| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226 |
- package environment
- import (
- "context"
- "errors"
- "fmt"
- "net/http"
- "strconv"
- "strings"
- ghinstallation "github.com/bradleyfalzon/ghinstallation/v2"
- "github.com/google/go-github/v41/github"
- "github.com/porter-dev/porter/api/server/handlers"
- "github.com/porter-dev/porter/api/server/shared"
- "github.com/porter-dev/porter/api/server/shared/apierrors"
- "github.com/porter-dev/porter/api/server/shared/commonutils"
- "github.com/porter-dev/porter/api/server/shared/config"
- "github.com/porter-dev/porter/api/types"
- "github.com/porter-dev/porter/internal/auth/token"
- "github.com/porter-dev/porter/internal/encryption"
- "github.com/porter-dev/porter/internal/integrations/ci/actions"
- "github.com/porter-dev/porter/internal/models"
- "github.com/porter-dev/porter/internal/models/integrations"
- )
- type CreateEnvironmentHandler struct {
- handlers.PorterHandlerReadWriter
- }
- func NewCreateEnvironmentHandler(
- config *config.Config,
- decoderValidator shared.RequestDecoderValidator,
- writer shared.ResultWriter,
- ) *CreateEnvironmentHandler {
- return &CreateEnvironmentHandler{
- PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
- }
- }
- func (c *CreateEnvironmentHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- ga, _ := r.Context().Value(types.GitInstallationScope).(*integrations.GithubAppInstallation)
- user, _ := r.Context().Value(types.UserScope).(*models.User)
- project, _ := r.Context().Value(types.ProjectScope).(*models.Project)
- cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
- owner, name, ok := commonutils.GetOwnerAndNameParams(c, w, r)
- if !ok {
- return
- }
- // create the environment
- request := &types.CreateEnvironmentRequest{}
- if ok := c.DecodeAndValidate(w, r, request); !ok {
- return
- }
- // create a random webhook id
- webhookUID, err := encryption.GenerateRandomBytes(32)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- env := &models.Environment{
- ProjectID: project.ID,
- ClusterID: cluster.ID,
- GitInstallationID: uint(ga.InstallationID),
- Name: request.Name,
- GitRepoOwner: owner,
- GitRepoName: name,
- Mode: request.Mode,
- WebhookID: string(webhookUID),
- NewCommentsDisabled: false,
- }
- // write Github actions files to the repo
- client, err := getGithubClientFromEnvironment(c.Config(), env)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- webhookURL := getGithubWebhookURLFromUID(c.Config().ServerConf.ServerURL, string(webhookUID))
- // create incoming webhook
- hook, _, err := client.Repositories.CreateHook(
- context.Background(), owner, name, &github.Hook{
- Config: map[string]interface{}{
- "url": webhookURL,
- "content_type": "json",
- "secret": c.Config().ServerConf.GithubIncomingWebhookSecret,
- },
- Events: []string{"pull_request"},
- Active: github.Bool(true),
- },
- )
- if err != nil && !strings.Contains(err.Error(), "already exists") {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("%v: %w", errGithubAPI, err),
- http.StatusConflict))
- return
- }
- env.GithubWebhookID = hook.GetID()
- env, err = c.Repo().Environment().CreateEnvironment(env)
- if err != nil {
- _, deleteErr := client.Repositories.DeleteHook(context.Background(), owner, name, hook.GetID())
- if deleteErr != nil {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("%v: %w", errGithubAPI, deleteErr),
- http.StatusConflict, "error creating environment"))
- return
- }
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- // generate porter jwt token
- jwt, err := token.GetTokenForAPI(user.ID, project.ID)
- if err != nil {
- _, deleteErr := client.Repositories.DeleteHook(context.Background(), owner, name, hook.GetID())
- if deleteErr != nil {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("%v: %w", errGithubAPI, deleteErr),
- http.StatusConflict, "error getting token for API while creating environment"))
- return
- }
- _, deleteErr = c.Repo().Environment().DeleteEnvironment(env)
- if deleteErr != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(deleteErr))
- return
- }
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- encoded, err := jwt.EncodeToken(c.Config().TokenConf)
- if err != nil {
- _, deleteErr := client.Repositories.DeleteHook(context.Background(), owner, name, hook.GetID())
- if deleteErr != nil {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("%v: %w", errGithubAPI, deleteErr),
- http.StatusConflict, "error encoding token while creating environment"))
- return
- }
- _, deleteErr = c.Repo().Environment().DeleteEnvironment(env)
- if deleteErr != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(deleteErr))
- return
- }
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- err = actions.SetupEnv(&actions.EnvOpts{
- Client: client,
- ServerURL: c.Config().ServerConf.ServerURL,
- PorterToken: encoded,
- GitRepoOwner: owner,
- GitRepoName: name,
- ProjectID: project.ID,
- ClusterID: cluster.ID,
- GitInstallationID: uint(ga.InstallationID),
- EnvironmentName: request.Name,
- InstanceName: c.Config().ServerConf.InstanceName,
- })
- if err != nil {
- unwrappedErr := errors.Unwrap(err)
- if unwrappedErr != nil {
- if errors.Is(unwrappedErr, actions.ErrProtectedBranch) {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusConflict))
- } else if errors.Is(unwrappedErr, actions.ErrCreatePRForProtectedBranch) {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusPreconditionFailed))
- }
- } else {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- }
- c.WriteResult(w, r, env.ToEnvironmentType())
- }
- func getGithubClientFromEnvironment(config *config.Config, env *models.Environment) (*github.Client, error) {
- // get the github app client
- ghAppId, err := strconv.Atoi(config.ServerConf.GithubAppID)
- if err != nil {
- return nil, err
- }
- // authenticate as github app installation
- itr, err := ghinstallation.New(
- http.DefaultTransport,
- int64(ghAppId),
- int64(env.GitInstallationID),
- config.ServerConf.GithubAppSecret,
- )
- if err != nil {
- return nil, err
- }
- return github.NewClient(&http.Client{Transport: itr}), nil
- }
- func getGithubWebhookURLFromUID(serverURL, webhookUID string) string {
- return fmt.Sprintf("%s/api/github/incoming_webhook/%s", serverURL, string(webhookUID))
- }
|