create.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629
  1. package release
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "fmt"
  6. "net/http"
  7. "strings"
  8. "time"
  9. "github.com/porter-dev/porter/api/server/authz"
  10. "github.com/porter-dev/porter/api/server/handlers"
  11. "github.com/porter-dev/porter/api/server/shared"
  12. "github.com/porter-dev/porter/api/server/shared/apierrors"
  13. "github.com/porter-dev/porter/api/server/shared/config"
  14. "github.com/porter-dev/porter/api/types"
  15. "github.com/porter-dev/porter/internal/analytics"
  16. "github.com/porter-dev/porter/internal/auth/token"
  17. "github.com/porter-dev/porter/internal/encryption"
  18. "github.com/porter-dev/porter/internal/helm"
  19. "github.com/porter-dev/porter/internal/helm/loader"
  20. "github.com/porter-dev/porter/internal/helm/repo"
  21. "github.com/porter-dev/porter/internal/integrations/ci/actions"
  22. "github.com/porter-dev/porter/internal/integrations/ci/gitlab"
  23. "github.com/porter-dev/porter/internal/models"
  24. "github.com/porter-dev/porter/internal/oauth"
  25. "github.com/porter-dev/porter/internal/registry"
  26. "github.com/stefanmcshane/helm/pkg/release"
  27. "golang.org/x/crypto/bcrypt"
  28. "gopkg.in/yaml.v2"
  29. v1 "k8s.io/api/core/v1"
  30. )
  31. type CreateReleaseHandler struct {
  32. handlers.PorterHandlerReadWriter
  33. authz.KubernetesAgentGetter
  34. }
  35. func NewCreateReleaseHandler(
  36. config *config.Config,
  37. decoderValidator shared.RequestDecoderValidator,
  38. writer shared.ResultWriter,
  39. ) *CreateReleaseHandler {
  40. return &CreateReleaseHandler{
  41. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  42. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  43. }
  44. }
  45. func (c *CreateReleaseHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  46. user, _ := r.Context().Value(types.UserScope).(*models.User)
  47. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  48. namespace := r.Context().Value(types.NamespaceScope).(string)
  49. operationID := oauth.CreateRandomState()
  50. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchStartTrack(
  51. &analytics.ApplicationLaunchStartTrackOpts{
  52. ClusterScopedTrackOpts: analytics.GetClusterScopedTrackOpts(user.ID, cluster.ProjectID, cluster.ID),
  53. FlowID: operationID,
  54. },
  55. ))
  56. helmAgent, err := c.GetHelmAgent(r, cluster, "")
  57. if err != nil {
  58. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  59. return
  60. }
  61. request := &types.CreateReleaseRequest{}
  62. if ok := c.DecodeAndValidate(w, r, request); !ok {
  63. return
  64. }
  65. if request.RepoURL == "" {
  66. request.RepoURL = c.Config().ServerConf.DefaultApplicationHelmRepoURL
  67. }
  68. // if the repo url is not an addon or application url, validate against the helm repos
  69. if request.RepoURL != c.Config().ServerConf.DefaultAddonHelmRepoURL && request.RepoURL != c.Config().ServerConf.DefaultApplicationHelmRepoURL {
  70. // load the helm repos in the project
  71. hrs, err := c.Repo().HelmRepo().ListHelmReposByProjectID(cluster.ProjectID)
  72. if err != nil {
  73. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  74. return
  75. }
  76. isValid := repo.ValidateRepoURL(c.Config().ServerConf.DefaultAddonHelmRepoURL, c.Config().ServerConf.DefaultApplicationHelmRepoURL, hrs, request.RepoURL)
  77. if !isValid {
  78. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  79. fmt.Errorf("invalid repo_url parameter"),
  80. http.StatusBadRequest,
  81. ))
  82. return
  83. }
  84. }
  85. if request.TemplateVersion == "latest" {
  86. request.TemplateVersion = ""
  87. }
  88. chart, err := loader.LoadChartPublic(request.RepoURL, request.TemplateName, request.TemplateVersion)
  89. if err != nil {
  90. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  91. return
  92. }
  93. registries, err := c.Repo().Registry().ListRegistriesByProjectID(cluster.ProjectID)
  94. if err != nil {
  95. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  96. return
  97. }
  98. conf := &helm.InstallChartConfig{
