update_configmap.go 2.1 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576
  1. package namespace
  2. import (
  3. "fmt"
  4. "net/http"
  5. "github.com/porter-dev/porter/api/server/authz"
  6. "github.com/porter-dev/porter/api/server/handlers"
  7. "github.com/porter-dev/porter/api/server/shared"
  8. "github.com/porter-dev/porter/api/server/shared/apierrors"
  9. "github.com/porter-dev/porter/api/server/shared/config"
  10. "github.com/porter-dev/porter/api/types"
  11. "github.com/porter-dev/porter/internal/models"
  12. )
  13. type UpdateConfigMapHandler struct {
  14. handlers.PorterHandlerReadWriter
  15. authz.KubernetesAgentGetter
  16. }
  17. func NewUpdateConfigMapHandler(
  18. config *config.Config,
  19. decoderValidator shared.RequestDecoderValidator,
  20. writer shared.ResultWriter,
  21. ) *UpdateConfigMapHandler {
  22. return &UpdateConfigMapHandler{
  23. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  24. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  25. }
  26. }
  27. func (c *UpdateConfigMapHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  28. request := &types.UpdateConfigMapRequest{}
  29. if ok := c.DecodeAndValidate(w, r, request); !ok {
  30. return
  31. }
  32. namespace := r.Context().Value(types.NamespaceScope).(string)
  33. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  34. agent, err := c.GetAgent(r, cluster, "")
  35. if err != nil {
  36. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  37. return
  38. }
  39. secretData := encodeSecrets(request.SecretVariables)
  40. // create secret first
  41. err = agent.UpdateLinkedSecret(request.Name, namespace, request.Name, secretData)
  42. if err != nil {
  43. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  44. return
  45. }
  46. // add all secret env variables to configmap with value PORTERSECRET_${configmap_name}
  47. for key, val := range request.SecretVariables {
  48. // if val is empty and key does not exist in configmap already, set to empty
  49. if _, found := request.Variables[key]; val == "" && !found {
  50. request.Variables[key] = ""
  51. } else if val != "" {
  52. request.Variables[key] = fmt.Sprintf("PORTERSECRET_%s", request.Name)
  53. }
  54. }
  55. configMap, err := agent.UpdateConfigMap(request.Name, namespace, request.Variables)
  56. res := types.UpdateConfigMapResponse{
  57. ConfigMap: configMap,
  58. }
  59. c.WriteResult(w, r, res)
  60. }