Control the payload
Port offers two ways to control the payload sent to your backend:
- When using the
Port execution agent(with a GitLab/Webhook backend), use the instructions on this page to define your payload. - In any other case, you can define the payload directly via Port.
Some of your internal services may not accept the raw payload incoming from Port's self-service actions. You can control the payload sent to your internal services with the Port execution agent.
For the latest updates and source code, see the Port Agent GitHub repository.
You can alter the requests sent to your internal services by providing a payload mapping config file when deploying the Port execution agent.
Setting up the mapping
- Helm
- Argo
- Docker
To provide the mapping configuration to the agent, run the installation command again, and add the following parameter:
--set-file controlThePayloadConfig=/PATH/TO/LOCAL/FILE.json
To provide the mapping to the agent, add the mapping to the values.yaml file created in the installation here. The needs to be added as a top level field.
Below you can find the default mapping to use as a starting point:
controlThePayloadConfig: |
[
{
"enabled": true,
"url": ".payload.action.invocationMethod.url",
"method": ".payload.action.invocationMethod.method // \"POST\""
}
]
To provide the mapping to the agent, mount the mapping file to the container by adding the following parameter to the installation command:
-v /PATH/TO/LOCAL/FILE.json:/app/control_the_payload_config.json
Control the payload mapping
The payload mapping file is a JSON file that specifies how to transform the request sent to the Port agent to the request that is sent to your internal service.
The payload mapping file is mounted to the Port agent as a volume. The path to the payload mapping file is set in the CONTROL_THE_PAYLOAD_CONFIG_PATH environment variable. By default, the Port agent will look for the payload mapping file in ~/control_the_payload_config.json.
Each of the mapping fields can be constructed with JQ expressions. The agent will evaluate them with the original payload that Port sends, and the result will be sent to your internal service.
An example mapping file may look like this:
[
{
"enabled": true,
"url": ".payload.action.invocationMethod.url",
"method": ".payload.action.invocationMethod.method // \"POST\"",
"headers": {},
"body": ".body",
"query": {},
"report": {
"status": "\"SUCCESS\"",
"link": ".response.json.link",
"summary": ".response.json.summary",
"externalRunId": ".response.json.runId"
},
"fieldsToDecryptPaths": [".payload.properties.secret_field"]
}
]
The configuration file can contain multiple mappings. The agent will use the first mapping where enabled evaluates to true, allowing you to apply different mappings for different actions.
Mapping configuration fields
| Field | Type | Required | Default | Description |
|---|---|---|---|---|
enabled | bool or JQ expression | Yes | - | Whether to use this mapping. |
url | JQ expression | No | Incoming URL from Port | The destination URL for the request. |
method | JQ expression | No | POST | The HTTP method to use (e.g., POST, GET, PUT, DELETE). |
headers | Dictionary of string keys to JQ expressions | No | {} | HTTP headers to include in the request. |
body | JQ expression or JSON object | No | Entire payload from Port | The content to send in the request body. |
query | Dictionary of string keys to JQ expressions | No | {} | URL query parameters for the request. |
report | Object | No | - | Settings for reporting the run status back to Port. |
report.status | JQ expression | No | - | The run status (SUCCESS or FAILURE). |
report.link | JQ expression | No | - | Link(s) to display for this run in Port. |
report.summary | JQ expression | No | - | Summary message to display in Port. |
report.externalRunId | JQ expression | No | - | External run ID for tracking in your service. |
fieldsToDecryptPaths | Array of strings | No | [] | Paths to encrypted fields to decrypt before sending. |
You can forward headers from the incoming request by using the following JQ expression in the headers field:
{
"headers": ".payload.action.invocationMethod.headers // {}"
}
Objects (e.g., body, headers) can be partially constructed with JSON as follows:
{
"body": {
"key": 2,
"key2": {
"key3": ".im.a.jq.expression",
"key4": "\"im a string\""
}
}
}
Mapping examples
This section shows examples of how to control what the agent sends to your internal service using the mapping configuration.
