create.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615
  1. package release
  2. import (
  3. "context"
  4. "encoding/json"
  5. "errors"
  6. "fmt"
  7. "net/http"
  8. "strings"
  9. "time"
  10. "github.com/porter-dev/porter/api/server/authz"
  11. "github.com/porter-dev/porter/api/server/handlers"
  12. "github.com/porter-dev/porter/api/server/shared"
  13. "github.com/porter-dev/porter/api/server/shared/apierrors"
  14. "github.com/porter-dev/porter/api/server/shared/config"
  15. "github.com/porter-dev/porter/api/types"
  16. "github.com/porter-dev/porter/internal/analytics"
  17. "github.com/porter-dev/porter/internal/auth/token"
  18. "github.com/porter-dev/porter/internal/encryption"
  19. "github.com/porter-dev/porter/internal/helm"
  20. "github.com/porter-dev/porter/internal/helm/loader"
  21. "github.com/porter-dev/porter/internal/helm/repo"
  22. "github.com/porter-dev/porter/internal/integrations/ci/actions"
  23. "github.com/porter-dev/porter/internal/integrations/ci/gitlab"
  24. "github.com/porter-dev/porter/internal/models"
  25. "github.com/porter-dev/porter/internal/oauth"
  26. "github.com/porter-dev/porter/internal/registry"
  27. "github.com/stefanmcshane/helm/pkg/release"
  28. "golang.org/x/crypto/bcrypt"
  29. "gopkg.in/yaml.v2"
  30. v1 "k8s.io/api/core/v1"
  31. )
  32. type CreateReleaseHandler struct {
  33. handlers.PorterHandlerReadWriter
  34. authz.KubernetesAgentGetter
  35. }
  36. func NewCreateReleaseHandler(
  37. config *config.Config,
  38. decoderValidator shared.RequestDecoderValidator,
  39. writer shared.ResultWriter,
  40. ) *CreateReleaseHandler {
  41. return &CreateReleaseHandler{
  42. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  43. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  44. }
  45. }
  46. func (c *CreateReleaseHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  47. ctx := r.Context()
  48. user, _ := ctx.Value(types.UserScope).(*models.User)
  49. cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster)
  50. namespace := ctx.Value(types.NamespaceScope).(string)
  51. operationID := oauth.CreateRandomState()
  52. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchStartTrack(
  53. &analytics.ApplicationLaunchStartTrackOpts{
  54. ClusterScopedTrackOpts: analytics.GetClusterScopedTrackOpts(user.ID, cluster.ProjectID, cluster.ID),
  55. FlowID: operationID,
  56. },
  57. ))
  58. helmAgent, err := c.GetHelmAgent(r, cluster, "")
  59. if err != nil {
  60. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error getting helm agent: %w", err)))
  61. return
  62. }
  63. request := &types.CreateReleaseRequest{}
  64. if ok := c.DecodeAndValidate(w, r, request); !ok {
  65. return
  66. }
  67. if request.RepoURL == "" {
  68. request.RepoURL = c.Config().ServerConf.DefaultApplicationHelmRepoURL
  69. }
  70. // if the repo url is not an addon or application url, validate against the helm repos
  71. if request.RepoURL != c.Config().ServerConf.DefaultAddonHelmRepoURL && request.RepoURL != c.Config().ServerConf.DefaultApplicationHelmRepoURL {
  72. // load the helm repos in the project
  73. hrs, err := c.Repo().HelmRepo().ListHelmReposByProjectID(cluster.ProjectID)
  74. if err != nil {
  75. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error listing helm repos for project : %w", err)))
  76. return
  77. }
  78. isValid := repo.ValidateRepoURL(c.Config().ServerConf.DefaultAddonHelmRepoURL, c.Config().ServerConf.DefaultApplicationHelmRepoURL, hrs, request.RepoURL)
  79. if !isValid {
  80. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  81. fmt.Errorf("invalid repo_url parameter"),
  82. http.StatusBadRequest,
  83. ))
  84. return
  85. }
  86. }
  87. if request.TemplateVersion == "latest" {
  88. request.TemplateVersion = ""
  89. }
  90. chart, err := loader.LoadChartPublic(request.RepoURL, request.TemplateName, request.TemplateVersion)
  91. if err != nil {
  92. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error loading public chart: %w", err)))
  93. return
  94. }
  95. registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  96. if err != nil {
