mirror of
https://github.com/moghtech/komodo.git
synced 2026-04-28 19:59:46 -05:00
* attach env_file to compose build and compose pull stages * fmt and bump rust version * bump dependencies * ignored for Sqlite message * fix Build secret args info * improve secret arguments info * improve environment, ports, volumes deserializers * rename `mongo` to `database` in config * support _FILE in secret env vars * improve setup - simpler compose * remove aws ecr container registry support, alpine dockerfiles * log periphery config * ssl_enabled mode * log http vs https * periphery client accept untrust ssl certs * fix nav issue from links * configurable ssl * KOMODO_ENSURE_SERVER -> KOMODO_FIRST_SERVER * mount proc and ssl volume * managed sync * validate files on host resource path * remove sync repo not configured guards * disable confirm dialog * fix sync hash / message Option * try dev dockerfile * refresh sync resources after commit * socket invalidate handling * delete dev dockerfile * Commit Changes * Add Info tab to syncs * fix new Info parsing issue with serde default * refresh stack cache on create / update * managed syncs can't sync themselves * managed syncs seems to work * bump thiserror * use alpine as main dockerfile * apt add --no-cache * disable user write perms, super admin perms to manage admins * manage admin user UI * implement disable non admin create frontend * disable create non admin * Copy button shown based on permission * warning message on managed sync * implement monaco editor * impl simple match tags config * resource sync support match tags * more match tag filtering * improve config with better saving diffs * export button use monaco * deser Conversions with wrapping strings * envs editing * don't delete variables / user groups if match tags defined * env from_str improve * improve dashboards * remove core ca stuff for now * move periphery ssl gen to dedicated file * default server address periphery:8120 * clean up ssl configs * server dashboard * nice test compose * add discord alerter * discord alerter * stack hideInfo logic * compose setup * alert table * improve config hover card style * update min editor height and stack config * Feat: Styling Updates (#94) * sidebar takes full screen height * add bg accent to navbar * add aschild prop to topbar alerts trigger * stylize resource rows * internally scrollable data tables * better hover color for outlined button * always show scrollbar to prevent layout shift * better hover color for navbar * rearrange buttons * fix table and resource row styles * cleanup scrollbar css * use page for dashboard instead of section * fix padding * resource sync refactor and env keep comments * frontend build * improve configs * config nice * Feat/UI (#95) * stylize resource rows * internally scrollable data tables * fix table and resource row styles * use page for dashboard instead of section * fix padding * add `ResourcePageHeader` to required components * add generic resource page header component * add resource page headers for all components * add resource notificaitons component * add `TextUpdateMenu2` for use in resource page * cleanup resource notificaitons * update resource page layout * ui edits * sync kind of work * clean up unused import * syncs seem to work * new sync pending * monaco diff hide unchanged regions * update styling all in config resource select links * confirm update default strings * move procedure Add Stage to left * update colors / styles * frontend build * backend for write file contents to host * compose reference ports comment out * server config * ensure parent directory created * fix frontend build * remove default stack run_directory * fix periphery compose deploy response set * update compose files * move server stats under tabs * fix deployment list item getting correct image when not deployed * stack updates cache after file write * edit files on host * clean up unused imports * top level config update assignment must be spread * update deps, move alert module * move stack module * move sync module * move to sync db_client usage after init * support generic OIDC provider * init builders / server templates specifying https * special cases for server / deployment state * improve alert details * add builder template `use_https` config * try downgrade aws sdk ec2 for x86 build * update debian dockerfiles to rm lists/* * optionally configure seperate KOMODO_OIDC_REDIRECT * add defaults to compose.env * keep tags / search right aligned when view only * clean up configs * remove unused migrator deps * update roadmap support generic OIDC * initialize sync use confirm button * key_value syntax highlighting * smaller debian dockerfiles * clean up deps.sh * debian dockerifle * New config layout (#96) * new config layout * fix image config layout and components config * fix dom nesting and cleanup components * fix label, make switches flex row * ensure