create.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622
  1. package release
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "fmt"
  7. "net/http"
  8. "strings"
  9. "time"
  10. "github.com/porter-dev/porter/api/server/authz"
  11. "github.com/porter-dev/porter/api/server/handlers"
  12. "github.com/porter-dev/porter/api/server/shared"
  13. "github.com/porter-dev/porter/api/server/shared/apierrors"
  14. "github.com/porter-dev/porter/api/server/shared/config"
  15. "github.com/porter-dev/porter/api/types"
  16. "github.com/porter-dev/porter/internal/analytics"
  17. "github.com/porter-dev/porter/internal/auth/token"
  18. "github.com/porter-dev/porter/internal/encryption"
  19. "github.com/porter-dev/porter/internal/helm"
  20. "github.com/porter-dev/porter/internal/helm/loader"
  21. "github.com/porter-dev/porter/internal/helm/repo"
  22. "github.com/porter-dev/porter/internal/integrations/ci/actions"
  23. "github.com/porter-dev/porter/internal/integrations/ci/gitlab"
  24. "github.com/porter-dev/porter/internal/models"
  25. "github.com/porter-dev/porter/internal/oauth"
  26. "github.com/porter-dev/porter/internal/registry"
  27. "github.com/stefanmcshane/helm/pkg/release"
  28. "golang.org/x/crypto/bcrypt"
  29. "gopkg.in/yaml.v2"
  30. v1 "k8s.io/api/core/v1"
  31. )
  32. type CreateReleaseHandler struct {
  33. handlers.PorterHandlerReadWriter
  34. authz.KubernetesAgentGetter
  35. }
  36. func NewCreateReleaseHandler(
  37. config *config.Config,
  38. decoderValidator shared.RequestDecoderValidator,
  39. writer shared.ResultWriter,
  40. ) *CreateReleaseHandler {
  41. return &CreateReleaseHandler{
  42. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  43. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  44. }
  45. }
  46. func (c *CreateReleaseHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  47. ctx := r.Context()
  48. user, _ := ctx.Value(types.UserScope).(*models.User)
  49. cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster)
  50. namespace := ctx.Value(types.NamespaceScope).(string)
  51. operationID := oauth.CreateRandomState()
  52. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchStartTrack(
  53. &analytics.ApplicationLaunchStartTrackOpts{
  54. ClusterScopedTrackOpts: analytics.GetClusterScopedTrackOpts(user.ID, cluster.ProjectID, cluster.ID),
  55. FlowID: operationID,
  56. },
  57. ))
  58. helmAgent, err := c.GetHelmAgent(r, cluster, "")
  59. if err != nil {
  60. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error getting helm agent: %w", err)))
  61. return
  62. }
  63. request := &types.CreateReleaseRequest{}
  64. if ok := c.DecodeAndValidate(w, r, request); !ok {
  65. return
  66. }
  67. if request.RepoURL == "" {
  68. request.RepoURL = c.Config().ServerConf.DefaultApplicationHelmRepoURL
  69. }
  70. // if the repo url is not an addon or application url, validate against the helm repos
  71. if request.RepoURL != c.Config().ServerConf.DefaultAddonHelmRepoURL && request.RepoURL != c.Config().ServerConf.DefaultApplicationHelmRepoURL {
  72. // load the helm repos in the project
  73. hrs, err := c.Repo().HelmRepo().ListHelmReposByProjectID(cluster.ProjectID)
  74. if err != nil {
  75. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error listing helm repos for project : %w", err)))
  76. return
  77. }
  78. isValid := repo.ValidateRepoURL(c.Config().ServerConf.DefaultAddonHelmRepoURL, c.Config().ServerConf.DefaultApplicationHelmRepoURL, hrs, request.RepoURL)
  79. if !isValid {
  80. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  81. fmt.Errorf("invalid repo_url parameter"),
  82. http.StatusBadRequest,
  83. ))
  84. return
  85. }
  86. }
  87. if request.TemplateVersion == "latest" {
  88. request.TemplateVersion = ""
  89. }
  90. chart, err := loader.LoadChartPublic(request.RepoURL, request.TemplateName, request.TemplateVersion)
  91. if err != nil {
  92. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error loading public chart: %w", err)))
  93. return
  94. }
  95. registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  96. if err != nil {
  97. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error listing registries: %w", err)))
  98. return
  99. }
  100. k8sAgent, err := c.GetAgent(r, cluster, "")