  99. Chart: chart,
  100. Name: request.Name,
  101. Namespace: namespace,
  102. Values: request.Values,
  103. Cluster: cluster,
  104. Repo: c.Repo(),
  105. Registries: registries,
  106. }
  107. helmRelease, err := helmAgent.InstallChart(conf, c.Config().DOConf, c.Config().ServerConf.DisablePullSecretsInjection)
  108. if err != nil {
  109. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  110. fmt.Errorf("error installing a new chart: %s", err.Error()),
  111. http.StatusBadRequest,
  112. ))
  113. return
  114. }
  115. k8sAgent, err := c.GetAgent(r, cluster, "")
  116. if err != nil {
  117. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  118. return
  119. }
  120. configMaps := make([]*v1.ConfigMap, 0)
  121. if request.SyncedEnvGroups != nil && len(request.SyncedEnvGroups) > 0 {
  122. for _, envGroupName := range request.SyncedEnvGroups {
  123. // read the attached configmap
  124. cm, _, err := k8sAgent.GetLatestVersionedConfigMap(envGroupName, namespace)
  125. if err != nil {
  126. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(fmt.Errorf("Couldn't find the env group"), http.StatusNotFound))
  127. return
  128. }
  129. configMaps = append(configMaps, cm)
  130. }
  131. }
  132. release, err := CreateAppReleaseFromHelmRelease(c.Config(), cluster.ProjectID, cluster.ID, 0, helmRelease)
  133. if err != nil {
  134. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  135. return
  136. }
  137. if len(configMaps) > 0 {
  138. for _, cm := range configMaps {
  139. _, err = k8sAgent.AddApplicationToVersionedConfigMap(cm, release.Name)
  140. if err != nil {
  141. c.HandleAPIErrorNoWrite(w, r, apierrors.NewErrInternal(fmt.Errorf("Couldn't add %s to the config map %s", release.Name, cm.Name)))
  142. }
  143. }
  144. }
  145. if request.Tags != nil {
  146. tags, err := c.Repo().Tag().LinkTagsToRelease(request.Tags, release)
  147. if err == nil {
  148. release.Tags = append(release.Tags, tags...)
  149. }
  150. }
  151. if request.BuildConfig != nil {
  152. _, err = createBuildConfig(c.Config(), release, request.BuildConfig)
  153. }
  154. if err != nil {
  155. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  156. return
  157. }
  158. if request.GitActionConfig != nil {
  159. _, _, err := createGitAction(
  160. c.Config(),
  161. user.ID,
  162. cluster.ProjectID,
  163. cluster.ID,
  164. request.GitActionConfig,
  165. request.Name,
  166. namespace,
  167. release,
  168. )
  169. if err != nil {
  170. unwrappedErr := errors.Unwrap(err)
  171. if unwrappedErr != nil {
  172. if errors.Is(unwrappedErr, actions.ErrProtectedBranch) {
  173. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusConflict))
  174. } else if errors.Is(unwrappedErr, actions.ErrCreatePRForProtectedBranch) {
  175. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusPreconditionFailed))
  176. }
  177. } else {
  178. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  179. return
  180. }
  181. }
  182. }
  183. c.Config().AnalyticsClient.Track(analytics.ApplicationLaunchSuccessTrack(
  184. &analytics.ApplicationLaunchSuccessTrackOpts{
  185. ApplicationScopedTrackOpts: analytics.GetApplicationScopedTrackOpts(
  186. user.ID,
  187. cluster.ProjectID,
  188. cluster.ID,
  189. release.Name,
  190. release.Namespace,
  191. chart.Metadata.Name,
  192. ),
  193. FlowID: operationID,
  194. },
  195. ))
  196. w.WriteHeader(http.StatusCreated)
  197. }
  198. func CreateAppReleaseFromHelmRelease(
  199. config *config.Config,
  200. projectID, clusterID, stackResourceID uint,
  201. helmRelease *release.Release,
  202. ) (*models.Release, error) {
  203. token, err := encryption.GenerateRandomBytes(16)
  204. if err != nil {
  205. return nil, err
  206. }
  207. // create release with webhook token in db
  208. image, ok := helmRelease.Config["image"].(map[string]interface{})
  209. if !ok {
  210. return nil, fmt.Errorf("Could not find field image in config")
  211. }
  212. repository := image["repository"]
  213. repoStr, ok := repository.(string)
  214. if !ok {
