cluster.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459
  1. package gorm
  2. import (
  3. "context"
  4. "github.com/porter-dev/porter/internal/encryption"
  5. "github.com/porter-dev/porter/internal/models"
  6. "github.com/porter-dev/porter/internal/repository"
  7. "gorm.io/gorm"
  8. ints "github.com/porter-dev/porter/internal/models/integrations"
  9. )
  10. // ClusterRepository uses gorm.DB for querying the database
  11. type ClusterRepository struct {
  12. db *gorm.DB
  13. key *[32]byte
  14. }
  15. // NewClusterRepository returns a ClusterRepository which uses
  16. // gorm.DB for querying the database. It accepts an encryption key to encrypt
  17. // sensitive data
  18. func NewClusterRepository(db *gorm.DB, key *[32]byte) repository.ClusterRepository {
  19. return &ClusterRepository{db, key}
  20. }
  21. // CreateClusterCandidate creates a new cluster candidate
  22. func (repo *ClusterRepository) CreateClusterCandidate(
  23. cc *models.ClusterCandidate,
  24. ) (*models.ClusterCandidate, error) {
  25. err := repo.EncryptClusterCandidateData(cc, repo.key)
  26. if err != nil {
  27. return nil, err
  28. }
  29. project := &models.Project{}
  30. if err := repo.db.Where("id = ?", cc.ProjectID).First(&project).Error; err != nil {
  31. return nil, err
  32. }
  33. assoc := repo.db.Model(&project).Association("ClusterCandidates")
  34. if assoc.Error != nil {
  35. return nil, assoc.Error
  36. }
  37. if err := assoc.Append(cc); err != nil {
  38. return nil, err
  39. }
  40. // decrypt at the end to return
  41. err = repo.DecryptClusterCandidateData(cc, repo.key)
  42. if err != nil {
  43. return nil, err
  44. }
  45. return cc, nil
  46. }
  47. // ReadClusterCandidate finds a cluster candidate by id
  48. func (repo *ClusterRepository) ReadClusterCandidate(
  49. projectID, ccID uint,
  50. ) (*models.ClusterCandidate, error) {
  51. cc := &models.ClusterCandidate{}
  52. if err := repo.db.Preload("Resolvers").Where("project_id = ? AND id = ?", projectID, ccID).First(&cc).Error; err != nil {
  53. return nil, err
  54. }
  55. repo.DecryptClusterCandidateData(cc, repo.key)
  56. return cc, nil
  57. }
  58. // ListClusterCandidatesByProjectID finds all cluster candidates
  59. // for a given project id
  60. func (repo *ClusterRepository) ListClusterCandidatesByProjectID(
  61. projectID uint,
  62. ) ([]*models.ClusterCandidate, error) {
  63. ccs := []*models.ClusterCandidate{}
  64. if err := repo.db.Preload("Resolvers").Where("project_id = ?", projectID).Find(&ccs).Error; err != nil {
  65. return nil, err
  66. }
  67. for _, cc := range ccs {
  68. repo.DecryptClusterCandidateData(cc, repo.key)
  69. }
  70. return ccs, nil
  71. }
  72. // UpdateClusterCandidateCreatedClusterID updates the CreatedClusterID for
  73. // a candidate, after the candidate has been resolved.
  74. func (repo *ClusterRepository) UpdateClusterCandidateCreatedClusterID(
  75. id uint,
  76. createdClusterID uint,
  77. ) (*models.ClusterCandidate, error) {
  78. cc := &models.ClusterCandidate{}
  79. if err := repo.db.Where("id = ?", id).First(&cc).Error; err != nil {
  80. return nil, err
  81. }
  82. cc.CreatedClusterID = createdClusterID
  83. if err := repo.db.Save(cc).Error; err != nil {
  84. return nil, err
  85. }
  86. repo.DecryptClusterCandidateData(cc, repo.key)
  87. return cc, nil
  88. }
  89. // CreateCluster creates a new cluster
  90. func (repo *ClusterRepository) CreateCluster(
  91. cluster *models.Cluster,
  92. ) (*models.Cluster, error) {
  93. ctxDB := repo.db.WithContext(context.Background())
  94. err := repo.EncryptClusterData(cluster, repo.key)
  95. if err != nil {
  96. return nil, err
  97. }
  98. project := &models.Project{}
  99. if err := ctxDB.Where("id = ?", cluster.ProjectID).First(&project).Error; err != nil {
  100. return nil, err
  101. }
  102. assoc := ctxDB.Model(&project).Association("Clusters")
  103. if assoc.Error != nil {
  104. return nil, assoc.Error
  105. }
  106. if err := assoc.Append(cluster); err != nil {
  107. return nil, err
  108. }