Apply a filter to the mapping
Assuming you have a few different invocation methods for your actions, you can create a mapping configuration that is only applied to actions that are of a specific type.
For example, to create a filter that applies only to actions with the GitLab method:
"enabled": ".payload.invocationMethod.type == \"GITLAB\""
Deploy multiple agents across clusters
If you have multiple clusters without network connectivity between them, you can deploy a separate port-agent on each cluster. All agents consume from the same Kafka topic, but each agent uses a different enabled filter to process only the actions relevant to its cluster.
For example, if your actions include a target_cluster property:
- Agent on Cluster A:
"enabled": ".payload.properties.target_cluster == \"cluster-a\"" - Agent on Cluster B:
"enabled": ".payload.properties.target_cluster == \"cluster-b\""
Each agent will ignore actions that don't match its filter, ensuring that only the appropriate agent processes each action.
With polling streamer, messages are acknowledged before processing and cannot be claimed by another agent once fetched. This allows multiple agents to run in parallel without conflicts, but requires using the same filtering logic across all agents to avoid unintended filtering.
You cannot control which agent processes which message.
Create a URL based on a property
Assuming a webhook invocation action is configured to forward the request to the URL http://test.com/, and the action in Port contains a number type input called network_port meant to specify the network port to send the request to, here is how you can construct the complete URL using the URL and the additional input:
"url": ".payload.invocationMethod.url + .payload.properties.network_port"
Invoking the action with the input 8080 to the property network_port will cause the agent to send the webhook request to http://test.com/8080.
The incoming message to base your mapping on
Below is an example for incoming event:
Example for incoming event (click to expand)
{
"action": "action_identifier",
"resourceType": "run",
"status": "TRIGGERED",
"trigger": {
"by": {
"orgId": "org_XXX",
"userId": "auth0|XXXXX",
"user": {
"email": "executor@mail.com",
"firstName": "user",
"lastName": "userLastName",
"phoneNumber": "0909090909090909",
"picture": "https://s.gravatar.com/avatar/dd1cf547c8b950ce6966c050234ac997?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fga.png",
"providers": ["port"],
"status": "ACTIVE",
"id": "auth0|XXXXX",
"createdAt": "2022-12-08T16:34:20.735Z",
"updatedAt": "2023-11-13T15:11:38.243Z"
}
},
"origin": "UI",
"at": "2023-11-13T15:20:16.641Z"
},
"context": {
"entity": "e_iQfaF14FJln6GVBn",
"blueprint": "kubecostCloudAllocation",
"runId": "r_HardNzG6kzc9vWOQ"
},
"payload": {
"entity": {
"identifier": "e_iQfaF14FJln6GVBn",
"title": "myEntity",
"icon": "Port",
"blueprint": "myBlueprint",
"team": [],
"properties": {},
"relations": {},
"createdAt": "2023-11-13T15:24:46.880Z",
"createdBy": "auth0|XXXXX",
"updatedAt": "2023-11-13T15:24:46.880Z",
"updatedBy": "auth0|XXXXX"
},
"action": {
"invocationMethod": {
"type": "WEBHOOK",
"agent": true,
"synchronized": false,
"method": "POST",
"url": "https://myGitlabHost.com"
},
"trigger": "DAY-2"
},
"properties": {},
"censoredProperties": []
}
}
Report action status back to Port
The agent is capable of reporting the action status back to Port using the report field in the mapping.
The report request will be sent to the Port API right after the request to your internal services is sent and update the run status in Port.
The agent uses the JQ in the report field to construct the report request body.
The available fields are:
status- The status of the run. Can be one of the following values:SUCCESS/FAILURElink- A link to the run in your internal service. Can be a string or a list of strings.summary- A summary to display in Port.externalRunId- Used to search action runs in Port by the ID of external services.
