create.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232
  1. package envgroup
  2. import (
  3. "errors"
  4. "fmt"
  5. "strconv"
  6. "strings"
  7. "github.com/porter-dev/porter/api/types"
  8. "github.com/porter-dev/porter/internal/helm"
  9. "github.com/porter-dev/porter/internal/kubernetes"
  10. "helm.sh/helm/v3/pkg/release"
  11. v1 "k8s.io/api/core/v1"
  12. )
  13. func ConvertV1ToV2EnvGroup(agent *kubernetes.Agent, name, namespace string) (*v1.ConfigMap, error) {
  14. cm, err := agent.GetConfigMap(name, namespace)
  15. if err != nil {
  16. return nil, err
  17. }
  18. secret, err := agent.GetSecret(name, namespace)
  19. if err != nil {
  20. return nil, err
  21. }
  22. variables := make(map[string]string)
  23. secretVariables := make(map[string]string)
  24. for key, val := range cm.Data {
  25. if strings.Contains(val, "PORTERSECRET") {
  26. secretVariables[key] = val
  27. } else {
  28. variables[key] = val
  29. }
  30. }
  31. for key, val := range secret.Data {
  32. secretVariables[key] = string(val)
  33. }
  34. envGroup, err := CreateEnvGroup(agent, types.ConfigMapInput{
  35. Name: name,
  36. Namespace: namespace,
  37. Variables: variables,
  38. SecretVariables: secretVariables,
  39. })
  40. if err != nil {
  41. return nil, err
  42. }
  43. // delete the old configmap and secret
  44. if err := agent.DeleteLinkedSecret(name, namespace); err != nil {
  45. return nil, err
  46. }
  47. if err := agent.DeleteConfigMap(name, namespace); err != nil {
  48. return nil, err
  49. }
  50. return envGroup, nil
  51. }
  52. func CreateEnvGroup(agent *kubernetes.Agent, input types.ConfigMapInput) (*v1.ConfigMap, error) {
  53. // look for a latest configmap
  54. oldCM, latestVersion, err := agent.GetLatestVersionedConfigMap(input.Name, input.Namespace)
  55. if err != nil && !errors.Is(err, kubernetes.IsNotFoundError) {
  56. return nil, err
  57. } else if err != nil {
  58. latestVersion = 1
  59. } else {
  60. latestVersion += 1
  61. }
  62. apps := make([]string, 0)
  63. if oldCM != nil {
  64. oldEG, err := ToEnvGroup(oldCM)
  65. if err == nil {
  66. apps = oldEG.Applications
  67. }
  68. }
  69. oldSecret, _, err := agent.GetLatestVersionedSecret(input.Name, input.Namespace)
  70. if err != nil && !errors.Is(err, kubernetes.IsNotFoundError) {
  71. return nil, err
  72. } else if err == nil && oldSecret != nil {
  73. // In this case, we find all old variables referencing a secret value, and add those
  74. // values to the new secret variables. The frontend will only send **new** secret values.
  75. for key1, val1 := range input.Variables {
  76. if strings.Contains(val1, "PORTERSECRET") {
  77. // get that value from the secret
  78. for key2, val2 := range oldSecret.Data {
  79. if key2 == key1 {
  80. input.SecretVariables[key1] = string(val2)
  81. }
  82. }
  83. }
  84. }
  85. }
  86. // add all secret env variables to configmap with value PORTERSECRET_${configmap_name}
  87. for key := range input.SecretVariables {
  88. input.Variables[key] = fmt.Sprintf("PORTERSECRET_%s.v%d", input.Name, latestVersion)
  89. }
  90. cm, err := agent.CreateVersionedConfigMap(input.Name, input.Namespace, latestVersion, input.Variables, apps...)
  91. if err != nil {
  92. return nil, err
  93. }
  94. secretData := EncodeSecrets(input.SecretVariables)
  95. // create secret first
  96. if _, err := agent.CreateLinkedVersionedSecret(input.Name, input.Namespace, cm.ObjectMeta.Name, latestVersion, secretData); err != nil {
  97. return nil, err
  98. }
  99. return cm, err
  100. }
  101. func ToEnvGroup(configMap *v1.ConfigMap) (*types.EnvGroup, error) {
  102. res := &types.EnvGroup{
  103. CreatedAt: configMap.ObjectMeta.CreationTimestamp.Time,
  104. Namespace: configMap.Namespace,
  105. Variables: configMap.Data,
  106. }
  107. // if the label "porter"="true" exists, this is a V1 env group
  108. porterLabel, porterLabelExists := configMap.Labels["porter"]
  109. if porterLabelExists && porterLabel == "true" {
  110. res.MetaVersion = 1
  111. res.Name = configMap.ObjectMeta.Name
  112. return res, nil
  113. }
  114. // set the meta version to 2 if porter label is not captured
  115. res.MetaVersion = 2
  116. // get the name
  117. name, nameExists := configMap.Labels["envgroup"]
  118. if !nameExists {
  119. return nil, fmt.Errorf("not a valid configmap: envgroup label does not exist")
  120. }
  121. res.Name = name
  122. // get the version
  123. versionLabelStr, versionLabelExists := configMap.Labels["version"]
  124. if !versionLabelExists {
  125. return nil, fmt.Errorf("not a valid configmap: version label does not exist")
  126. }
  127. versionInt, err := strconv.Atoi(versionLabelStr)
  128. if err != nil {
  129. return nil, fmt.Errorf("not a valid configmap, error converting version: %v", err)
  130. }
  131. res.Version = uint(versionInt)
  132. // get applications, if they exist
  133. appStr, appAnnonExists := configMap.Annotations[kubernetes.PorterAppAnnotationName]
  134. if appAnnonExists && appStr != "" {
  135. res.Applications = strings.Split(appStr, ",")
  136. } else {
  137. res.Applications = []string{}
  138. }
  139. return res, nil
  140. }
  141. func GetSyncedReleases(helmAgent *helm.Agent, configMap *v1.ConfigMap) ([]*release.Release, error) {
  142. res := make([]*release.Release, 0)
  143. // get applications, if they exist
  144. appStr, appAnnonExists := configMap.Annotations[kubernetes.PorterAppAnnotationName]
  145. if !appAnnonExists || appStr == "" {
  146. return res, nil
  147. }
  148. appStrArr := strings.Split(appStr, ",")
  149. // list all latest helm releases and check them against app string
  150. releases, err := helmAgent.ListReleases(configMap.Namespace, &types.ReleaseListFilter{
  151. StatusFilter: []string{
  152. "deployed",
  153. "uninstalled",
  154. "pending",
  155. "pending-install",
  156. "pending-upgrade",
  157. "pending-rollback",
  158. "failed",
  159. },
  160. })
  161. if err != nil {
  162. return nil, err
  163. }
  164. for _, rel := range releases {
  165. for _, appName := range appStrArr {
  166. if rel.Name == appName {
  167. res = append(res, rel)
  168. }
  169. }
  170. }
  171. return res, nil
  172. }
  173. func EncodeSecrets(data map[string]string) map[string][]byte {
  174. res := make(map[string][]byte)
  175. for key, rawValue := range data {
  176. res[key] = []byte(rawValue)
  177. }
  178. return res
  179. }