cluster.go 9.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445
  1. package gorm
  2. import (
  3. "github.com/porter-dev/porter/internal/encryption"
  4. "github.com/porter-dev/porter/internal/models"
  5. "github.com/porter-dev/porter/internal/repository"
  6. "gorm.io/gorm"
  7. ints "github.com/porter-dev/porter/internal/models/integrations"
  8. )
  9. // ClusterRepository uses gorm.DB for querying the database
  10. type ClusterRepository struct {
  11. db *gorm.DB
  12. key *[32]byte
  13. }
  14. // NewClusterRepository returns a ClusterRepository which uses
  15. // gorm.DB for querying the database. It accepts an encryption key to encrypt
  16. // sensitive data
  17. func NewClusterRepository(db *gorm.DB, key *[32]byte) repository.ClusterRepository {
  18. return &ClusterRepository{db, key}
  19. }
  20. // CreateClusterCandidate creates a new cluster candidate
  21. func (repo *ClusterRepository) CreateClusterCandidate(
  22. cc *models.ClusterCandidate,
  23. ) (*models.ClusterCandidate, error) {
  24. err := repo.EncryptClusterCandidateData(cc, repo.key)
  25. if err != nil {
  26. return nil, err
  27. }
  28. project := &models.Project{}
  29. if err := repo.db.Where("id = ?", cc.ProjectID).First(&project).Error; err != nil {
  30. return nil, err
  31. }
  32. assoc := repo.db.Model(&project).Association("ClusterCandidates")
  33. if assoc.Error != nil {
  34. return nil, assoc.Error
  35. }
  36. if err := assoc.Append(cc); err != nil {
  37. return nil, err
  38. }
  39. // decrypt at the end to return
  40. err = repo.DecryptClusterCandidateData(cc, repo.key)
  41. if err != nil {
  42. return nil, err
  43. }
  44. return cc, nil
  45. }
  46. // ReadClusterCandidate finds a cluster candidate by id
  47. func (repo *ClusterRepository) ReadClusterCandidate(
  48. projectID, ccID uint,
  49. ) (*models.ClusterCandidate, error) {
  50. cc := &models.ClusterCandidate{}
  51. if err := repo.db.Preload("Resolvers").Where("project_id = ? AND id = ?", projectID, ccID).First(&cc).Error; err != nil {
  52. return nil, err
  53. }
  54. repo.DecryptClusterCandidateData(cc, repo.key)
  55. return cc, nil
  56. }
  57. // ListClusterCandidatesByProjectID finds all cluster candidates
  58. // for a given project id
  59. func (repo *ClusterRepository) ListClusterCandidatesByProjectID(
  60. projectID uint,
  61. ) ([]*models.ClusterCandidate, error) {
  62. ccs := []*models.ClusterCandidate{}
  63. if err := repo.db.Preload("Resolvers").Where("project_id = ?", projectID).Find(&ccs).Error; err != nil {
  64. return nil, err
  65. }
  66. for _, cc := range ccs {
  67. repo.DecryptClusterCandidateData(cc, repo.key)
  68. }
  69. return ccs, nil
  70. }
  71. // UpdateClusterCandidateCreatedClusterID updates the CreatedClusterID for
  72. // a candidate, after the candidate has been resolved.