smooth scroll on hash navigations * width 180 on config sidebar * slight edits to config * log whether https builder * DISABLED <switch> ENABLED * fix some more config * smaller checked component * server config looking good * auto initialize compose files when files on host * stack files on host good * stack config nice * remove old config * deployments looking good * build looking good * Repo good * nice config for builders * alerter good * server template config * syncs good * tweak stack config * use status badge for update tables * unified update page using router params * replace /updates with unified updates page * redirect all resource updates to unified update page * fix reset handling * unmount legacy page * try periphery rustls * rm unused import * fix broken deps * add unified alerts apge * mount new alerts, remove old alerts page * reroute resource alerts to unified alerts page * back to periphery openssl * ssl_enabled defaults to false for backward compat * reqwest need json feature * back to og yaml monaco * Uncomment config fields for clearer config * clean up compose env * implement pull or clone, avoid deleting repo directory * refactor mongo configuration params * all configs respect empty string null * add back status to header * build toml don't have version if not auto incrementing * fix comile * fix repo pull cd to correct dir * fix core pull_or_clone directory * improve statuses * remove ' ' from kv list parser * longer CSRF valid for, to give time to login / accept * don't compute diff / execute if there are any file_errors * PartialBuilderConfig enum user inner option * move errors to top * fix toml init serializer * server template and bulder manually add config.params line * better way to check builder / template params empty * improve build configs * merge links into network area deployment * default periphery config * improve SystemCommand editor * better Repo server / builder Info * improve Alerts / Updates with ResourceSelector * fix unused frontend * update ResourceSync description * toml use [resource.config] syntax * update toml syntax * update Build.image_registry schema * fix repo / stack resource link alias * reorder image registry * align toml / yaml parser style * some config updates --------- Co-authored-by: Karamvir Singh <67458484+karamvirsingh98@users.noreply.github.com> Co-authored-by: kv <karamvir.singh98@gmail.com>
360 lines
8.8 KiB
Rust
360 lines
8.8 KiB
Rust
use anyhow::{anyhow, Context};
|
|
use git::GitRes;
|
|
use komodo_client::{
|
|
api::write::*,
|
|
entities::{
|
|
build::{Build, BuildInfo, PartialBuildConfig},
|
|
config::core::CoreConfig,
|
|
permission::PermissionLevel,
|
|
user::User,
|
|
CloneArgs, NoData,
|
|
},
|
|
};
|
|
use mongo_indexed::doc;
|
|
use mungos::mongodb::bson::to_document;
|
|
use octorust::types::{
|
|
ReposCreateWebhookRequest, ReposCreateWebhookRequestConfig,
|
|
};
|
|
use resolver_api::Resolve;
|
|
|
|
use crate::{
|
|
config::core_config,
|
|
helpers::git_token,
|
|
resource,
|
|
state::{db_client, github_client, State},
|
|
};
|
|
|
|
impl Resolve<CreateBuild, User> for State {
|
|
#[instrument(name = "CreateBuild", skip(self, user))]
|
|
async fn resolve(
|
|
&self,
|
|
CreateBuild { name, config }: CreateBuild,
|
|
user: User,
|
|
) -> anyhow::Result<Build> {
|
|
resource::create::<Build>(&name, config, &user).await
|
|
}
|
|
}
|
|
|
|
impl Resolve<CopyBuild, User> for State {
|
|
#[instrument(name = "CopyBuild", skip(self, user))]
|
|
async fn resolve(
|
|
&self,
|
|
CopyBuild { name, id }: CopyBuild,
|
|
user: User,
|
|
) -> anyhow::Result<Build> {
|
|
let Build { mut config, .. } =
|
|
resource::get_check_permissions::<Build>(
|
|
&id,
|
|
&user,
|
|
PermissionLevel::Write,
|
|
)
|
|
.await?;
|
|
// reset version to 0.0.0
|
|
config.version = Default::default();
|
|
resource::create::<Build>(&name, config.into(), &user).await
|
|
}
|
|
}
|
|
|
|
impl Resolve<DeleteBuild, User> for State {
|
|
#[instrument(name = "DeleteBuild", skip(self, user))]
|
|
async fn resolve(
|
|
&self,
|
|
DeleteBuild { id }: DeleteBuild,
|
|
user: User,
|
|
) -> anyhow::Result<Build> {
|
|
resource::delete::<Build>(&id, &user).await
|
|
}
|
|
}
|
|
|
|
impl Resolve<UpdateBuild, User> for State {
|
|
#[instrument(name = "UpdateBuild", skip(self, user))]
|
|
async fn resolve(
|
|
&self,
|
|
UpdateBuild { id, config }: UpdateBuild,
|
|
user: User,
|
|
) -> anyhow::Result<Build> {
|
|
resource::update::<Build>(&id, config, &user).await
|
|
}
|
|
}
|
|
|
|
impl Resolve<RefreshBuildCache, User> for State {
|
|
#[instrument(
|
|
name = "RefreshBuildCache",
|
|
level = "debug",
|
|
skip(self, user)
|
|
)]
|
|
async fn resolve(
|
|
&self,
|
|
RefreshBuildCache { build }: RefreshBuildCache,
|
|
user: User,
|
|
) -> anyhow::Result<NoData> {
|
|
// Even though this is a write request, this doesn't change any config. Anyone that can execute the
|
|
// build should be able to do this.