  215. return nil, fmt.Errorf("Could not find field repository in config")
  216. }
  217. release := &models.Release{
  218. ClusterID: clusterID,
  219. ProjectID: projectID,
  220. Namespace: helmRelease.Namespace,
  221. Name: helmRelease.Name,
  222. WebhookToken: token,
  223. ImageRepoURI: repoStr,
  224. StackResourceID: stackResourceID,
  225. }
  226. return config.Repo.Release().CreateRelease(release)
  227. }
  228. func CreateAddonReleaseFromHelmRelease(
  229. config *config.Config,
  230. projectID, clusterID, stackResourceID uint,
  231. helmRelease *release.Release,
  232. ) (*models.Release, error) {
  233. release := &models.Release{
  234. ClusterID: clusterID,
  235. ProjectID: projectID,
  236. Namespace: helmRelease.Namespace,
  237. Name: helmRelease.Name,
  238. StackResourceID: stackResourceID,
  239. }
  240. return config.Repo.Release().CreateRelease(release)
  241. }
  242. func createGitAction(
  243. config *config.Config,
  244. userID, projectID, clusterID uint,
  245. request *types.CreateGitActionConfigRequest,
  246. name, namespace string,
  247. release *models.Release,
  248. ) (*types.GitActionConfig, []byte, error) {
  249. // if the registry was provisioned through Porter, create a repository if necessary
  250. if release != nil && request.RegistryID != 0 {
  251. // read the registry
  252. reg, err := config.Repo.Registry().ReadRegistry(projectID, request.RegistryID)
  253. if err != nil {
  254. return nil, nil, err
  255. }
  256. _reg := registry.Registry(*reg)
  257. regAPI := &_reg
  258. // parse the name from the registry
  259. nameSpl := strings.Split(request.ImageRepoURI, "/")
  260. repoName := nameSpl[len(nameSpl)-1]
  261. err = regAPI.CreateRepository(config.Repo, repoName)
  262. if err != nil {
  263. return nil, nil, err
  264. }
  265. }
  266. isDryRun := release == nil
  267. repoSplit := strings.Split(request.GitRepo, "/")
  268. if len(repoSplit) != 2 {
  269. return nil, nil, fmt.Errorf("invalid formatting of repo name")
  270. }
  271. encoded := ""
  272. var err error
  273. // if this isn't a dry run, generate the token
  274. if !isDryRun {
  275. encoded, err = getToken(config, userID, projectID, clusterID, request)
  276. if err != nil {
  277. return nil, nil, err
  278. }
  279. }
  280. var workflowYAML []byte
  281. var gitErr error
  282. if request.GitlabIntegrationID != 0 {
  283. giRunner := &gitlab.GitlabCI{
  284. ServerURL: config.ServerConf.ServerURL,
  285. GitRepoOwner: repoSplit[0],
  286. GitRepoName: repoSplit[1],
  287. GitBranch: request.GitBranch,
  288. Repo: config.Repo,
  289. ProjectID: projectID,
  290. ClusterID: clusterID,
  291. UserID: userID,
  292. IntegrationID: request.GitlabIntegrationID,
  293. PorterConf: config,
  294. ReleaseName: name,
  295. ReleaseNamespace: namespace,
  296. FolderPath: request.FolderPath,
  297. PorterToken: encoded,
  298. }
  299. gitErr = giRunner.Setup()
  300. } else {
  301. // create the commit in the git repo
  302. gaRunner := &actions.GithubActions{
  303. InstanceName: config.ServerConf.InstanceName,
  304. ServerURL: config.ServerConf.ServerURL,
  305. GithubOAuthIntegration: nil,
  306. GithubAppID: config.GithubAppConf.AppID,
  307. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  308. GithubInstallationID: request.GitRepoID,
  309. GitRepoName: repoSplit[1],
  310. GitRepoOwner: repoSplit[0],
  311. Repo: config.Repo,
  312. ProjectID: projectID,
  313. ClusterID: clusterID,
  314. ReleaseName: name,
  315. ReleaseNamespace: namespace,
  316. GitBranch: request.GitBranch,
  317. DockerFilePath: request.DockerfilePath,
  318. FolderPath: request.FolderPath,
  319. ImageRepoURL: request.ImageRepoURI,
  320. PorterToken: encoded,
  321. Version: "v0.1.0",
  322. ShouldCreateWorkflow: request.ShouldCreateWorkflow,
  323. DryRun: release == nil,
  324. }
  325. // Save the github err for after creating the git action config. However, we
  326. // need to call Setup() in order to get the workflow file before writing the
  327. // action config, in the case of a dry run, since the dry run does not create
  328. // a git action config.