  109. // create a token cache by default
  110. cluster.TokenCache.ClusterID = cluster.ID
  111. if err := ctxDB.Create(&cluster.TokenCache).Error; err != nil {
  112. return nil, err
  113. }
  114. cluster.TokenCacheID = cluster.TokenCache.ID
  115. if err := ctxDB.Save(cluster).Error; err != nil {
  116. return nil, err
  117. }
  118. err = repo.DecryptClusterData(cluster, repo.key)
  119. if err != nil {
  120. return nil, err
  121. }
  122. return cluster, nil
  123. }
  124. // ReadCluster finds a cluster by id
  125. func (repo *ClusterRepository) ReadCluster(
  126. projectID, clusterID uint,
  127. ) (*models.Cluster, error) {
  128. ctxDB := repo.db.WithContext(context.Background())
  129. cluster := &models.Cluster{}
  130. // preload Clusters association
  131. if err := ctxDB.Where("project_id = ? AND id = ?", projectID, clusterID).First(&cluster).Error; err != nil {
  132. return nil, err
  133. }
  134. cache := ints.ClusterTokenCache{}
  135. if cluster.TokenCacheID != 0 {
  136. if err := ctxDB.Where("id = ?", cluster.TokenCacheID).First(&cache).Error; err != nil {
  137. return nil, err
  138. }
  139. }
  140. cluster.TokenCache = cache
  141. err := repo.DecryptClusterData(cluster, repo.key)
  142. if err != nil {
  143. return nil, err
  144. }
  145. return cluster, nil
  146. }
  147. // ReadCluster finds a cluster by id
  148. func (repo *ClusterRepository) ReadClusterByInfraID(
  149. projectID, infraID uint,
  150. ) (*models.Cluster, error) {
  151. ctxDB := repo.db.WithContext(context.Background())
  152. cluster := &models.Cluster{}
  153. // preload Clusters association
  154. if err := ctxDB.Where("project_id = ? AND infra_id = ?", projectID, infraID).First(&cluster).Error; err != nil {
  155. return nil, err
  156. }
  157. cache := ints.ClusterTokenCache{}
  158. if cluster.TokenCacheID != 0 {
  159. if err := ctxDB.Where("id = ?", cluster.TokenCacheID).First(&cache).Error; err != nil {
  160. return nil, err
  161. }
  162. }
  163. cluster.TokenCache = cache
  164. err := repo.DecryptClusterData(cluster, repo.key)
  165. if err != nil {
  166. return nil, err
  167. }
  168. return cluster, nil
  169. }
  170. // ListClustersByProjectID finds all clusters
  171. // for a given project id
  172. func (repo *ClusterRepository) ListClustersByProjectID(
  173. projectID uint,
  174. ) ([]*models.Cluster, error) {
  175. ctxDB := repo.db.WithContext(context.Background())
  176. clusters := []*models.Cluster{}
  177. if err := ctxDB.Where("project_id = ?", projectID).Find(&clusters).Error; err != nil {
  178. return nil, err
  179. }
  180. for _, cluster := range clusters {
  181. repo.DecryptClusterData(cluster, repo.key)
  182. }
  183. return clusters, nil
  184. }
  185. // UpdateCluster modifies an existing Cluster in the database
  186. func (repo *ClusterRepository) UpdateCluster(
  187. cluster *models.Cluster,
  188. ) (*models.Cluster, error) {
  189. ctxDB := repo.db.WithContext(context.Background())
  190. err := repo.EncryptClusterData(cluster, repo.key)
  191. if err != nil {
  192. return nil, err
  193. }
  194. if err := ctxDB.Save(cluster).Error; err != nil {
  195. return nil, err
  196. }
  197. err = repo.DecryptClusterData(cluster, repo.key)
  198. if err != nil {
  199. return nil, err
  200. }
  201. return cluster, nil
  202. }
  203. // UpdateClusterTokenCache updates the token cache for a cluster
  204. func (repo *ClusterRepository) UpdateClusterTokenCache(
  205. tokenCache *ints.ClusterTokenCache,
  206. ) (*models.Cluster, error) {
  207. ctxDB := repo.db.WithContext(context.Background())
  208. if tok := tokenCache.Token; len(tok) > 0 {
  209. cipherData, err := encryption.Encrypt(tok, repo.key)
  210. if err != nil {
  211. return nil, err
  212. }
  213. tokenCache.Token = cipherData
  214. }
  215. cluster := &models.Cluster{}
  216. if err := ctxDB.Where("id = ?", tokenCache.ClusterID).First(&cluster).Error; err != nil {
  217. return nil, err
  218. }
  219. if cluster.TokenCacheID == 0 {
  220. tokenCache.ClusterID = cluster.ID
