cluster.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452
  1. package gorm
  2. import (
  3. "fmt"
  4. "github.com/porter-dev/porter/internal/encryption"
  5. "github.com/porter-dev/porter/internal/models"
  6. "github.com/porter-dev/porter/internal/repository"
  7. "gorm.io/gorm"
  8. ints "github.com/porter-dev/porter/internal/models/integrations"
  9. )
  10. // ClusterRepository uses gorm.DB for querying the database
  11. type ClusterRepository struct {
  12. db *gorm.DB
  13. key *[32]byte
  14. }
  15. // NewClusterRepository returns a ClusterRepository which uses
  16. // gorm.DB for querying the database. It accepts an encryption key to encrypt
  17. // sensitive data
  18. func NewClusterRepository(db *gorm.DB, key *[32]byte) repository.ClusterRepository {
  19. return &ClusterRepository{db, key}
  20. }
  21. // CreateClusterCandidate creates a new cluster candidate
  22. func (repo *ClusterRepository) CreateClusterCandidate(
  23. cc *models.ClusterCandidate,
  24. ) (*models.ClusterCandidate, error) {
  25. err := repo.EncryptClusterCandidateData(cc, repo.key)
  26. if err != nil {
  27. return nil, err
  28. }
  29. project := &models.Project{}
  30. if err := repo.db.Where("id = ?", cc.ProjectID).First(&project).Error; err != nil {
  31. return nil, err
  32. }
  33. assoc := repo.db.Model(&project).Association("ClusterCandidates")
  34. if assoc.Error != nil {
  35. return nil, assoc.Error
  36. }
  37. if err := assoc.Append(cc); err != nil {
  38. return nil, err
  39. }
  40. // decrypt at the end to return
  41. err = repo.DecryptClusterCandidateData(cc, repo.key)
  42. if err != nil {
  43. return nil, err
  44. }
  45. return cc, nil
  46. }
  47. // ReadClusterCandidate finds a cluster candidate by id
  48. func (repo *ClusterRepository) ReadClusterCandidate(
  49. projectID, ccID uint,
  50. ) (*models.ClusterCandidate, error) {
  51. cc := &models.ClusterCandidate{}
  52. if err := repo.db.Preload("Resolvers").Where("project_id = ? AND id = ?", projectID, ccID).First(&cc).Error; err != nil {
  53. return nil, err
  54. }
  55. repo.DecryptClusterCandidateData(cc, repo.key)
  56. return cc, nil
  57. }
  58. // ListClusterCandidatesByProjectID finds all cluster candidates
  59. // for a given project id
  60. func (repo *ClusterRepository) ListClusterCandidatesByProjectID(
  61. projectID uint,
  62. ) ([]*models.ClusterCandidate, error) {
  63. ccs := []*models.ClusterCandidate{}
  64. if err := repo.db.Preload("Resolvers").Where("project_id = ?", projectID).Find(&ccs).Error; err != nil {
  65. return nil, err
  66. }
  67. for _, cc := range ccs {
  68. repo.DecryptClusterCandidateData(cc, repo.key)
  69. }
  70. return ccs, nil
  71. }
  72. // UpdateClusterCandidateCreatedClusterID updates the CreatedClusterID for
  73. // a candidate, after the candidate has been resolved.
  74. func (repo *ClusterRepository) UpdateClusterCandidateCreatedClusterID(
  75. id uint,
  76. createdClusterID uint,
  77. ) (*models.ClusterCandidate, error) {
  78. cc := &models.ClusterCandidate{}
  79. if err := repo.db.Where("id = ?", id).First(&cc).Error; err != nil {
  80. return nil, err
  81. }
  82. cc.CreatedClusterID = createdClusterID
  83. if err := repo.db.Save(cc).Error; err != nil {
  84. return nil, err
  85. }
  86. repo.DecryptClusterCandidateData(cc, repo.key)
  87. return cc, nil
  88. }
  89. // CreateCluster creates a new cluster
  90. func (repo *ClusterRepository) CreateCluster(
  91. cluster *models.Cluster,
  92. ) (*models.Cluster, error) {
  93. err := repo.EncryptClusterData(cluster, repo.key)
  94. if err != nil {
  95. return nil, err
  96. }
  97. project := &models.Project{}
  98. if err := repo.db.Where("id = ?", cluster.ProjectID).First(&project).Error; err != nil {
  99. return nil, err
  100. }
  101. if cluster.PreviewEnvsEnabled && !project.PreviewEnvsEnabled {
  102. // this should only work if the corresponding project has preview environments enabled
  103. cluster.PreviewEnvsEnabled = false
  104. }
  105. assoc := repo.db.Model(&project).Association("Clusters")
  106. if assoc.Error != nil {
  107. return nil, assoc.Error
  108. }
  109. if err := assoc.Append(cluster); err != nil {