  97. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error listing registries: %w", err)))
  98. return
  99. }
  100. conf := &helm.InstallChartConfig{
  101. Chart: chart,
  102. Name: request.Name,
  103. Namespace: namespace,
  104. Values: request.Values,
  105. Cluster: cluster,
  106. Repo: c.Repo(),
  107. Registries: registries,
  108. }
  109. helmRelease, err := helmAgent.InstallChart(conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection)
  110. if err != nil {
  111. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  112. fmt.Errorf("error installing a new chart: %s", err.Error()),
  113. http.StatusBadRequest,
  114. ))
  115. return
  116. }
  117. k8sAgent, err := c.GetAgent(r, cluster, "")
  118. if err != nil {
  119. c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error getting k8s agent: %w", err)))
  120. return
  121. }
  122. configMaps := make([]*v1.ConfigMap, 0)
  123. if request.SyncedEnvGroups != nil && len(request.SyncedEnvGroups) > 0 {
  124. for _, envGroupName := range request.SyncedEnvGroups {
  125. // read the attached configmap
  126. cm, _, err := k8sAgent.GetLatestVersionedConfigMap(envGroupName, namespace)
  127. if err != nil {
  128. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("Couldn't find the env group"), http.StatusNotFound))
  129. return
  130. }
  131. configMaps = append(configMaps, cm)
  132. }
  133. }
  134. release, err := CreateAppReleaseFromHelmRelease(c.Config(), cluster.ProjectID, cluster.ID, 0, helmRelease)
  135. if err != nil {
  136. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  137. return
  138. }
  139. if len(configMaps) > 0 {
  140. for _, cm := range configMaps {
  141. _, err = k8sAgent.AddApplicationToVersionedConfigMap(cm, release.Name)
  142. if err != nil {
  143. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(fmt.Errorf("Couldn't add %s to the config map %s", release.Name, cm.Name)))
  144. }
  145. }
  146. }
  147. if request.Tags != nil {
  148. tags, err := c.Repo().Tag().LinkTagsToRelease(request.Tags, release)
  149. if err == nil {
  150. release.Tags = append(release.Tags, tags...)
  151. }
  152. }
  153. if request.BuildConfig != nil {
  154. _, err = createBuildConfig(c.Config(), release, request.BuildConfig)
  155. }
  156. if err != nil {
  157. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  158. return
  159. }
  160. if request.GitActionConfig != nil {
  161. _, _, err := createGitAction(
  162. ctx,
  163. c.Config(),
  164. user.ID,
  165. cluster.ProjectID,
  166. cluster.ID,
  167. request.GitActionConfig,
  168. request.Name,
  169. namespace,
  170. release,
  171. )
  172. if err != nil {
  173. unwrappedErr := errors.Unwrap(err)
  174. if unwrappedErr != nil {
  175. if errors.Is(unwrappedErr, actions.ErrProtectedBranch) {
  176. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusConflict))
  177. } else if errors.Is(unwrappedErr, actions.ErrCreatePRForProtectedBranch) {
  178. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusPreconditionFailed))
  179. }
  180. } else {
  181. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  182. return
  183. }
  184. }
  185. }
  186. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchSuccessTrack(
  187. &analytics.ApplicationLaunchSuccessTrackOpts{
  188. ApplicationScopedTrackOpts: analytics.GetApplicationScopedTrackOpts(
  189. user.ID,
  190. cluster.ProjectID,
  191. cluster.ID,
  192. release.Name,
  193. release.Namespace,
  194. chart.Metadata.Name,
  195. ),
  196. FlowID: operationID,
  197. },
  198. ))
  199. w.WriteHeader(http.StatusCreated)
  200. }
  201. func CreateAppReleaseFromHelmRelease(
  202. config *config.Config,
  203. projectID, clusterID, stackResourceID uint,
  204. helmRelease *release.Release,
  205. ) (*models.Release, error) {
  206. token, err := encryption.GenerateRandomBytes(16)
  207. if err != nil {
  208. return nil, err
  209. }
  210. // create release with webhook token in db
  211. image, ok := helmRelease.Config["image"].(map[string]interface{})
  212. if !ok {
  213. return nil, fmt.Errorf("Could not find field image in config")
  214. }
  215. repository := image["repository"]
  216. repoStr, ok := repository.(string)
