2
0

create.go 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216
  1. package environment
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "net/http"
  7. "strings"
  8. "github.com/google/go-github/v41/github"
  9. "github.com/porter-dev/porter/api/server/handlers"
  10. "github.com/porter-dev/porter/api/server/shared"
  11. "github.com/porter-dev/porter/api/server/shared/apierrors"
  12. "github.com/porter-dev/porter/api/server/shared/commonutils"
  13. "github.com/porter-dev/porter/api/server/shared/config"
  14. "github.com/porter-dev/porter/api/types"
  15. "github.com/porter-dev/porter/internal/auth/token"
  16. "github.com/porter-dev/porter/internal/encryption"
  17. "github.com/porter-dev/porter/internal/integrations/ci/actions"
  18. "github.com/porter-dev/porter/internal/models"
  19. "github.com/porter-dev/porter/internal/models/integrations"
  20. )
  21. type CreateEnvironmentHandler struct {
  22. handlers.PorterHandlerReadWriter
  23. }
  24. func NewCreateEnvironmentHandler(
  25. config *config.Config,
  26. decoderValidator shared.RequestDecoderValidator,
  27. writer shared.ResultWriter,
  28. ) *CreateEnvironmentHandler {
  29. return &CreateEnvironmentHandler{
  30. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  31. }
  32. }
  33. func (c *CreateEnvironmentHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  34. ga, _ := r.Context().Value(types.GitInstallationScope).(*integrations.GithubAppInstallation)
  35. user, _ := r.Context().Value(types.UserScope).(*models.User)
  36. project, _ := r.Context().Value(types.ProjectScope).(*models.Project)
  37. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  38. owner, name, ok := commonutils.GetOwnerAndNameParams(c, w, r)
  39. if !ok {
  40. return
  41. }
  42. // create the environment
  43. request := &types.CreateEnvironmentRequest{}
  44. if ok := c.DecodeAndValidate(w, r, request); !ok {
  45. return
  46. }
  47. // create a random webhook id
  48. webhookUID, err := encryption.GenerateRandomBytes(32)
  49. if err != nil {
  50. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error generating webhook UID for new preview "+
  51. "environment: %w", err)))
  52. return
  53. }
  54. env := &models.Environment{
  55. ProjectID: project.ID,
  56. ClusterID: cluster.ID,
  57. GitInstallationID: uint(ga.InstallationID),
  58. Name: request.Name,
  59. GitRepoOwner: owner,
  60. GitRepoName: name,
  61. GitRepoBranches: strings.Join(request.GitRepoBranches, ","),
  62. Mode: request.Mode,
  63. WebhookID: string(webhookUID),
  64. NewCommentsDisabled: request.DisableNewComments,
  65. }
  66. if len(request.NamespaceAnnotations) > 0 {
  67. var annotations []string
  68. for k, v := range request.NamespaceAnnotations {
  69. annotations = append(annotations, fmt.Sprintf("%s=%s", k, v))
  70. }
  71. env.NamespaceAnnotations = []byte(strings.Join(annotations, ","))
  72. }
  73. // write Github actions files to the repo
  74. client, err := getGithubClientFromEnvironment(c.Config(), env)
  75. if err != nil {
  76. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  77. return
  78. }
  79. webhookURL := getGithubWebhookURLFromUID(c.Config().ServerConf.ServerURL, string(webhookUID))
  80. // create incoming webhook
  81. hook, _, err := client.Repositories.CreateHook(
  82. context.Background(), owner, name, &github.Hook{
  83. Config: map[string]interface{}{
  84. "url": webhookURL,
  85. "content_type": "json",
  86. "secret": c.Config().ServerConf.GithubIncomingWebhookSecret,
  87. },
  88. Events: []string{"pull_request"},
  89. Active: github.Bool(true),
  90. },
  91. )
  92. if err != nil && !strings.Contains(err.Error(), "already exists") {
  93. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("%v: %w", errGithubAPI, err),
  94. http.StatusConflict))
  95. return
  96. }
  97. env.GithubWebhookID = hook.GetID()
  98. env, err = c.Repo().Environment().CreateEnvironment(env)
  99. if err != nil {
  100. _, deleteErr := client.Repositories.DeleteHook(context.Background(), owner, name, hook.GetID())
  101. if deleteErr != nil {
  102. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("%v: %w", errGithubAPI, deleteErr),
  103. http.StatusConflict, "error creating environment"))
  104. return
  105. }
  106. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error creating environment: %w", err)))
  107. return
  108. }
  109. // generate porter jwt token
  110. jwt, err := token.GetTokenForAPI(user.ID, project.ID)
  111. if err != nil {
  112. _, deleteErr := client.Repositories.DeleteHook(context.Background(), owner, name, hook.GetID())
  113. if deleteErr != nil {
  114. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("%v: %w", errGithubAPI, deleteErr),
  115. http.StatusConflict, "error getting token for API while creating environment"))
  116. return
  117. }
  118. _, deleteErr = c.Repo().Environment().DeleteEnvironment(env)
  119. if deleteErr != nil {
  120. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error deleting created preview environment: %w",
  121. deleteErr)))
  122. return
  123. }
  124. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error getting token for API: %w", err)))
  125. return
  126. }
  127. encoded, err := jwt.EncodeToken(c.Config().TokenConf)
  128. if err != nil {
  129. _, deleteErr := client.Repositories.DeleteHook(context.Background(), owner, name, hook.GetID())
  130. if deleteErr != nil {
  131. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("%v: %w", errGithubAPI, deleteErr),
  132. http.StatusConflict, "error encoding token while creating environment"))
  133. return
  134. }
  135. _, deleteErr = c.Repo().Environment().DeleteEnvironment(env)
  136. if deleteErr != nil {
  137. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error deleting created preview environment: %w",
  138. deleteErr)))
  139. return
  140. }
  141. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error encoding API token: %w", err)))
  142. return
  143. }
  144. err = actions.SetupEnv(&actions.EnvOpts{
  145. Client: client,
  146. ServerURL: c.Config().ServerConf.ServerURL,
  147. PorterToken: encoded,
  148. GitRepoOwner: owner,
  149. GitRepoName: name,
  150. ProjectID: project.ID,
  151. ClusterID: cluster.ID,
  152. GitInstallationID: uint(ga.InstallationID),
  153. EnvironmentName: request.Name,
  154. InstanceName: c.Config().ServerConf.InstanceName,
  155. })
  156. if err != nil {
  157. unwrappedErr := errors.Unwrap(err)
  158. if unwrappedErr != nil {
  159. if errors.Is(unwrappedErr, actions.ErrProtectedBranch) {
  160. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusConflict))
  161. } else if errors.Is(unwrappedErr, actions.ErrCreatePRForProtectedBranch) {
  162. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusPreconditionFailed))
  163. }
  164. } else {
  165. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error setting up preview environment in the github "+
  166. "repo: %w", err)))
  167. return
  168. }
  169. }
  170. c.WriteResult(w, r, env.ToEnvironmentType())
  171. }
  172. func getGithubWebhookURLFromUID(serverURL, webhookUID string) string {
  173. return fmt.Sprintf("%s/api/github/incoming_webhook/%s", serverURL, string(webhookUID))
  174. }