  101. if err != nil {
  102. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error getting k8s agent: %w", err)))
  103. return
  104. }
  105. // create the namespace if it does not exist already
  106. _, err = k8sAgent.CreateNamespace(namespace, nil)
  107. if err != nil {
  108. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error creating namespace: %w", err)))
  109. return
  110. }
  111. conf := &helm.InstallChartConfig{
  112. Chart: chart,
  113. Name: request.Name,
  114. Namespace: namespace,
  115. Values: request.Values,
  116. Cluster: cluster,
  117. Repo: c.Repo(),
  118. Registries: registries,
  119. }
  120. helmRelease, err := helmAgent.InstallChart(conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection)
  121. if err != nil {
  122. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  123. fmt.Errorf("error installing a new chart: %s", err.Error()),
  124. http.StatusBadRequest,
  125. ))
  126. return
  127. }
  128. configMaps := make([]*v1.ConfigMap, 0)
  129. if request.SyncedEnvGroups != nil && len(request.SyncedEnvGroups) > 0 {
  130. for _, envGroupName := range request.SyncedEnvGroups {
  131. // read the attached configmap
  132. cm, _, err := k8sAgent.GetLatestVersionedConfigMap(envGroupName, namespace)
  133. if err != nil {
  134. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("Couldn't find the env group"), http.StatusNotFound))
  135. return
  136. }
  137. configMaps = append(configMaps, cm)
  138. }
  139. }
  140. release, err := CreateAppReleaseFromHelmRelease(c.Config(), cluster.ProjectID, cluster.ID, 0, helmRelease)
  141. if err != nil {
  142. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  143. return
  144. }
  145. if len(configMaps) > 0 {
  146. for _, cm := range configMaps {
  147. _, err = k8sAgent.AddApplicationToVersionedConfigMap(cm, release.Name)
  148. if err != nil {
  149. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(fmt.Errorf("Couldn't add %s to the config map %s", release.Name, cm.Name)))
  150. }
  151. }
  152. }
  153. if request.Tags != nil {
  154. tags, err := c.Repo().Tag().LinkTagsToRelease(request.Tags, release)
  155. if err == nil {
  156. release.Tags = append(release.Tags, tags...)
  157. }
  158. }
  159. if request.BuildConfig != nil {
  160. _, err = createBuildConfig(c.Config(), release, request.BuildConfig)
  161. }
  162. if err != nil {
  163. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  164. return
  165. }
  166. if request.GitActionConfig != nil {
  167. _, _, err := createGitAction(
  168. ctx,
  169. c.Config(),
  170. user.ID,
  171. cluster.ProjectID,
  172. cluster.ID,
  173. request.GitActionConfig,
  174. request.Name,
  175. namespace,
  176. release,
  177. )
  178. if err != nil {
  179. unwrappedErr := errors.Unwrap(err)
  180. if unwrappedErr != nil {
  181. if errors.Is(unwrappedErr, actions.ErrProtectedBranch) {
  182. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusConflict))
  183. } else if errors.Is(unwrappedErr, actions.ErrCreatePRForProtectedBranch) {
  184. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusPreconditionFailed))
  185. }
  186. } else {
  187. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  188. return
  189. }
  190. }
  191. }
  192. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchSuccessTrack(
  193. &analytics.ApplicationLaunchSuccessTrackOpts{
  194. ApplicationScopedTrackOpts: analytics.GetApplicationScopedTrackOpts(
  195. user.ID,
  196. cluster.ProjectID,
  197. cluster.ID,
  198. release.Name,
  199. release.Namespace,
  200. chart.Metadata.Name,
  201. ),
  202. FlowID: operationID,
  203. },
  204. ))
  205. w.WriteHeader(http.StatusCreated)
  206. }
  207. func CreateAppReleaseFromHelmRelease(
  208. config *config.Config,
  209. projectID, clusterID, stackResourceID uint,
  210. helmRelease *release.Release,
  211. ) (*models.Release, error) {
  212. token, err := encryption.GenerateRandomBytes(16)
  213. if err != nil {
  214. return nil, err
  215. }
  216. // create release with webhook token in db
  217. image, ok := helmRelease.Config["image"].(map[string]interface{})
  218. if !ok {
  219. return nil, fmt.Errorf("Could not find field image in config")
  220. }