  329. workflowYAML, gitErr = gaRunner.Setup()
  330. if gaRunner.DryRun {
  331. if gitErr != nil {
  332. return nil, nil, gitErr
  333. }
  334. return nil, workflowYAML, nil
  335. }
  336. }
  337. // handle write to the database
  338. ga, err := config.Repo.GitActionConfig().CreateGitActionConfig(&models.GitActionConfig{
  339. ReleaseID: release.ID,
  340. GitRepo: request.GitRepo,
  341. GitBranch: request.GitBranch,
  342. ImageRepoURI: request.ImageRepoURI,
  343. GitRepoID: request.GitRepoID,
  344. GitlabIntegrationID: request.GitlabIntegrationID,
  345. DockerfilePath: request.DockerfilePath,
  346. FolderPath: request.FolderPath,
  347. IsInstallation: true,
  348. Version: "v0.1.0",
  349. })
  350. if err != nil {
  351. return nil, nil, err
  352. }
  353. // update the release in the db with the image repo uri
  354. release.ImageRepoURI = ga.ImageRepoURI
  355. _, err = config.Repo.Release().UpdateRelease(release)
  356. if err != nil {
  357. return nil, nil, err
  358. }
  359. return ga.ToGitActionConfigType(), workflowYAML, gitErr
  360. }
  361. func getToken(
  362. config *config.Config,
  363. userID, projectID, clusterID uint,
  364. request *types.CreateGitActionConfigRequest,
  365. ) (string, error) {
  366. // create a policy for the token
  367. policy := []*types.PolicyDocument{
  368. {
  369. Scope: types.ProjectScope,
  370. Verbs: types.ReadWriteVerbGroup(),
  371. Children: map[types.PermissionScope]*types.PolicyDocument{
  372. types.ClusterScope: {
  373. Scope: types.ClusterScope,
  374. Verbs: types.ReadWriteVerbGroup(),
  375. },
  376. types.RegistryScope: {
  377. Scope: types.RegistryScope,
  378. Verbs: types.ReadVerbGroup(),
  379. },
  380. types.HelmRepoScope: {
  381. Scope: types.HelmRepoScope,
  382. Verbs: types.ReadVerbGroup(),
  383. },
  384. },
  385. },
  386. }
  387. uid, err := encryption.GenerateRandomBytes(16)
  388. if err != nil {
  389. return "", err
  390. }
  391. policyBytes, err := json.Marshal(policy)
  392. if err != nil {
  393. return "", err
  394. }
  395. policyModel := &models.Policy{
  396. ProjectID: projectID,
  397. UniqueID: uid,
  398. CreatedByUserID: userID,
  399. Name: strings.ToLower(fmt.Sprintf("repo-%s-token-policy", request.GitRepo)),
  400. PolicyBytes: policyBytes,
  401. }
  402. policyModel, err = config.Repo.Policy().CreatePolicy(policyModel)
  403. if err != nil {
  404. return "", err
  405. }
  406. // create the token in the database
  407. tokenUID, err := encryption.GenerateRandomBytes(16)
  408. if err != nil {
  409. return "", err
  410. }
  411. secretKey, err := encryption.GenerateRandomBytes(16)
  412. if err != nil {
  413. return "", err
  414. }
  415. // hash the secret key for storage in the db
  416. hashedToken, err := bcrypt.GenerateFromPassword([]byte(secretKey), 8)
  417. if err != nil {
  418. return "", err
  419. }
  420. expiresAt := time.Now().Add(time.Hour * 24 * 365)
  421. apiToken := &models.APIToken{
  422. UniqueID: tokenUID,
  423. ProjectID: projectID,
  424. CreatedByUserID: userID,