  217. if !ok {
  218. return nil, fmt.Errorf("Could not find field repository in config")
  219. }
  220. release := &models.Release{
  221. ClusterID: clusterID,
  222. ProjectID: projectID,
  223. Namespace: helmRelease.Namespace,
  224. Name: helmRelease.Name,
  225. WebhookToken: token,
  226. ImageRepoURI: repoStr,
  227. StackResourceID: stackResourceID,
  228. }
  229. return config.Repo.Release().CreateRelease(release)
  230. }
  231. func CreateAddonReleaseFromHelmRelease(
  232. config *config.Config,
  233. projectID, clusterID, stackResourceID uint,
  234. helmRelease *release.Release,
  235. ) (*models.Release, error) {
  236. release := &models.Release{
  237. ClusterID: clusterID,
  238. ProjectID: projectID,
  239. Namespace: helmRelease.Namespace,
  240. Name: helmRelease.Name,
  241. StackResourceID: stackResourceID,
  242. }
  243. return config.Repo.Release().CreateRelease(release)
  244. }
  245. func createGitAction(
  246. ctx context.Context,
  247. config *config.Config,
  248. userID, projectID, clusterID uint,
  249. request *types.CreateGitActionConfigRequest,
  250. name, namespace string,
  251. release *models.Release,
  252. ) (*types.GitActionConfig, []byte, error) {
  253. // if the registry was provisioned through Porter, create a repository if necessary
  254. if release != nil && request.RegistryID != 0 {
  255. // read the registry
  256. reg, err := config.Repo.Registry().ReadRegistry(projectID, request.RegistryID)
  257. if err != nil {
  258. return nil, nil, err
  259. }
  260. _reg := registry.Registry(*reg)
  261. regAPI := &_reg
  262. // parse the name from the registry
  263. nameSpl := strings.Split(request.ImageRepoURI, "/")
  264. repoName := nameSpl[len(nameSpl)-1]
  265. err = regAPI.CreateRepository(ctx, config, repoName)
  266. if err != nil {
  267. return nil, nil, err
  268. }
  269. }
  270. isDryRun := release == nil
  271. repoSplit := strings.Split(request.GitRepo, "/")
  272. if len(repoSplit) != 2 {
  273. return nil, nil, fmt.Errorf("invalid formatting of repo name")
  274. }
  275. encoded := ""
  276. var err error
  277. // if this isn't a dry run, generate the token
  278. if !isDryRun {
  279. encoded, err = getToken(config, userID, projectID, clusterID, request)
  280. if err != nil {
  281. return nil, nil, err
  282. }
  283. }
  284. var workflowYAML []byte
  285. var gitErr error
  286. if request.GitlabIntegrationID != 0 {
  287. giRunner := &gitlab.GitlabCI{
  288. ServerURL: config.ServerConf.ServerURL,
  289. GitRepoOwner: repoSplit[0],
  290. GitRepoName: repoSplit[1],
  291. GitBranch: request.GitBranch,
  292. Repo: config.Repo,
  293. ProjectID: projectID,
  294. ClusterID: clusterID,
  295. UserID: userID,
  296. IntegrationID: request.GitlabIntegrationID,
  297. PorterConf: config,
  298. ReleaseName: name,
  299. ReleaseNamespace: namespace,
  300. FolderPath: request.FolderPath,
  301. PorterToken: encoded,
  302. }
  303. gitErr = giRunner.Setup()
  304. } else {
  305. // create the commit in the git repo
  306. gaRunner := &actions.GithubActions{
  307. InstanceName: config.ServerConf.InstanceName,
  308. ServerURL: config.ServerConf.ServerURL,
  309. GithubOAuthIntegration: nil,
  310. GithubAppID: config.GithubAppConf.AppID,
  311. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  312. GithubInstallationID: request.GitRepoID,
  313. GitRepoName: repoSplit[1],
  314. GitRepoOwner: repoSplit[0],
  315. Repo: config.Repo,
  316. ProjectID: projectID,
  317. ClusterID: clusterID,
  318. ReleaseName: name,
  319. ReleaseNamespace: namespace,
  320. GitBranch: request.GitBranch,
  321. DockerFilePath: request.DockerfilePath,
  322. FolderPath: request.FolderPath,
  323. ImageRepoURL: request.ImageRepoURI,
  324. PorterToken: encoded,
  325. Version: "v0.1.0",
  326. ShouldCreateWorkflow: request.ShouldCreateWorkflow,
  327. DryRun: release == nil,
  328. }
  329. // Save the github err for after creating the git action config. However, we
  330. // need to call Setup() in order to get the workflow file before writing the
  331. // action config, in the case of a dry run, since the dry run does not create
  332. // a git action config.