  221. repository := image["repository"]
  222. repoStr, ok := repository.(string)
  223. if !ok {
  224. return nil, fmt.Errorf("Could not find field repository in config")
  225. }
  226. release := &models.Release{
  227. ClusterID: clusterID,
  228. ProjectID: projectID,
  229. Namespace: helmRelease.Namespace,
  230. Name: helmRelease.Name,
  231. WebhookToken: token,
  232. ImageRepoURI: repoStr,
  233. StackResourceID: stackResourceID,
  234. }
  235. return config.Repo.Release().CreateRelease(release)
  236. }
  237. func CreateAddonReleaseFromHelmRelease(
  238. config *config.Config,
  239. projectID, clusterID, stackResourceID uint,
  240. helmRelease *release.Release,
  241. ) (*models.Release, error) {
  242. release := &models.Release{
  243. ClusterID: clusterID,
  244. ProjectID: projectID,
  245. Namespace: helmRelease.Namespace,
  246. Name: helmRelease.Name,
  247. StackResourceID: stackResourceID,
  248. }
  249. return config.Repo.Release().CreateRelease(release)
  250. }
  251. func createGitAction(
  252. ctx context.Context,
  253. config *config.Config,
  254. userID, projectID, clusterID uint,
  255. request *types.CreateGitActionConfigRequest,
  256. name, namespace string,
  257. release *models.Release,
  258. ) (*types.GitActionConfig, []byte, error) {
  259. // if the registry was provisioned through Porter, create a repository if necessary
  260. if release != nil && request.RegistryID != 0 {
  261. // read the registry
  262. reg, err := config.Repo.Registry().ReadRegistry(projectID, request.RegistryID)
  263. if err != nil {
  264. return nil, nil, err
  265. }
  266. _reg := registry.Registry(*reg)
  267. regAPI := &_reg
  268. // parse the name from the registry
  269. nameSpl := strings.Split(request.ImageRepoURI, "/")
  270. repoName := nameSpl[len(nameSpl)-1]
  271. err = regAPI.CreateRepository(ctx, config, repoName)
  272. if err != nil {
  273. return nil, nil, err
  274. }
  275. }
  276. isDryRun := release == nil
  277. repoSplit := strings.Split(request.GitRepo, "/")
  278. if len(repoSplit) != 2 {
  279. return nil, nil, fmt.Errorf("invalid formatting of repo name")
  280. }
  281. encoded := ""
  282. var err error
  283. // if this isn't a dry run, generate the token
  284. if !isDryRun {
  285. encoded, err = getToken(config, userID, projectID, clusterID, request)
  286. if err != nil {
  287. return nil, nil, err
  288. }
  289. }
  290. var workflowYAML []byte
  291. var gitErr error
  292. if request.GitlabIntegrationID != 0 {
  293. giRunner := &gitlab.GitlabCI{
  294. ServerURL: config.ServerConf.ServerURL,
  295. GitRepoOwner: repoSplit[0],
  296. GitRepoName: repoSplit[1],
  297. GitBranch: request.GitBranch,
  298. Repo: config.Repo,
  299. ProjectID: projectID,
  300. ClusterID: clusterID,
  301. UserID: userID,
  302. IntegrationID: request.GitlabIntegrationID,
  303. PorterConf: config,
  304. ReleaseName: name,
  305. ReleaseNamespace: namespace,
  306. FolderPath: request.FolderPath,
  307. PorterToken: encoded,
  308. }
  309. gitErr = giRunner.Setup()
  310. } else {
  311. // create the commit in the git repo
  312. gaRunner := &actions.GithubActions{
  313. InstanceName: config.ServerConf.InstanceName,
  314. ServerURL: config.ServerConf.ServerURL,
  315. GithubOAuthIntegration: nil,
  316. GithubAppID: config.GithubAppConf.AppID,
  317. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  318. GithubInstallationID: request.GitRepoID,
  319. GitRepoName: repoSplit[1],
  320. GitRepoOwner: repoSplit[0],
  321. Repo: config.Repo,
  322. ProjectID: projectID,
  323. ClusterID: clusterID,
  324. ReleaseName: name,
  325. ReleaseNamespace: namespace,
  326. GitBranch: request.GitBranch,
  327. DockerFilePath: request.DockerfilePath,
  328. FolderPath: request.FolderPath,
  329. ImageRepoURL: request.ImageRepoURI,
  330. PorterToken: encoded,
  331. Version: "v0.1.0",
  332. ShouldCreateWorkflow: request.ShouldCreateWorkflow,
  333. DryRun: release == nil,
  334. }
  335. // Save the github err for after creating the git action config. However, we
  336. // need to call Setup() in order to get the workflow file before writing the
  337. // action config, in the case of a dry run, since the dry run does not create
  338. // a git action config.