|
|
let build = resource::get_check_permissions::<Build>(
|
|
&build,
|
|
&user,
|
|
PermissionLevel::Execute,
|
|
)
|
|
.await?;
|
|
|
|
if build.config.repo.is_empty()
|
|
|| build.config.git_provider.is_empty()
|
|
{
|
|
// Nothing to do here
|
|
return Ok(NoData {});
|
|
}
|
|
|
|
let config = core_config();
|
|
|
|
let mut clone_args: CloneArgs = (&build).into();
|
|
let repo_path =
|
|
clone_args.unique_path(&core_config().repo_directory)?;
|
|
clone_args.destination = Some(repo_path.display().to_string());
|
|
// Don't want to run these on core.
|
|
clone_args.on_clone = None;
|
|
clone_args.on_pull = None;
|
|
|
|
let access_token = if let Some(username) = &clone_args.account {
|
|
git_token(&clone_args.provider, username, |https| {
|
|
clone_args.https = https
|
|
})
|
|
.await
|
|
.with_context(
|
|
|| format!("Failed to get git token in call to db. Stopping run. | {} | {username}", clone_args.provider),
|
|
)?
|
|
} else {
|
|
None
|
|
};
|
|
|
|
let GitRes {
|
|
hash: latest_hash,
|
|
message: latest_message,
|
|
..
|
|
} = git::pull_or_clone(
|
|
clone_args,
|
|
&config.repo_directory,
|
|
access_token,
|
|
&[],
|
|
"",
|
|
None,
|
|
&[],
|
|
)
|
|
.await
|
|
.context("failed to clone build repo")?;
|
|
|
|
let info = BuildInfo {
|
|
last_built_at: build.info.last_built_at,
|
|
built_hash: build.info.built_hash,
|
|
built_message: build.info.built_message,
|
|
latest_hash,
|
|
latest_message,
|
|
};
|
|
|
|
let info = to_document(&info)
|
|
.context("failed to serialize build info to bson")?;
|
|
|
|
db_client()
|
|
.builds
|
|
.update_one(
|
|
doc! { "name": &build.name },
|
|
doc! { "$set": { "info": info } },
|
|
)
|
|
.await
|
|
.context("failed to update build info on db")?;
|
|
|
|
Ok(NoData {})
|
|
}
|
|
}
|
|
|
|
impl Resolve<CreateBuildWebhook, User> for State {
|
|
#[instrument(name = "CreateBuildWebhook", skip(self, user))]
|
|
async fn resolve(
|
|
&self,
|
|
CreateBuildWebhook { build }: CreateBuildWebhook,
|
|
user: User,
|
|
) -> anyhow::Result<CreateBuildWebhookResponse> {
|
|
let Some(github) = github_client() else {
|
|
return Err(anyhow!(
|
|
"github_webhook_app is not configured in core config toml"
|
|
));
|
|
};
|
|
|
|
let build = resource::get_check_permissions::<Build>(
|
|
&build,
|
|
&user,
|
|
PermissionLevel::Write,
|
|
)
|
|
.await?;
|
|
|
|
if build.config.repo.is_empty() {
|
|
return Err(anyhow!(
|
|
"No repo configured, can't create webhook"
|
|
));
|
|
}
|
|
|
|
let mut split = build.config.repo.split('/');
|
|
let owner = split.next().context("Build repo has no owner")?;
|
|
|
|
let Some(github) = github.get(owner) else {
|
|
return Err(anyhow!(
|
|
"Cannot manage repo webhooks under owner {owner}"
|
|
));
|
|
};
|
|
|
|
let repo =
|
|
split.next().context("Build repo has no repo after the /")?;
|
|
|
|
let github_repos = github.repos();
|
|
|
|
// First make sure the webhook isn't already created (inactive ones are ignored)
|
|
let webhooks = github_repos
|
|
.list_all_webhooks(owner, repo)
|
|
.await
|
|
.context("failed to list all webhooks on repo")?
