migrate.go 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184
  1. package migrate_legacy_rbac
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "github.com/porter-dev/porter/api/types"
  6. "github.com/porter-dev/porter/internal/encryption"
  7. "github.com/porter-dev/porter/internal/models"
  8. "github.com/porter-dev/porter/internal/repository"
  9. gorm "github.com/porter-dev/porter/internal/repository/gorm"
  10. lr "github.com/porter-dev/porter/pkg/logger"
  11. _gorm "gorm.io/gorm"
  12. )
  13. // process 100 records at a time
  14. const stepSize = 100
  15. func MigrateFromLegacyRBAC(db *_gorm.DB, logger *lr.Logger) error {
  16. logger.Info().Msg("initiated migration from legacy RBAC")
  17. var count int64
  18. if err := db.Model(&models.Project{}).Count(&count).Error; err != nil {
  19. return err
  20. }
  21. projectRepo := gorm.NewProjectRepository(db).(*gorm.ProjectRepository)
  22. projectRoleRepo := gorm.NewProjectRoleRepository(db).(*gorm.ProjectRoleRepository)
  23. policyRepo := gorm.NewPolicyRepository(db).(*gorm.PolicyRepository)
  24. logger.Info().Msgf("found %d projects", count)
  25. // iterate (count / stepSize) + 1 times using Limit and Offset
  26. for i := 0; i < (int(count)/stepSize)+1; i++ {
  27. projects := []*models.Project{}
  28. if err := db.Preload("Roles").Order("id asc").Offset(i * stepSize).Limit(stepSize).Find(&projects).Error; err != nil {
  29. return err
  30. }
  31. for _, project := range projects {
  32. logger.Info().Msgf("starting migration for project ID %d", project.ID)
  33. var legacyRoleCount int64
  34. if err := db.Where("unique_id = ?", fmt.Sprintf("%d-%s", project.ID, types.RoleAdmin)).
  35. Find(&models.ProjectRole{}).Count(&legacyRoleCount).Error; err != nil {
  36. return err
  37. } else if legacyRoleCount == 0 {
  38. err := createNewRole(project.ID, types.RoleAdmin, projectRoleRepo, policyRepo)
  39. if err != nil {
  40. return err
  41. }
  42. }
  43. if err := db.Where("unique_id = ?", fmt.Sprintf("%d-%s", project.ID, types.RoleDeveloper)).
  44. Find(&models.ProjectRole{}).Count(&legacyRoleCount).Error; err != nil {
  45. return err
  46. } else if legacyRoleCount == 0 {
  47. err := createNewRole(project.ID, types.RoleDeveloper, projectRoleRepo, policyRepo)
  48. if err != nil {
  49. return err
  50. }
  51. }
  52. if err := db.Where("unique_id = ?", fmt.Sprintf("%d-%s", project.ID, types.RoleViewer)).
  53. Find(&models.ProjectRole{}).Count(&legacyRoleCount).Error; err != nil {
  54. return err
  55. } else if legacyRoleCount == 0 {
  56. err := createNewRole(project.ID, types.RoleViewer, projectRoleRepo, policyRepo)
  57. if err != nil {
  58. return err
  59. }
  60. }
  61. legacyRoleKindUsersMap := map[types.RoleKind][]uint{
  62. types.RoleAdmin: make([]uint, 0),
  63. types.RoleDeveloper: make([]uint, 0),
  64. types.RoleViewer: make([]uint, 0),
  65. types.RoleCustom: make([]uint, 0), // added this for possible cases of custom roles in the DB?
  66. }
  67. for _, legacyRole := range project.Roles {
  68. legacyRoleKindUsersMap[legacyRole.Kind] = append(legacyRoleKindUsersMap[legacyRole.Kind], legacyRole.UserID)
  69. }
  70. delete(legacyRoleKindUsersMap, types.RoleCustom) // added just to make sure nothing goes wrong from here
  71. for roleKind, users := range legacyRoleKindUsersMap {
  72. if len(users) > 0 {
  73. err := projectRoleRepo.UpdateUsersInProjectRole(project.ID, fmt.Sprintf("%d-%s", project.ID, roleKind), users)
  74. if err != nil {
  75. return err
  76. }
  77. }
  78. }
  79. for _, legacyRole := range project.Roles {
  80. // delete legacy role from project
  81. if _, err := projectRepo.DeleteLegacyProjectRole(project.ID, legacyRole.UserID); err != nil {
  82. return fmt.Errorf("error encountered while deleting legacy project role: %w", err)
  83. }
  84. }
  85. logger.Info().Msgf("finished migration for project ID %d", project.ID)
  86. }
  87. }
  88. logger.Info().Msg("legacy RBAC migration completed")
  89. return nil
  90. }
  91. func createNewRole(
  92. projectID uint,
  93. kind types.RoleKind,
  94. projectRoleRepo repository.ProjectRoleRepository,
  95. policyRepo repository.PolicyRepository,
  96. ) error {
  97. // for legacy roles - admin, developer, viewer (kinds)
  98. // default role name such as <project ID>-<kind> for uniqueness
  99. // similarly, create policy for each new default role as <project ID>-<kind>-project-role-policy
  100. uid, err := encryption.GenerateRandomBytes(16)
  101. if err != nil {
  102. return err
  103. }
  104. var policyBytes []byte
  105. switch kind {
  106. case types.RoleAdmin:
  107. policyBytes, err = json.Marshal(types.AdminPolicy)
  108. if err != nil {
  109. return err
  110. }
  111. case types.RoleDeveloper:
  112. policyBytes, err = json.Marshal(types.DeveloperPolicy)
  113. if err != nil {
  114. return err
  115. }
  116. case types.RoleViewer:
  117. policyBytes, err = json.Marshal(types.ViewerPolicy)
  118. if err != nil {
  119. return err
  120. }
  121. }
  122. newPolicy, err := policyRepo.CreatePolicy(&models.Policy{
  123. UniqueID: uid,
  124. ProjectID: projectID,
  125. Name: fmt.Sprintf("%s-project-role-policy", kind),
  126. PolicyBytes: policyBytes,
  127. })
  128. if err != nil {
  129. return err
  130. }
  131. _, err = projectRoleRepo.CreateProjectRole(&models.ProjectRole{
  132. UniqueID: fmt.Sprintf("%d-%s", projectID, kind),
  133. ProjectID: projectID,
  134. PolicyUID: newPolicy.UniqueID,
  135. Name: string(kind),
  136. })
  137. if err != nil {
  138. // delete newly created policy first
  139. policyRepo.DeletePolicy(newPolicy)
  140. return err
  141. }
  142. return nil
  143. }