  221. if err := ctxDB.Create(tokenCache).Error; err != nil {
  222. return nil, err
  223. }
  224. cluster.TokenCacheID = tokenCache.ID
  225. if err := ctxDB.Save(cluster).Error; err != nil {
  226. return nil, err
  227. }
  228. } else {
  229. prev := &ints.ClusterTokenCache{}
  230. if err := ctxDB.Where("id = ?", cluster.TokenCacheID).First(prev).Error; err != nil {
  231. return nil, err
  232. }
  233. prev.Token = tokenCache.Token
  234. prev.Expiry = tokenCache.Expiry
  235. prev.ClusterID = cluster.ID
  236. if err := ctxDB.Save(prev).Error; err != nil {
  237. return nil, err
  238. }
  239. }
  240. return cluster, nil
  241. }
  242. // DeleteCluster removes a cluster from the db
  243. func (repo *ClusterRepository) DeleteCluster(
  244. cluster *models.Cluster,
  245. ) error {
  246. // clear TokenCache association
  247. if err := repo.db.Where("id = ?", cluster.TokenCacheID).Delete(&ints.ClusterTokenCache{}).Error; err != nil {
  248. return err
  249. }
  250. if err := repo.db.Where("id = ?", cluster.ID).Delete(&models.Cluster{}).Error; err != nil {
  251. return err
  252. }
  253. return nil
  254. }
  255. // EncryptClusterData will encrypt the user's service account data before writing
  256. // to the DB
  257. func (repo *ClusterRepository) EncryptClusterData(
  258. cluster *models.Cluster,
  259. key *[32]byte,
  260. ) error {
  261. if len(cluster.CertificateAuthorityData) > 0 {
  262. cipherData, err := encryption.Encrypt(cluster.CertificateAuthorityData, key)
  263. if err != nil {
  264. return err
  265. }
  266. cluster.CertificateAuthorityData = cipherData
  267. }
  268. if tok := cluster.TokenCache.Token; len(tok) > 0 {
  269. cipherData, err := encryption.Encrypt(tok, key)
  270. if err != nil {
  271. return err
  272. }
  273. cluster.TokenCache.Token = cipherData
  274. }
  275. return nil
  276. }
  277. // EncryptClusterCandidateData will encrypt the service account candidate data before
  278. // writing to the DB
  279. func (repo *ClusterRepository) EncryptClusterCandidateData(
  280. cc *models.ClusterCandidate,
  281. key *[32]byte,
  282. ) error {
  283. if len(cc.AWSClusterIDGuess) > 0 {
  284. cipherData, err := encryption.Encrypt(cc.AWSClusterIDGuess, key)
  285. if err != nil {
  286. return err
  287. }
  288. cc.AWSClusterIDGuess = cipherData
  289. }
  290. if len(cc.Kubeconfig) > 0 {
  291. cipherData, err := encryption.Encrypt(cc.Kubeconfig, key)
  292. if err != nil {
  293. return err
  294. }
  295. cc.Kubeconfig = cipherData
  296. }
  297. return nil
  298. }
  299. // DecryptClusterData will decrypt the user's service account data before
  300. // returning it from the DB
  301. func (repo *ClusterRepository) DecryptClusterData(
  302. cluster *models.Cluster,
  303. key *[32]byte,
  304. ) error {
  305. if len(cluster.CertificateAuthorityData) > 0 {
  306. plaintext, err := encryption.Decrypt(cluster.CertificateAuthorityData, key)
  307. if err != nil {
  308. return err
  309. }
  310. cluster.CertificateAuthorityData = plaintext
  311. }
  312. if tok := cluster.TokenCache.Token; len(tok) > 0 {
  313. plaintext, err := encryption.Decrypt(tok, key)
  314. // in the case that the token cache is down, set empty token
  315. if err != nil {
  316. cluster.TokenCache.Token = []byte{}
  317. } else {
  318. cluster.TokenCache.Token = plaintext
  319. }
  320. }
  321. return nil
  322. }
  323. // DecryptClusterCandidateData will decrypt the service account candidate data before
  324. // returning it from the DB
  325. func (repo *ClusterRepository) DecryptClusterCandidateData(
  326. cc *models.ClusterCandidate,
  327. key *[32]byte,
  328. ) error {
  329. if len(cc.AWSClusterIDGuess) > 0 {
  330. plaintext, err := encryption.Decrypt(cc.AWSClusterIDGuess, key)
  331. if err != nil {
  332. return err
  333. }
  334. cc.AWSClusterIDGuess = plaintext
  335. }
  336. if len(cc.Kubeconfig) > 0 {
  337. plaintext, err := encryption.Decrypt(cc.Kubeconfig, key)
  338. if err != nil {
  339. return err
  340. }
  341. cc.Kubeconfig = plaintext
  342. }
  343. return nil
  344. }