rename_configmap.go 2.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. package namespace
  2. import (
  3. "net/http"
  4. "github.com/porter-dev/porter/api/server/authz"
  5. "github.com/porter-dev/porter/api/server/handlers"
  6. "github.com/porter-dev/porter/api/server/shared"
  7. "github.com/porter-dev/porter/api/server/shared/apierrors"
  8. "github.com/porter-dev/porter/api/server/shared/config"
  9. "github.com/porter-dev/porter/api/types"
  10. "github.com/porter-dev/porter/internal/models"
  11. )
  12. type RenameConfigMapHandler struct {
  13. handlers.PorterHandlerReadWriter
  14. authz.KubernetesAgentGetter
  15. }
  16. func NewRenameConfigMapHandler(
  17. config *config.Config,
  18. decoderValidator shared.RequestDecoderValidator,
  19. writer shared.ResultWriter,
  20. ) *RenameConfigMapHandler {
  21. return &RenameConfigMapHandler{
  22. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  23. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  24. }
  25. }
  26. func (c *RenameConfigMapHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  27. request := &types.RenameConfigMapRequest{}
  28. if ok := c.DecodeAndValidate(w, r, request); !ok {
  29. return
  30. }
  31. if request.NewName == request.Name {
  32. w.WriteHeader(http.StatusBadRequest)
  33. return
  34. }
  35. namespace := r.Context().Value(types.NamespaceScope).(string)
  36. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  37. agent, err := c.GetAgent(r, cluster, "")
  38. if err != nil {
  39. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  40. return
  41. }
  42. configMap, err := agent.GetConfigMap(request.Name, namespace)
  43. if err != nil {
  44. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  45. return
  46. }
  47. secret, err := agent.GetSecret(configMap.Name, configMap.Namespace)
  48. if err != nil {
  49. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  50. return
  51. }
  52. var decodedSecretData = make(map[string]string)
  53. for k, v := range secret.Data {
  54. decodedSecretData[k] = string(v)
  55. }
  56. newConfigMap, err := createConfigMap(agent, types.ConfigMapInput{
  57. Name: request.NewName,
  58. Namespace: namespace,
  59. Variables: configMap.Data,
  60. SecretVariables: decodedSecretData,
  61. })
  62. if err != nil {
  63. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  64. return
  65. }
  66. if err := deleteConfigMap(agent, configMap.Name, configMap.Namespace); err != nil {
  67. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  68. return
  69. }
  70. res := types.RenameConfigMapResponse{
  71. ConfigMap: newConfigMap,
  72. }
  73. c.WriteResult(w, r, res)
  74. }