get_configmap.go 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960
  1. package namespace
  2. import (
  3. "net/http"
  4. "github.com/porter-dev/porter/api/server/authz"
  5. "github.com/porter-dev/porter/api/server/handlers"
  6. "github.com/porter-dev/porter/api/server/shared"
  7. "github.com/porter-dev/porter/api/server/shared/apierrors"
  8. "github.com/porter-dev/porter/api/server/shared/config"
  9. "github.com/porter-dev/porter/api/types"
  10. "github.com/porter-dev/porter/internal/models"
  11. )
  12. type GetConfigMapHandler struct {
  13. handlers.PorterHandlerReadWriter
  14. authz.KubernetesAgentGetter
  15. }
  16. func NewGetConfigMapHandler(
  17. config *config.Config,
  18. decoderValidator shared.RequestDecoderValidator,
  19. writer shared.ResultWriter,
  20. ) *GetConfigMapHandler {
  21. return &GetConfigMapHandler{
  22. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  23. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  24. }
  25. }
  26. func (c *GetConfigMapHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  27. request := &types.GetConfigMapRequest{}
  28. if ok := c.DecodeAndValidate(w, r, request); !ok {
  29. return
  30. }
  31. namespace := r.Context().Value(types.NamespaceScope).(string)
  32. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  33. agent, err := c.GetAgent(r, cluster, "")
  34. if err != nil {
  35. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  36. return
  37. }
  38. configMap, err := agent.GetConfigMap(request.Name, namespace)
  39. if err != nil {
  40. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  41. return
  42. }
  43. var res = types.GetConfigMapResponse{
  44. ConfigMap: configMap,
  45. }
  46. c.WriteResult(w, r, res)
  47. }