  425. Expiry: &expiresAt,
  426. Revoked: false,
  427. PolicyUID: policyModel.UniqueID,
  428. PolicyName: policyModel.Name,
  429. Name: strings.ToLower(fmt.Sprintf("repo-%s-token", request.GitRepo)),
  430. SecretKey: hashedToken,
  431. }
  432. apiToken, err = config.Repo.APIToken().CreateAPIToken(apiToken)
  433. if err != nil {
  434. return "", err
  435. }
  436. // generate porter jwt token
  437. jwt, err := token.GetStoredTokenForAPI(userID, projectID, apiToken.UniqueID, secretKey)
  438. if err != nil {
  439. return "", err
  440. }
  441. return jwt.EncodeToken(config.TokenConf)
  442. }
  443. func createBuildConfig(
  444. config *config.Config,
  445. release *models.Release,
  446. bcRequest *types.CreateBuildConfigRequest,
  447. ) (*types.BuildConfig, error) {
  448. data, err := json.Marshal(bcRequest.Config)
  449. if err != nil {
  450. return nil, err
  451. }
  452. // handle write to the database
  453. bc, err := config.Repo.BuildConfig().CreateBuildConfig(&models.BuildConfig{
  454. Builder: bcRequest.Builder,
  455. Buildpacks: strings.Join(bcRequest.Buildpacks, ","),
  456. Config: data,
  457. })
  458. if err != nil {
  459. return nil, err
  460. }
  461. release.BuildConfig = bc.ID
  462. _, err = config.Repo.Release().UpdateRelease(release)
  463. if err != nil {
  464. return nil, err
  465. }
  466. return bc.ToBuildConfigType(), nil
  467. }
  468. type containerEnvConfig struct {
  469. Container struct {
  470. Env struct {
  471. Normal map[string]string `yaml:"normal"`
  472. } `yaml:"env"`
  473. } `yaml:"container"`
  474. }
  475. func GetGARunner(
  476. config *config.Config,
  477. userID, projectID, clusterID uint,
  478. ga *models.GitActionConfig,
  479. name, namespace string,
  480. release *models.Release,
  481. helmRelease *release.Release,
  482. ) (*actions.GithubActions, error) {
  483. cEnv := &containerEnvConfig{}
  484. rawValues, err := yaml.Marshal(helmRelease.Config)
  485. if err == nil {
  486. err = yaml.Unmarshal(rawValues, cEnv)
  487. // if unmarshal error, just set to empty map
  488. if err != nil {
  489. cEnv.Container.Env.Normal = make(map[string]string)
  490. }
  491. }
  492. repoSplit := strings.Split(ga.GitRepo, "/")
  493. if len(repoSplit) != 2 {
  494. return nil, fmt.Errorf("invalid formatting of repo name")
  495. }
  496. // create the commit in the git repo
  497. return &actions.GithubActions{
  498. ServerURL: config.ServerConf.ServerURL,
  499. GithubOAuthIntegration: nil,
  500. BuildEnv: cEnv.Container.Env.Normal,
  501. GithubAppID: config.GithubAppConf.AppID,
  502. GithubAppSecretPath: config.GithubAppConf.SecretPath,
  503. GithubInstallationID: ga.GitRepoID,
  504. GitRepoName: repoSplit[1],
  505. GitRepoOwner: repoSplit[0],
  506. Repo: config.Repo,
  507. ProjectID: projectID,
  508. ClusterID: clusterID,
  509. ReleaseName: name,
  510. GitBranch: ga.GitBranch,
  511. DockerFilePath: ga.DockerfilePath,
  512. FolderPath: ga.FolderPath,
  513. ImageRepoURL: ga.ImageRepoURI,
  514. Version: "v0.1.0",
  515. }, nil
  516. }