The report mapping can use the following fields:
.body - The incoming message as mentioned above
.request - The request that was calculated using the control the payload mapping and sent to your internal service
.response - The response that was received from your internal service
The response field contains the following fields:
statusCode- The status code of the responsejson- The response body as a JSON objecttext- The response body as a stringheaders- The response headers as a JSON object
Decrypting Encrypted Fields
When using secret type input fields in your actions such as API keys, tokens, or passwords, the Port agent can automatically decrypt these encrypted values before sending requests to internal services.
Use the fieldsToDecryptPaths field in your mapping to specify which fields should be decrypted.
Important Notes:
- Path Format: Use dot-separated paths without a leading dot (
.). The paths should start directly with the field name. - Array Elements: For arrays, you must specify the exact index (e.g.
secrets.0.value,secrets.1.value) rather than using wildcards likesecrets[*].value. - Path Context: The paths are relative to the root of the incoming message structure, not relative to the
.bodyfield used in other mappings.
Basic example - simple fields (click to expand)
{
"action": "deploy_service",
"resourceType": "service",
"status": "TRIGGERED",
"trigger": {
"by": {
"orgId": "org_123",
"userId": "auth0|abc123",
"user": {
"email": "user@example.com",
"firstName": "Alice",
"lastName": "Smith"
}
},
"origin": "UI",
"at": "2024-06-01T12:00:00.000Z"
},
"context": {
"entity": "e_456",
"blueprint": "microservice",
"runId": "r_789"
},
"payload": {
"entity": {
"identifier": "e_456",
"title": "My Service",
"blueprint": "microservice",
"team": ["devops"],
"properties": {
"api_key": "<ENCRYPTED_VALUE>",
"db_password": "<ENCRYPTED_VALUE>",
"region": "us-east-1"
}
},
"action": {
"invocationMethod": {
"type": "WEBHOOK",
"agent": true,
"synchronized": false,
"method": "POST",
"url": "https://myservice.com/deploy"
},
"trigger": "DEPLOY"
},
"properties": {},
"censoredProperties": []
}
}
To have the agent automatically decrypt the api_key and db_password fields, add their dot-separated paths to fieldsToDecryptPaths in your mapping configuration:
[
{
"fieldsToDecryptPaths": [
"payload.entity.properties.api_key",
"payload.entity.properties.db_password"
],
// ... other mapping fields ...
}
]
Advanced example - array elements (click to expand)
For payloads containing arrays of objects with encrypted values, you must specify each array element individually by its index:
{
"payload": {
"action": {
"invocationMethod": {
"body": {
"secrets": [
{
"key": "porttest123",
"value": "<ENCRYPTED_VALUE>"
},
{
"key": "porttest456",
"value": "<ENCRYPTED_VALUE>"
}
],
"users": [
{
"username": "user1",
"password": "<ENCRYPTED_VALUE>"
},
{
"username": "user2",
"password": "<ENCRYPTED_VALUE>"
}
]
}
}
}
}
}
Correct Configuration (specify each array index individually):
[
{
"fieldsToDecryptPaths": [
"payload.action.invocationMethod.body.secrets.0.value",
"payload.action.invocationMethod.body.secrets.1.value",
"payload.action.invocationMethod.body.users.0.password",
"payload.action.invocationMethod.body.users.1.password"
],
// ... other mapping fields ...
}
]
Incorrect Configurations (these will NOT work):
// ❌ Wildcards are not supported
"fieldsToDecryptPaths": ["payload.action.invocationMethod.body.secrets[*].value"]
// ❌ Leading dot is incorrect
"fieldsToDecryptPaths": [".payload.action.invocationMethod.body.secrets.0.value"]
// ❌ Case sensitive - field names must match exactly
// If the field is named 'secrets' (lowercase), this won't work:
"fieldsToDecryptPaths": ["payload.action.invocationMethod.body.Secrets.0.value"]
How it works:
- The agent will look for the fields at the specified paths in the incoming message.
- If it finds encrypted values there, it will decrypt them using your configured
PORT_CLIENT_SECRET. - You can add more fields to the list as needed.