  339. workflowYAML, gitErr = gaRunner.Setup()
  340. if gaRunner.DryRun {
  341. if gitErr != nil {
  342. return nil, nil, gitErr
  343. }
  344. return nil, workflowYAML, nil
  345. }
  346. }
  347. // handle write to the database
  348. ga, err := config.Repo.GitActionConfig().CreateGitActionConfig(&models.GitActionConfig{
  349. ReleaseID: release.ID,
  350. GitRepo: request.GitRepo,
  351. GitBranch: request.GitBranch,
  352. ImageRepoURI: request.ImageRepoURI,
  353. GitRepoID: request.GitRepoID,
  354. GitlabIntegrationID: request.GitlabIntegrationID,
  355. DockerfilePath: request.DockerfilePath,
  356. FolderPath: request.FolderPath,
  357. IsInstallation: true,
  358. Version: "v0.1.0",
  359. })
  360. if err != nil {
  361. return nil, nil, err
  362. }
  363. // update the release in the db with the image repo uri
  364. release.ImageRepoURI = ga.ImageRepoURI
  365. _, err = config.Repo.Release().UpdateRelease(release)
  366. if err != nil {
  367. return nil, nil, err
  368. }
  369. return ga.ToGitActionConfigType(), workflowYAML, gitErr
  370. }
  371. func getToken(
  372. config *config.Config,
  373. userID, projectID, clusterID uint,
  374. request *types.CreateGitActionConfigRequest,
  375. ) (string, error) {
  376. // create a policy for the token
  377. policy := []*types.PolicyDocument{
  378. {
  379. Scope: types.ProjectScope,
  380. Verbs: types.ReadWriteVerbGroup(),
  381. Children: map[types.PermissionScope]*types.PolicyDocument{
  382. types.ClusterScope: {
  383. Scope: types.ClusterScope,
  384. Verbs: types.ReadWriteVerbGroup(),
  385. },
  386. types.RegistryScope: {
  387. Scope: types.RegistryScope,
  388. Verbs: types.ReadVerbGroup(),
  389. },
  390. types.HelmRepoScope: {
  391. Scope: types.HelmRepoScope,
  392. Verbs: types.ReadVerbGroup(),
  393. },
  394. },
  395. },
  396. }
  397. uid, err := encryption.GenerateRandomBytes(16)
  398. if err != nil {
  399. return "", err
  400. }
  401. policyBytes, err := json.Marshal(policy)
  402. if err != nil {
  403. return "", err
  404. }
  405. policyModel := &models.Policy{
  406. ProjectID: projectID,
  407. UniqueID: uid,
  408. CreatedByUserID: userID,
  409. Name: strings.ToLower(fmt.Sprintf("repo-%s-token-policy", request.GitRepo)),
  410. PolicyBytes: policyBytes,
  411. }
  412. policyModel, err = config.Repo.Policy().CreatePolicy(policyModel)
  413. if err != nil {
  414. return "", err
  415. }
  416. // create the token in the database
  417. tokenUID, err := encryption.GenerateRandomBytes(16)
  418. if err != nil {
  419. return "", err
  420. }
  421. secretKey, err := encryption.GenerateRandomBytes(16)
  422. if err != nil {
  423. return "", err
  424. }
  425. // hash the secret key for storage in the db
  426. hashedToken, err := bcrypt.GenerateFromPassword([]byte(secretKey), 8)
  427. if err != nil {
  428. return "", err
  429. }
  430. expiresAt := time.Now().Add(time.Hour * 24 * 365)
  431. apiToken := &models.APIToken{
  432. UniqueID: tokenUID,
  433. ProjectID: projectID,
  434. CreatedByUserID: userID,