  110. return nil, err
  111. }
  112. // create a token cache by default
  113. cluster.TokenCache.ClusterID = cluster.ID
  114. if err := repo.db.Create(&cluster.TokenCache).Error; err != nil {
  115. return nil, err
  116. }
  117. cluster.TokenCacheID = cluster.TokenCache.ID
  118. if err := repo.db.Save(cluster).Error; err != nil {
  119. return nil, err
  120. }
  121. err = repo.DecryptClusterData(cluster, repo.key)
  122. if err != nil {
  123. return nil, err
  124. }
  125. return cluster, nil
  126. }
  127. // ReadCluster finds a cluster by id
  128. func (repo *ClusterRepository) ReadCluster(
  129. projectID, clusterID uint,
  130. ) (*models.Cluster, error) {
  131. cluster := &models.Cluster{}
  132. // preload Clusters association
  133. if err := repo.db.Where("project_id = ? AND id = ?", projectID, clusterID).First(&cluster).Error; err != nil {
  134. return nil, err
  135. }
  136. cache := ints.ClusterTokenCache{}
  137. if cluster.TokenCacheID != 0 {
  138. if err := repo.db.Where("id = ?", cluster.TokenCacheID).First(&cache).Error; err != nil {
  139. return nil, err
  140. }
  141. }
  142. cluster.TokenCache = cache
  143. err := repo.DecryptClusterData(cluster, repo.key)
  144. if err != nil {
  145. return nil, err
  146. }
  147. return cluster, nil
  148. }
  149. // ReadCluster finds a cluster by id
  150. func (repo *ClusterRepository) ReadClusterByInfraID(
  151. projectID, infraID uint,
  152. ) (*models.Cluster, error) {
  153. cluster := &models.Cluster{}
  154. // preload Clusters association
  155. if err := repo.db.Where("project_id = ? AND infra_id = ?", projectID, infraID).First(&cluster).Error; err != nil {
  156. return nil, err
  157. }
  158. cache := ints.ClusterTokenCache{}
  159. if cluster.TokenCacheID != 0 {
  160. if err := repo.db.Where("id = ?", cluster.TokenCacheID).First(&cache).Error; err != nil {
  161. return nil, err
  162. }
  163. }
  164. cluster.TokenCache = cache
  165. err := repo.DecryptClusterData(cluster, repo.key)
  166. if err != nil {
  167. return nil, err
  168. }
  169. return cluster, nil
  170. }
  171. // ListClustersByProjectID finds all clusters
  172. // for a given project id
  173. func (repo *ClusterRepository) ListClustersByProjectID(
  174. projectID uint,
  175. ) ([]*models.Cluster, error) {
  176. clusters := []*models.Cluster{}
  177. if err := repo.db.Where("project_id = ?", projectID).Find(&clusters).Error; err != nil {
  178. return nil, err
  179. }
  180. for _, cluster := range clusters {
  181. repo.DecryptClusterData(cluster, repo.key)
  182. }
  183. return clusters, nil
  184. }
  185. // UpdateCluster modifies an existing Cluster in the database
  186. func (repo *ClusterRepository) UpdateCluster(
  187. cluster *models.Cluster,
  188. ) (*models.Cluster, error) {
  189. err := repo.EncryptClusterData(cluster, repo.key)
  190. if err != nil {
  191. return nil, err
  192. }
  193. if cluster.PreviewEnvsEnabled {
  194. // this should only work if the corresponding project has preview environments enabled
  195. project := &models.Project{}
  196. if err := repo.db.Where("id = ?", cluster.ProjectID).First(project).Error; err != nil {
  197. return nil, fmt.Errorf("error fetching details about cluster's project: %w", err)
  198. }
  199. if !project.PreviewEnvsEnabled {
  200. cluster.PreviewEnvsEnabled = false
  201. }
  202. }
  203. if err := repo.db.Save(cluster).Error; err != nil {
  204. return nil, err
  205. }
  206. err = repo.DecryptClusterData(cluster, repo.key)
  207. if err != nil {
  208. return nil, err
  209. }
  210. return cluster, nil
  211. }
  212. // UpdateClusterTokenCache updates the token cache for a cluster
  213. func (repo *ClusterRepository) UpdateClusterTokenCache(
  214. tokenCache *ints.ClusterTokenCache,
  215. ) (*models.Cluster, error) {
  216. if tok := tokenCache.Token; len(tok) > 0 {
  217. cipherData, err := encryption.Encrypt(tok, repo.key)
  218. if err != nil {
  219. return nil, err
  220. }
  221. tokenCache.Token = cipherData
  222. }
  223. cluster := &models.Cluster{}
  224. if err := repo.db.Where("id = ?", tokenCache.ClusterID).First(&cluster).Error; err != nil {
  225. return nil, err