  73. func (repo *ClusterRepository) UpdateClusterCandidateCreatedClusterID(
  74. id uint,
  75. createdClusterID uint,
  76. ) (*models.ClusterCandidate, error) {
  77. cc := &models.ClusterCandidate{}
  78. if err := repo.db.Where("id = ?", id).First(&cc).Error; err != nil {
  79. return nil, err
  80. }
  81. cc.CreatedClusterID = createdClusterID
  82. if err := repo.db.Save(cc).Error; err != nil {
  83. return nil, err
  84. }
  85. repo.DecryptClusterCandidateData(cc, repo.key)
  86. return cc, nil
  87. }
  88. // CreateCluster creates a new cluster
  89. func (repo *ClusterRepository) CreateCluster(
  90. cluster *models.Cluster,
  91. ) (*models.Cluster, error) {
  92. err := repo.EncryptClusterData(cluster, repo.key)
  93. if err != nil {
  94. return nil, err
  95. }
  96. project := &models.Project{}
  97. if err := repo.db.Where("id = ?", cluster.ProjectID).First(&project).Error; err != nil {
  98. return nil, err
  99. }
  100. assoc := repo.db.Model(&project).Association("Clusters")
  101. if assoc.Error != nil {
  102. return nil, assoc.Error
  103. }
  104. if err := assoc.Append(cluster); err != nil {
  105. return nil, err
  106. }
  107. // create a token cache by default
  108. cluster.TokenCache.ClusterID = cluster.ID
  109. if err := repo.db.Create(&cluster.TokenCache).Error; err != nil {
  110. return nil, err
  111. }
  112. cluster.TokenCacheID = cluster.TokenCache.ID
  113. if err := repo.db.Save(cluster).Error; err != nil {
  114. return nil, err
  115. }
  116. err = repo.DecryptClusterData(cluster, repo.key)
  117. if err != nil {
  118. return nil, err
  119. }
  120. return cluster, nil
  121. }
  122. // ReadCluster finds a cluster by id
  123. func (repo *ClusterRepository) ReadCluster(
  124. projectID, clusterID uint,
  125. ) (*models.Cluster, error) {
  126. cluster := &models.Cluster{}
  127. // preload Clusters association
  128. if err := repo.db.Where("project_id = ? AND id = ?", projectID, clusterID).First(&cluster).Error; err != nil {
  129. return nil, err
  130. }
  131. cache := ints.ClusterTokenCache{}
  132. if cluster.TokenCacheID != 0 {
  133. if err := repo.db.Where("id = ?", cluster.TokenCacheID).First(&cache).Error; err != nil {
  134. return nil, err
  135. }
  136. }
  137. cluster.TokenCache = cache
  138. err := repo.DecryptClusterData(cluster, repo.key)
  139. if err != nil {
  140. return nil, err
  141. }
  142. return cluster, nil
  143. }
  144. // ReadCluster finds a cluster by id
  145. func (repo *ClusterRepository) ReadClusterByInfraID(
  146. projectID, infraID uint,
  147. ) (*models.Cluster, error) {
  148. cluster := &models.Cluster{}
  149. // preload Clusters association
  150. if err := repo.db.Where("project_id = ? AND infra_id = ?", projectID, infraID).First(&cluster).Error; err != nil {
  151. return nil, err
  152. }
  153. cache := ints.ClusterTokenCache{}
  154. if cluster.TokenCacheID != 0 {
  155. if err := repo.db.Where("id = ?", cluster.TokenCacheID).First(&cache).Error; err != nil {
  156. return nil, err
  157. }
  158. }
  159. cluster.TokenCache = cache
  160. err := repo.DecryptClusterData(cluster, repo.key)
  161. if err != nil {
  162. return nil, err
  163. }
  164. return cluster, nil
  165. }
  166. // ListClustersByProjectID finds all clusters
  167. // for a given project id
  168. func (repo *ClusterRepository) ListClustersByProjectID(
  169. projectID uint,
  170. ) ([]*models.Cluster, error) {
  171. clusters := []*models.Cluster{}
  172. if err := repo.db.Where("project_id = ?", projectID).Find(&clusters).Error; err != nil {
  173. return nil, err
  174. }
  175. for _, cluster := range clusters {
  176. repo.DecryptClusterData(cluster, repo.key)
  177. }
  178. return clusters, nil
  179. }
  180. // UpdateCluster modifies an existing Cluster in the database
  181. func (repo *ClusterRepository) UpdateCluster(
  182. cluster *models.Cluster,
  183. ) (*models.Cluster, error) {
  184. err := repo.EncryptClusterData(cluster, repo.key)
  185. if err != nil {
  186. return nil, err
  187. }
  188. if err := repo.db.Save(cluster).Error; err != nil {
  189. return nil, err
  190. }
  191. err = repo.DecryptClusterData(cluster, repo.key)
  192. if err != nil {
  193. return nil, err
  194. }
  195. return cluster, nil
  196. }
  197. // UpdateClusterTokenCache updates the token cache for a cluster
  198. func (repo *ClusterRepository) UpdateClusterTokenCache(
  199. tokenCache *ints.ClusterTokenCache,
  200. ) (*models.Cluster, error) {
  201. if tok := tokenCache.Token; len(tok) > 0 {