  333. workflowYAML, gitErr = gaRunner.Setup()
  334. if gaRunner.DryRun {
  335. if gitErr != nil {
  336. return nil, nil, gitErr
  337. }
  338. return nil, workflowYAML, nil
  339. }
  340. }
  341. // handle write to the database
  342. ga, err := config.Repo.GitActionConfig().CreateGitActionConfig(&models.GitActionConfig{
  343. ReleaseID: release.ID,
  344. GitRepo: request.GitRepo,
  345. GitBranch: request.GitBranch,
  346. ImageRepoURI: request.ImageRepoURI,
  347. GitRepoID: request.GitRepoID,
  348. GitlabIntegrationID: request.GitlabIntegrationID,
  349. DockerfilePath: request.DockerfilePath,
  350. FolderPath: request.FolderPath,
  351. IsInstallation: true,
  352. Version: "v0.1.0",
  353. })
  354. if err != nil {
  355. return nil, nil, err
  356. }
  357. // update the release in the db with the image repo uri
  358. release.ImageRepoURI = ga.ImageRepoURI
  359. _, err = config.Repo.Release().UpdateRelease(release)
  360. if err != nil {
  361. return nil, nil, err
  362. }
  363. return ga.ToGitActionConfigType(), workflowYAML, gitErr
  364. }
  365. func getToken(
  366. config *config.Config,
  367. userID, projectID, clusterID uint,
  368. request *types.CreateGitActionConfigRequest,
  369. ) (string, error) {
  370. // create a policy for the token
  371. policy := []*types.PolicyDocument{
  372. {
  373. Scope: types.ProjectScope,
  374. Verbs: types.ReadWriteVerbGroup(),
  375. Children: map[types.PermissionScope]*types.PolicyDocument{
  376. types.ClusterScope: {
  377. Scope: types.ClusterScope,
  378. Verbs: types.ReadWriteVerbGroup(),
  379. },
  380. types.RegistryScope: {
  381. Scope: types.RegistryScope,
  382. Verbs: types.ReadVerbGroup(),
  383. },
  384. types.HelmRepoScope: {
  385. Scope: types.HelmRepoScope,
  386. Verbs: types.ReadVerbGroup(),
  387. },
  388. },
  389. },
  390. }
  391. uid, err := encryption.GenerateRandomBytes(16)
  392. if err != nil {
  393. return "", err
  394. }
  395. policyBytes, err := json.Marshal(policy)
  396. if err != nil {
  397. return "", err
  398. }
  399. policyModel := &models.Policy{
  400. ProjectID: projectID,
  401. UniqueID: uid,
  402. CreatedByUserID: userID,
  403. Name: strings.ToLower(fmt.Sprintf("repo-%s-token-policy", request.GitRepo)),
  404. PolicyBytes: policyBytes,
  405. }
  406. policyModel, err = config.Repo.Policy().CreatePolicy(policyModel)
  407. if err != nil {
  408. return "", err
  409. }
  410. // create the token in the database
  411. tokenUID, err := encryption.GenerateRandomBytes(16)
  412. if err != nil {
  413. return "", err
  414. }
  415. secretKey, err := encryption.GenerateRandomBytes(16)
  416. if err != nil {
  417. return "", err
  418. }
  419. // hash the secret key for storage in the db
  420. hashedToken, err := bcrypt.GenerateFromPassword([]byte(secretKey), 8)
  421. if err != nil {
  422. return "", err
  423. }
  424. expiresAt := time.Now().Add(time.Hour * 24 * 365)
  425. apiToken := &models.APIToken{
  426. UniqueID: tokenUID,
  427. ProjectID: projectID,
  428. CreatedByUserID: userID,
