterScope,
  274. Verbs: types.ReadWriteVerbGroup(),
  275. },
  276. types.HelmRepoScope: {
  277. Scope: types.HelmRepoScope,
  278. Verbs: []types.APIVerb{
  279. types.APIVerbGet, types.APIVerbList,
  280. },
  281. },
  282. },
  283. },
  284. }
  285. uid, err := encryption.GenerateRandomBytes(16)
  286. if err != nil {
  287. return "", err
  288. }
  289. policyBytes, err := json.Marshal(policy)
  290. if err != nil {
  291. return "", err
  292. }
  293. policyModel := &models.Policy{
  294. ProjectID: projectID,
  295. UniqueID: uid,
  296. CreatedByUserID: userID,
  297. Name: strings.ToLower(fmt.Sprintf("repo-%s-token-policy", request.GitRepo)),
  298. PolicyBytes: policyBytes,
  299. }
  300. policyModel, err = config.Repo.Policy().CreatePolicy(policyModel)
  301. if err != nil {
  302. return "", err
  303. }
  304. // create the token in the database
  305. tokenUID, err := encryption.GenerateRandomBytes(16)
  306. if err != nil {
  307. return "", err
  308. }
  309. secretKey, err := encryption.GenerateRandomBytes(16)
  310. if err != nil {
  311. return "", err
  312. }
  313. // hash the secret key for storage in the db
  314. hashedToken, err := bcrypt.GenerateFromPassword([]byte(secretKey), 8)
  315. if err != nil {
  316. return "", err
  317. }
  318. expiresAt := time.Now().Add(time.Hour * 24 * 365)
  319. apiToken := &models.APIToken{
  320. UniqueID: tokenUID,
  321. ProjectID: projectID,
  322. CreatedByUserID: userID,
  323. Expiry: &expiresAt,
  324. Revoked: false,
  325. PolicyUID: policyModel.UniqueID,
  326. PolicyName: policyModel.Name,
  327. Name: strings.ToLower(fmt.Sprintf("repo-%s-token", request.GitRepo)),
  328. SecretKey: hashedToken,
  329. }
  330. apiToken, err = config.Repo.APIToken().CreateAPIToken(apiToken)
  331. if err != nil {
  332. return "", err
  333. }
  334. // generate porter jwt token
  335. jwt, err := token.GetStoredTokenForAPI(userID, projectID, apiToken.UniqueID, secretKey)
  336. if err != nil {
  337. return "", err
  338. }
  339. return jwt.EncodeToken(config.TokenConf)
  340. }
  341. func createBuildConfig(
  342. config *config.Config,
  343. release *models.Release,
  344. bcRequest *types.CreateBuildConfigRequest,
  345. ) (*types.BuildConfig, error) {
  346. data, err := json.Marshal(bcRequest.Config)
  347. if err != nil {
  348. return nil, err
  349. }
  350. // handle write to the database
  351. bc, err := config.Repo.BuildConfig().CreateBuildConfig(&models.BuildConfig{
  352. Builder: bcRequest.Builder,
  353. Buildpacks: strings.Join(bcRequest.Buildpacks, ","),
  354. Config: data,
  355. })
  356. if err != nil {
  357. return nil, err
  358. }
  359. release.BuildConfig = bc.ID
  360. _, err = config.Repo.Release().UpdateRelease(release)
  361. if err != nil {
  362. return nil, err
  363. }
  364. return bc.ToBuildConfigType(), nil
  365. }
  366. type containerEnvConfig struct {
  367. Container struct {
  368. Env struct {
  369. Normal map[string]string `yaml:"normal"`
  370. } `yaml:"env"`
  371. } `yaml:"container"`
  372. }
  373. func getGARunner(
  374. config *config.Config,
  375. userID, projectID, clusterID uint,
  376. ga *models.GitActionConfig,
  377. name, namespace string,
  378. release *models.Release,
  379. helmRelease *release.Release,
  380. ) (*actions.GithubActions, error) {
  381. cEnv := &containerEnvConfig{}
  382. rawValues, err := yaml.Marshal(helmRelease.Config)
  383. if err == nil {
  384. err = yaml.Unmarshal(rawValues, cEnv)
  385. // if unmarshal error, just set to empty map
  386. if err != nil {
  387. cEnv.Container.Env.Normal = make(map[string]string)
  388. }
  389. }
  390. repoSplit := strings.Split(ga.GitRepo, "/")
  391. if len(repoSplit) != 2 {
  392. return nil, fmt.Errorf("invalid formatting of repo name")
  393. }
  394. // create the commit in the git repo
  395. return &actions.GithubActions{
  396. ServerURL: config.ServerConf.ServerURL,
  397. GithubOAuthIntegration: nil,
  398. BuildEnv: cEnv.Container.Env.Normal,
  399. GithubAppID: config.GithubAppConf.AppID,
  400. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  401. GithubInstallationID: ga.GitRepoID,
  402. GitRepoName: repoSplit[1],
  403. GitRepoOwner: repoSplit[0],
  404. Repo: config.Repo,
  405. ProjectID: projectID,
  406. ClusterID: clusterID,
  407. ReleaseName: name,
  408. GitBranch: ga.GitBranch,
  409. DockerFilePath: ga.DockerfilePath,
  410. FolderPath: ga.FolderPath,
  411. ImageRepoURL: ga.ImageRepoURI,
  412. Version: "v0.1.0",
  413. }, nil
  414. }