  202. cipherData, err := encryption.Encrypt(tok, repo.key)
  203. if err != nil {
  204. return nil, err
  205. }
  206. tokenCache.Token = cipherData
  207. }
  208. cluster := &models.Cluster{}
  209. if err := repo.db.Where("id = ?", tokenCache.ClusterID).First(&cluster).Error; err != nil {
  210. return nil, err
  211. }
  212. if cluster.TokenCacheID == 0 {
  213. tokenCache.ClusterID = cluster.ID
  214. if err := repo.db.Create(tokenCache).Error; err != nil {
  215. return nil, err
  216. }
  217. cluster.TokenCacheID = tokenCache.ID
  218. if err := repo.db.Save(cluster).Error; err != nil {
  219. return nil, err
  220. }
  221. } else {
  222. prev := &ints.ClusterTokenCache{}
  223. if err := repo.db.Where("id = ?", cluster.TokenCacheID).First(prev).Error; err != nil {
  224. return nil, err
  225. }
  226. prev.Token = tokenCache.Token
  227. prev.Expiry = tokenCache.Expiry
  228. prev.ClusterID = cluster.ID
  229. if err := repo.db.Save(prev).Error; err != nil {
  230. return nil, err
  231. }
  232. }
  233. return cluster, nil
  234. }
  235. // DeleteCluster removes a cluster from the db
  236. func (repo *ClusterRepository) DeleteCluster(
  237. cluster *models.Cluster,
  238. ) error {
  239. // clear TokenCache association
  240. if err := repo.db.Where("id = ?", cluster.TokenCacheID).Delete(&ints.ClusterTokenCache{}).Error; err != nil {
  241. return err
  242. }
  243. if err := repo.db.Where("id = ?", cluster.ID).Delete(&models.Cluster{}).Error; err != nil {
  244. return err
  245. }
  246. return nil
  247. }
  248. // EncryptClusterData will encrypt the user's service account data before writing
  249. // to the DB
  250. func (repo *ClusterRepository) EncryptClusterData(
  251. cluster *models.Cluster,
  252. key *[32]byte,
  253. ) error {
  254. if len(cluster.CertificateAuthorityData) > 0 {
  255. cipherData, err := encryption.Encrypt(cluster.CertificateAuthorityData, key)
  256. if err != nil {
  257. return err
  258. }
  259. cluster.CertificateAuthorityData = cipherData
  260. }
  261. if tok := cluster.TokenCache.Token; len(tok) > 0 {
  262. cipherData, err := encryption.Encrypt(tok, key)
  263. if err != nil {
  264. return err
  265. }
  266. cluster.TokenCache.Token = cipherData
  267. }
  268. return nil
  269. }
  270. // EncryptClusterCandidateData will encrypt the service account candidate data before
  271. // writing to the DB
  272. func (repo *ClusterRepository) EncryptClusterCandidateData(
  273. cc *models.ClusterCandidate,
  274. key *[32]byte,
  275. ) error {
  276. if len(cc.AWSClusterIDGuess) > 0 {
  277. cipherData, err := encryption.Encrypt(cc.AWSClusterIDGuess, key)
  278. if err != nil {
  279. return err
  280. }
  281. cc.AWSClusterIDGuess = cipherData
  282. }
  283. if len(cc.Kubeconfig) > 0 {
  284. cipherData, err := encryption.Encrypt(cc.Kubeconfig, key)
  285. if err != nil {
  286. return err
  287. }
  288. cc.Kubeconfig = cipherData
  289. }
  290. return nil
  291. }
  292. // DecryptClusterData will decrypt the user's service account data before
  293. // returning it from the DB
  294. func (repo *ClusterRepository) DecryptClusterData(
  295. cluster *models.Cluster,
  296. key *[32]byte,
  297. ) error {
  298. if len(cluster.CertificateAuthorityData) > 0 {
  299. plaintext, err := encryption.Decrypt(cluster.CertificateAuthorityData, key)
  300. if err != nil {
  301. return err
  302. }
  303. cluster.CertificateAuthorityData = plaintext
  304. }
  305. if tok := cluster.TokenCache.Token; len(tok) > 0 {
  306. plaintext, err := encryption.Decrypt(tok, key)
  307. // in the case that the token cache is down, set empty token
  308. if err != nil {
  309. cluster.TokenCache.Token = []byte{}
  310. } else {
  311. cluster.TokenCache.Token = plaintext
  312. }
  313. }
  314. return nil
  315. }
  316. // DecryptClusterCandidateData will decrypt the service account candidate data before
  317. // returning it from the DB
  318. func (repo *ClusterRepository) DecryptClusterCandidateData(
  319. cc *models.ClusterCandidate,
  320. key *[32]byte,
  321. ) error {
  322. if len(cc.AWSClusterIDGuess) > 0 {
  323. plaintext, err := encryption.Decrypt(cc.AWSClusterIDGuess, key)
  324. if err != nil {
  325. return err
  326. }
  327. cc.AWSClusterIDGuess = plaintext
  328. }
  329. if len(cc.Kubeconfig) > 0 {
  330. plaintext, err := encryption.Decrypt(cc.Kubeconfig, key)
  331. if err != nil {
  332. return err
  333. }
  334. cc.Kubeconfig = plaintext
  335. }
  336. return nil
  337. }