|
|
.body;
|
|
|
|
let CoreConfig {
|
|
host,
|
|
webhook_base_url,
|
|
webhook_secret,
|
|
..
|
|
} = core_config();
|
|
|
|
let webhook_secret = if build.config.webhook_secret.is_empty() {
|
|
webhook_secret
|
|
} else {
|
|
&build.config.webhook_secret
|
|
};
|
|
|
|
let host = if webhook_base_url.is_empty() {
|
|
host
|
|
} else {
|
|
webhook_base_url
|
|
};
|
|
let url = format!("{host}/listener/github/build/{}", build.id);
|
|
|
|
for webhook in webhooks {
|
|
if webhook.active && webhook.config.url == url {
|
|
return Ok(NoData {});
|
|
}
|
|
}
|
|
|
|
// Now good to create the webhook
|
|
let request = ReposCreateWebhookRequest {
|
|
active: Some(true),
|
|
config: Some(ReposCreateWebhookRequestConfig {
|
|
url,
|
|
secret: webhook_secret.to_string(),
|
|
content_type: String::from("json"),
|
|
insecure_ssl: None,
|
|
digest: Default::default(),
|
|
token: Default::default(),
|
|
}),
|
|
events: vec![String::from("push")],
|
|
name: String::from("web"),
|
|
};
|
|
github_repos
|
|
.create_webhook(owner, repo, &request)
|
|
.await
|
|
.context("failed to create webhook")?;
|
|
|
|
if !build.config.webhook_enabled {
|
|
self
|
|
.resolve(
|
|
UpdateBuild {
|
|
id: build.id,
|
|
config: PartialBuildConfig {
|
|
webhook_enabled: Some(true),
|
|
..Default::default()
|
|
},
|
|
},
|
|
user,
|
|
)
|
|
.await
|
|
.context("failed to update build to enable webhook")?;
|
|
}
|
|
|
|
Ok(NoData {})
|
|
}
|
|
}
|
|
|
|
impl Resolve<DeleteBuildWebhook, User> for State {
|
|
#[instrument(name = "DeleteBuildWebhook", skip(self, user))]
|
|
async fn resolve(
|
|
&self,
|
|
DeleteBuildWebhook { build }: DeleteBuildWebhook,
|
|
user: User,
|
|
) -> anyhow::Result<DeleteBuildWebhookResponse> {
|
|
let Some(github) = github_client() else {
|
|
return Err(anyhow!(
|
|
"github_webhook_app is not configured in core config toml"
|
|
));
|
|
};
|
|
|
|
let build = resource::get_check_permissions::<Build>(
|
|
&build,
|
|
&user,
|
|
PermissionLevel::Write,
|
|
)
|
|
.await?;
|
|
|
|
if build.config.git_provider != "github.com" {
|
|
return Err(anyhow!(
|
|
"Can only manage github.com repo webhooks"
|
|
));
|
|
}
|
|
|
|
if build.config.repo.is_empty() {
|
|
return Err(anyhow!(
|
|
"No repo configured, can't delete webhook"
|
|
));
|
|
}
|
|
|
|
let mut split = build.config.repo.split('/');
|
|
let owner = split.next().context("Build repo has no owner")?;
|
|
|
|
let Some(github) = github.get(owner) else {
|
|
return Err(anyhow!(
|
|
"Cannot manage repo webhooks under owner {owner}"
|
|
));
|
|
};
|
|
|
|
let repo =
|
|
split.next().context("Build repo has no repo after the /")?;
|
|
|
|
let github_repos = github.repos();
|
|
|
|
let webhooks = github_repos
|
|
.list_all_webhooks(owner, repo)
|
|
.await
|
|
.context("failed to list all webhooks on repo")?
|
|
.body;
|
|
|
|
let CoreConfig {
|
|
host,
|
|
webhook_base_url,
|
|
..
|
|
} = core_config();
|
|
|
|
let host = if webhook_base_url.is_empty() {
|
|
host
|
|
} else {
|
|
webhook_base_url
|
|
};
|
|
let url = format!("{host}/listener/github/build/{}", build.id);
|
|
|
|
for webhook in webhooks {
|
|
if webhook.active && webhook.config.url == url {
|
|
github_repos
|
|
.delete_webhook(owner, repo, webhook.id)
|
|
.await
|
|
.context("failed to delete webhook")?;
|
|
return Ok(NoData {});
|
|
}
|
|
}
|
|
|
|
// No webhook to delete, all good
|
|
Ok(NoData {})
|
|
}
|
|
}
|