  226. }
  227. if cluster.TokenCacheID == 0 {
  228. tokenCache.ClusterID = cluster.ID
  229. if err := repo.db.Create(tokenCache).Error; err != nil {
  230. return nil, err
  231. }
  232. cluster.TokenCacheID = tokenCache.ID
  233. if err := repo.db.Save(cluster).Error; err != nil {
  234. return nil, err
  235. }
  236. } else {
  237. prev := &ints.ClusterTokenCache{}
  238. if err := repo.db.Where("id = ?", cluster.TokenCacheID).First(prev).Error; err != nil {
  239. return nil, err
  240. }
  241. prev.Token = tokenCache.Token
  242. prev.Expiry = tokenCache.Expiry
  243. prev.ClusterID = cluster.ID
  244. if err := repo.db.Save(prev).Error; err != nil {
  245. return nil, err
  246. }
  247. }
  248. return cluster, nil
  249. }
  250. // DeleteCluster removes a cluster from the db
  251. func (repo *ClusterRepository) DeleteCluster(
  252. cluster *models.Cluster,
  253. ) error {
  254. // clear TokenCache association
  255. if err := repo.db.Where("id = ?", cluster.TokenCacheID).Delete(&ints.ClusterTokenCache{}).Error; err != nil {
  256. return err
  257. }
  258. if err := repo.db.Where("id = ?", cluster.ID).Delete(&models.Cluster{}).Error; err != nil {
  259. return err
  260. }
  261. return nil
  262. }
  263. // EncryptClusterData will encrypt the user's service account data before writing
  264. // to the DB
  265. func (repo *ClusterRepository) EncryptClusterData(
  266. cluster *models.Cluster,
  267. key *[32]byte,
  268. ) error {
  269. if len(cluster.CertificateAuthorityData) > 0 {
  270. cipherData, err := encryption.Encrypt(cluster.CertificateAuthorityData, key)
  271. if err != nil {
  272. return err
  273. }
  274. cluster.CertificateAuthorityData = cipherData
  275. }
  276. if tok := cluster.TokenCache.Token; len(tok) > 0 {
  277. cipherData, err := encryption.Encrypt(tok, key)
  278. if err != nil {
  279. return err
  280. }
  281. cluster.TokenCache.Token = cipherData
  282. }
  283. return nil
  284. }
  285. // EncryptClusterCandidateData will encrypt the service account candidate data before
  286. // writing to the DB
  287. func (repo *ClusterRepository) EncryptClusterCandidateData(
  288. cc *models.ClusterCandidate,
  289. key *[32]byte,
  290. ) error {
  291. if len(cc.AWSClusterIDGuess) > 0 {
  292. cipherData, err := encryption.Encrypt(cc.AWSClusterIDGuess, key)
  293. if err != nil {
  294. return err
  295. }
  296. cc.AWSClusterIDGuess = cipherData
  297. }
  298. if len(cc.Kubeconfig) > 0 {
  299. cipherData, err := encryption.Encrypt(cc.Kubeconfig, key)
  300. if err != nil {
  301. return err
  302. }
  303. cc.Kubeconfig = cipherData
  304. }
  305. return nil
  306. }
  307. // DecryptClusterData will decrypt the user's service account data before
  308. // returning it from the DB
  309. func (repo *ClusterRepository) DecryptClusterData(
  310. cluster *models.Cluster,
  311. key *[32]byte,
  312. ) error {
  313. if len(cluster.CertificateAuthorityData) > 0 {
  314. plaintext, err := encryption.Decrypt(cluster.CertificateAuthorityData, key)
  315. if err != nil {
  316. return err
  317. }
  318. cluster.CertificateAuthorityData = plaintext
  319. }
  320. if tok := cluster.TokenCache.Token; len(tok) > 0 {
  321. plaintext, err := encryption.Decrypt(tok, key)
  322. // in the case that the token cache is down, set empty token
  323. if err != nil {
  324. cluster.TokenCache.Token = []byte{}
  325. } else {
  326. cluster.TokenCache.Token = plaintext
  327. }
  328. }
  329. return nil
  330. }
  331. // DecryptClusterCandidateData will decrypt the service account candidate data before
  332. // returning it from the DB
  333. func (repo *ClusterRepository) DecryptClusterCandidateData(
  334. cc *models.ClusterCandidate,
  335. key *[32]byte,
  336. ) error {
  337. if len(cc.AWSClusterIDGuess) > 0 {
  338. plaintext, err := encryption.Decrypt(cc.AWSClusterIDGuess, key)
  339. if err != nil {
  340. return err
  341. }
  342. cc.AWSClusterIDGuess = plaintext
  343. }
  344. if len(cc.Kubeconfig) > 0 {
  345. plaintext, err := encryption.Decrypt(cc.Kubeconfig, key)
  346. if err != nil {
  347. return err
  348. }
  349. cc.Kubeconfig = plaintext
  350. }
  351. return nil
  352. }