  429. Expiry: &expiresAt,
  430. Revoked: false,
  431. PolicyUID: policyModel.UniqueID,
  432. PolicyName: policyModel.Name,
  433. Name: strings.ToLower(fmt.Sprintf("repo-%s-token", request.GitRepo)),
  434. SecretKey: hashedToken,
  435. }
  436. apiToken, err = config.Repo.APIToken().CreateAPIToken(apiToken)
  437. if err != nil {
  438. return "", err
  439. }
  440. // generate porter jwt token
  441. jwt, err := token.GetStoredTokenForAPI(userID, projectID, apiToken.UniqueID, secretKey)
  442. if err != nil {
  443. return "", err
  444. }
  445. return jwt.EncodeToken(config.TokenConf)
  446. }
  447. func createBuildConfig(
  448. config *config.Config,
  449. release *models.Release,
  450. bcRequest *types.CreateBuildConfigRequest,
  451. ) (*types.BuildConfig, error) {
  452. data, err := json.Marshal(bcRequest.Config)
  453. if err != nil {
  454. return nil, err
  455. }
  456. // handle write to the database
  457. bc, err := config.Repo.BuildConfig().CreateBuildConfig(&models.BuildConfig{
  458. Builder: bcRequest.Builder,
  459. Buildpacks: strings.Join(bcRequest.Buildpacks, ","),
  460. Config: data,
  461. })
  462. if err != nil {
  463. return nil, err
  464. }
  465. release.BuildConfig = bc.ID
  466. _, err = config.Repo.Release().UpdateRelease(release)
  467. if err != nil {
  468. return nil, err
  469. }
  470. return bc.ToBuildConfigType(), nil
  471. }
  472. type containerEnvConfig struct {
  473. Container struct {
  474. Env struct {
  475. Normal map[string]string `yaml:"normal"`
  476. } `yaml:"env"`
  477. } `yaml:"container"`
  478. }
  479. func GetGARunner(
  480. config *config.Config,
  481. userID, projectID, clusterID uint,
  482. ga *models.GitActionConfig,
  483. name, namespace string,
  484. release *models.Release,
  485. helmRelease *release.Release,
  486. ) (*actions.GithubActions, error) {
  487. cEnv := &containerEnvConfig{}
  488. rawValues, err := yaml.Marshal(helmRelease.Config)
  489. if err == nil {
  490. err = yaml.Unmarshal(rawValues, cEnv)
  491. // if unmarshal error, just set to empty map
  492. if err != nil {
  493. cEnv.Container.Env.Normal = make(map[string]string)
  494. }
  495. }
  496. repoSplit := strings.Split(ga.GitRepo, "/")
  497. if len(repoSplit) != 2 {
  498. return nil, fmt.Errorf("invalid formatting of repo name")
  499. }
  500. // create the commit in the git repo
  501. return &actions.GithubActions{
  502. ServerURL: config.ServerConf.ServerURL,
  503. GithubOAuthIntegration: nil,
  504. BuildEnv: cEnv.Container.Env.Normal,
  505. GithubAppID: config.GithubAppConf.AppID,
  506. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  507. GithubInstallationID: ga.GitRepoID,
  508. GitRepoName: repoSplit[1],
  509. GitRepoOwner: repoSplit[0],
  510. Repo: config.Repo,
  511. ProjectID: projectID,
  512. ClusterID: clusterID,
  513. ReleaseName: name,
  514. GitBranch: ga.GitBranch,
  515. DockerFilePath: ga.DockerfilePath,
  516. FolderPath: ga.FolderPath,
  517. ImageRepoURL: ga.ImageRepoURI,
  518. Version: "v0.1.0",
  519. }, nil
  520. }