  435. Expiry: &expiresAt,
  436. Revoked: false,
  437. PolicyUID: policyModel.UniqueID,
  438. PolicyName: policyModel.Name,
  439. Name: strings.ToLower(fmt.Sprintf("repo-%s-token", request.GitRepo)),
  440. SecretKey: hashedToken,
  441. }
  442. apiToken, err = config.Repo.APIToken().CreateAPIToken(apiToken)
  443. if err != nil {
  444. return "", err
  445. }
  446. // generate porter jwt token
  447. jwt, err := token.GetStoredTokenForAPI(userID, projectID, apiToken.UniqueID, secretKey)
  448. if err != nil {
  449. return "", err
  450. }
  451. return jwt.EncodeToken(config.TokenConf)
  452. }
  453. func createBuildConfig(
  454. config *config.Config,
  455. release *models.Release,
  456. bcRequest *types.CreateBuildConfigRequest,
  457. ) (*types.BuildConfig, error) {
  458. data, err := json.Marshal(bcRequest.Config)
  459. if err != nil {
  460. return nil, err
  461. }
  462. // handle write to the database
  463. bc, err := config.Repo.BuildConfig().CreateBuildConfig(&models.BuildConfig{
  464. Builder: bcRequest.Builder,
  465. Buildpacks: strings.Join(bcRequest.Buildpacks, ","),
  466. Config: data,
  467. })
  468. if err != nil {
  469. return nil, err
  470. }
  471. release.BuildConfig = bc.ID
  472. _, err = config.Repo.Release().UpdateRelease(release)
  473. if err != nil {
  474. return nil, err
  475. }
  476. return bc.ToBuildConfigType(), nil
  477. }
  478. type containerEnvConfig struct {
  479. Container struct {
  480. Env struct {
  481. Normal map[string]string `yaml:"normal"`
  482. } `yaml:"env"`
  483. } `yaml:"container"`
  484. }
  485. func GetGARunner(
  486. config *config.Config,
  487. userID, projectID, clusterID uint,
  488. ga *models.GitActionConfig,
  489. name, namespace string,
  490. release *models.Release,
  491. helmRelease *release.Release,
  492. ) (*actions.GithubActions, error) {
  493. cEnv := &containerEnvConfig{}
  494. rawValues, err := yaml.Marshal(helmRelease.Config)
  495. if err == nil {
  496. err = yaml.Unmarshal(rawValues, cEnv)
  497. // if unmarshal error, just set to empty map
  498. if err != nil {
  499. cEnv.Container.Env.Normal = make(map[string]string)
  500. }
  501. }
  502. repoSplit := strings.Split(ga.GitRepo, "/")
  503. if len(repoSplit) != 2 {
  504. return nil, fmt.Errorf("invalid formatting of repo name")
  505. }
  506. // create the commit in the git repo
  507. return &actions.GithubActions{
  508. ServerURL: config.ServerConf.ServerURL,
  509. GithubOAuthIntegration: nil,
  510. BuildEnv: cEnv.Container.Env.Normal,
  511. GithubAppID: config.GithubAppConf.AppID,
  512. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  513. GithubInstallationID: ga.GitRepoID,
  514. GitRepoName: repoSplit[1],
  515. GitRepoOwner: repoSplit[0],
  516. Repo: config.Repo,
  517. ProjectID: projectID,
  518. ClusterID: clusterID,
  519. ReleaseName: name,
  520. GitBranch: ga.GitBranch,
  521. DockerFilePath: ga.DockerfilePath,
  522. FolderPath: ga.FolderPath,
  523. ImageRepoURL: ga.ImageRepoURI,
  524. Version: "v0.1.0",
  525. }, nil
  526. }