create.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229
  1. package envgroup
  2. import (
  3. "errors"
  4. "fmt"
  5. "strconv"
  6. "strings"
  7. "github.com/porter-dev/porter/api/types"
  8. "github.com/porter-dev/porter/internal/helm"
  9. "github.com/porter-dev/porter/internal/kubernetes"
  10. "helm.sh/helm/v3/pkg/release"
  11. v1 "k8s.io/api/core/v1"
  12. )
  13. func ConvertV1ToV2EnvGroup(agent *kubernetes.Agent, name, namespace string) (*v1.ConfigMap, error) {
  14. cm, err := agent.GetConfigMap(name, namespace)
  15. if err != nil {
  16. return nil, err
  17. }
  18. secret, err := agent.GetSecret(name, namespace)
  19. if err != nil {
  20. return nil, err
  21. }
  22. variables := make(map[string]string)
  23. secretVariables := make(map[string]string)
  24. for key, val := range cm.Data {
  25. if strings.Contains(val, "PORTERSECRET") {
  26. secretVariables[key] = val
  27. } else {
  28. variables[key] = val
  29. }
  30. }
  31. for key, val := range secret.Data {
  32. secretVariables[key] = string(val)
  33. }
  34. envGroup, err := CreateEnvGroup(agent, types.ConfigMapInput{
  35. Name: name,
  36. Namespace: namespace,
  37. Variables: variables,
  38. SecretVariables: secretVariables,
  39. })
  40. if err != nil {
  41. return nil, err
  42. }
  43. // delete the old configmap
  44. // note: we keep the old secret to ensure existing secret references are kept intact
  45. if err := agent.DeleteConfigMap(name, namespace); err != nil {
  46. return nil, err
  47. }
  48. return envGroup, nil
  49. }
  50. func CreateEnvGroup(agent *kubernetes.Agent, input types.ConfigMapInput) (*v1.ConfigMap, error) {
  51. // look for a latest configmap
  52. oldCM, latestVersion, err := agent.GetLatestVersionedConfigMap(input.Name, input.Namespace)
  53. if err != nil && !errors.Is(err, kubernetes.IsNotFoundError) {
  54. return nil, err
  55. } else if err != nil {
  56. latestVersion = 1
  57. } else {
  58. latestVersion += 1
  59. }
  60. apps := make([]string, 0)
  61. if oldCM != nil {
  62. oldEG, err := ToEnvGroup(oldCM)
  63. if err == nil {
  64. apps = oldEG.Applications
  65. }
  66. }
  67. oldSecret, _, err := agent.GetLatestVersionedSecret(input.Name, input.Namespace)
  68. if err != nil && !errors.Is(err, kubernetes.IsNotFoundError) {
  69. return nil, err
  70. } else if err == nil && oldSecret != nil {
  71. // In this case, we find all old variables referencing a secret value, and add those
  72. // values to the new secret variables. The frontend will only send **new** secret values.
  73. for key1, val1 := range input.Variables {
  74. if strings.Contains(val1, "PORTERSECRET") {
  75. // get that value from the secret
  76. for key2, val2 := range oldSecret.Data {
  77. if key2 == key1 {
  78. input.SecretVariables[key1] = string(val2)
  79. }
  80. }
  81. }
  82. }
  83. }
  84. // add all secret env variables to configmap with value PORTERSECRET_${configmap_name}
  85. for key := range input.SecretVariables {
  86. input.Variables[key] = fmt.Sprintf("PORTERSECRET_%s.v%d", input.Name, latestVersion)
  87. }
  88. cm, err := agent.CreateVersionedConfigMap(input.Name, input.Namespace, latestVersion, input.Variables, apps...)
  89. if err != nil {
  90. return nil, err
  91. }
  92. secretData := EncodeSecrets(input.SecretVariables)
  93. // create secret first
  94. if _, err := agent.CreateLinkedVersionedSecret(input.Name, input.Namespace, cm.ObjectMeta.Name, latestVersion, secretData); err != nil {
  95. return nil, err
  96. }
  97. return cm, err
  98. }
  99. func ToEnvGroup(configMap *v1.ConfigMap) (*types.EnvGroup, error) {
  100. res := &types.EnvGroup{
  101. CreatedAt: configMap.ObjectMeta.CreationTimestamp.Time,
  102. Namespace: configMap.Namespace,
  103. Variables: configMap.Data,
  104. }
  105. // if the label "porter"="true" exists, this is a V1 env group
  106. porterLabel, porterLabelExists := configMap.Labels["porter"]
  107. if porterLabelExists && porterLabel == "true" {
  108. res.MetaVersion = 1
  109. res.Name = configMap.ObjectMeta.Name
  110. return res, nil
  111. }
  112. // set the meta version to 2 if porter label is not captured
  113. res.MetaVersion = 2
  114. // get the name
  115. name, nameExists := configMap.Labels["envgroup"]
  116. if !nameExists {
  117. return nil, fmt.Errorf("not a valid configmap: envgroup label does not exist")
  118. }
  119. res.Name = name
  120. // get the version
  121. versionLabelStr, versionLabelExists := configMap.Labels["version"]
  122. if !versionLabelExists {
  123. return nil, fmt.Errorf("not a valid configmap: version label does not exist")
  124. }
  125. versionInt, err := strconv.Atoi(versionLabelStr)
  126. if err != nil {
  127. return nil, fmt.Errorf("not a valid configmap, error converting version: %v", err)
  128. }
  129. res.Version = uint(versionInt)
  130. // get applications, if they exist
  131. appStr, appAnnonExists := configMap.Annotations[kubernetes.PorterAppAnnotationName]
  132. if appAnnonExists && appStr != "" {
  133. res.Applications = strings.Split(appStr, ",")
  134. } else {
  135. res.Applications = []string{}
  136. }
  137. return res, nil
  138. }
  139. func GetSyncedReleases(helmAgent *helm.Agent, configMap *v1.ConfigMap) ([]*release.Release, error) {
  140. res := make([]*release.Release, 0)
  141. // get applications, if they exist
  142. appStr, appAnnonExists := configMap.Annotations[kubernetes.PorterAppAnnotationName]
  143. if !appAnnonExists || appStr == "" {
  144. return res, nil
  145. }
  146. appStrArr := strings.Split(appStr, ",")
  147. // list all latest helm releases and check them against app string
  148. releases, err := helmAgent.ListReleases(configMap.Namespace, &types.ReleaseListFilter{
  149. StatusFilter: []string{
  150. "deployed",
  151. "uninstalled",
  152. "pending",
  153. "pending-install",
  154. "pending-upgrade",
  155. "pending-rollback",
  156. "failed",
  157. },
  158. })
  159. if err != nil {
  160. return nil, err
  161. }
  162. for _, rel := range releases {
  163. for _, appName := range appStrArr {
  164. if rel.Name == appName {
  165. res = append(res, rel)
  166. }
  167. }
  168. }
  169. return res, nil
  170. }
  171. func EncodeSecrets(data map[string]string) map[string][]byte {
  172. res := make(map[string][]byte)
  173. for key, rawValue := range data {
  174. res[key] = []byte(rawValue)
  175. }
  176. return res
  177. }