router.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803
  1. package router
  2. import (
  3. "net/http"
  4. "os"
  5. "github.com/go-chi/chi"
  6. "github.com/porter-dev/porter/server/api"
  7. "github.com/porter-dev/porter/server/requestlog"
  8. mw "github.com/porter-dev/porter/server/router/middleware"
  9. )
  10. // New creates a new Chi router instance and registers all routes supported by the
  11. // API
  12. func New(a *api.App) *chi.Mux {
  13. l := a.Logger
  14. r := chi.NewRouter()
  15. auth := mw.NewAuth(a.Store, a.ServerConf.CookieName, a.Repo)
  16. r.Route("/api", func(r chi.Router) {
  17. r.Use(mw.ContentTypeJSON)
  18. // health checks
  19. r.Method("GET", "/livez", http.HandlerFunc(a.HandleLive))
  20. r.Method("GET", "/readyz", http.HandlerFunc(a.HandleReady))
  21. // /api/users routes
  22. r.Method(
  23. "GET",
  24. "/users/{user_id}",
  25. auth.DoesUserIDMatch(
  26. requestlog.NewHandler(a.HandleReadUser, l),
  27. mw.URLParam,
  28. ),
  29. )
  30. r.Method(
  31. "GET",
  32. "/users/{user_id}/projects",
  33. auth.DoesUserIDMatch(
  34. requestlog.NewHandler(a.HandleListUserProjects, l),
  35. mw.URLParam,
  36. ),
  37. )
  38. r.Method(
  39. "POST",
  40. "/users",
  41. requestlog.NewHandler(a.HandleCreateUser, l),
  42. )
  43. r.Method(
  44. "DELETE",
  45. "/users/{user_id}",
  46. auth.DoesUserIDMatch(
  47. requestlog.NewHandler(a.HandleDeleteUser, l),
  48. mw.URLParam,
  49. ),
  50. )
  51. r.Method(
  52. "POST",
  53. "/login",
  54. requestlog.NewHandler(a.HandleLoginUser, l),
  55. )
  56. r.Method(
  57. "GET",
  58. "/auth/check",
  59. auth.BasicAuthenticate(
  60. requestlog.NewHandler(a.HandleAuthCheck, l),
  61. ),
  62. )
  63. r.Method(
  64. "POST",
  65. "/logout",
  66. auth.BasicAuthenticate(
  67. requestlog.NewHandler(a.HandleLogoutUser, l),
  68. ),
  69. )
  70. // /api/integrations routes
  71. r.Method(
  72. "GET",
  73. "/integrations/cluster",
  74. auth.BasicAuthenticate(
  75. requestlog.NewHandler(a.HandleListClusterIntegrations, l),
  76. ),
  77. )
  78. r.Method(
  79. "GET",
  80. "/integrations/registry",
  81. auth.BasicAuthenticate(
  82. requestlog.NewHandler(a.HandleListRegistryIntegrations, l),
  83. ),
  84. )
  85. r.Method(
  86. "GET",
  87. "/integrations/helm",
  88. auth.BasicAuthenticate(
  89. requestlog.NewHandler(a.HandleListHelmRepoIntegrations, l),
  90. ),
  91. )
  92. r.Method(
  93. "GET",
  94. "/integrations/repo",
  95. auth.BasicAuthenticate(
  96. requestlog.NewHandler(a.HandleListRepoIntegrations, l),
  97. ),
  98. )
  99. // /api/templates routes
  100. r.Method(
  101. "GET",
  102. "/templates",
  103. auth.BasicAuthenticate(
  104. requestlog.NewHandler(a.HandleListTemplates, l),
  105. ),
  106. )
  107. r.Method(
  108. "GET",
  109. "/templates/{name}/{version}",
  110. auth.BasicAuthenticate(
  111. requestlog.NewHandler(a.HandleReadTemplate, l),
  112. ),
  113. )
  114. // /api/oauth routes
  115. r.Method(
  116. "GET",
  117. "/oauth/projects/{project_id}/github",
  118. auth.DoesUserHaveProjectAccess(
  119. requestlog.NewHandler(a.HandleGithubOAuthStartProject, l),
  120. mw.URLParam,
  121. mw.WriteAccess,
  122. ),
  123. )
  124. r.Method(
  125. "GET",
  126. "/oauth/github/callback",
  127. requestlog.NewHandler(a.HandleGithubOAuthCallback, l),
  128. )
  129. // /api/projects routes
  130. r.Method(
  131. "GET",
  132. "/projects/{project_id}",
  133. auth.DoesUserHaveProjectAccess(
  134. requestlog.NewHandler(a.HandleReadProject, l),
  135. mw.URLParam,
  136. mw.ReadAccess,
  137. ),
  138. )
  139. r.Method(
  140. "POST",
  141. "/projects",
  142. auth.BasicAuthenticate(
  143. requestlog.NewHandler(a.HandleCreateProject, l),
  144. ),
  145. )
  146. r.Method(
  147. "DELETE",
  148. "/projects/{project_id}",
  149. auth.DoesUserHaveProjectAccess(
  150. requestlog.NewHandler(a.HandleDeleteProject, l),
  151. mw.URLParam,
  152. mw.WriteAccess,
  153. ),
  154. )
  155. // /api/projects/{project_id}/infra routes
  156. r.Method(
  157. "GET",
  158. "/projects/{project_id}/infra",
  159. auth.DoesUserHaveProjectAccess(
  160. requestlog.NewHandler(a.HandleListProjectInfra, l),
  161. mw.URLParam,
  162. mw.ReadAccess,
  163. ),
  164. )
  165. // /api/projects/{project_id}/provision routes
  166. r.Method(
  167. "POST",
  168. "/projects/{project_id}/provision/test",
  169. auth.DoesUserHaveProjectAccess(
  170. requestlog.NewHandler(a.HandleProvisionTest, l),
  171. mw.URLParam,
  172. mw.ReadAccess,
  173. ),
  174. )
  175. r.Method(
  176. "POST",
  177. "/projects/{project_id}/provision/ecr",
  178. auth.DoesUserHaveProjectAccess(
  179. requestlog.NewHandler(a.HandleProvisionAWSECRInfra, l),
  180. mw.URLParam,
  181. mw.ReadAccess,
  182. ),
  183. )
  184. r.Method(
  185. "POST",
  186. "/projects/{project_id}/provision/eks",
  187. auth.DoesUserHaveProjectAccess(
  188. requestlog.NewHandler(a.HandleProvisionAWSEKSInfra, l),
  189. mw.URLParam,
  190. mw.ReadAccess,
  191. ),
  192. )
  193. r.Method(
  194. "GET",
  195. "/projects/{project_id}/provision/{kind}/{infra_id}/logs",
  196. auth.DoesUserHaveProjectAccess(
  197. auth.DoesUserHaveInfraAccess(
  198. requestlog.NewHandler(a.HandleGetProvisioningLogs, l),
  199. mw.URLParam,
  200. mw.URLParam,
  201. ),
  202. mw.URLParam,
  203. mw.ReadAccess,
  204. ),
  205. )
  206. r.Method(
  207. "POST",
  208. "/projects/{project_id}/provision/{kind}/{infra_id}/logs",
  209. auth.DoesUserHaveProjectAccess(
  210. auth.DoesUserHaveInfraAccess(
  211. requestlog.NewHandler(a.HandleGetProvisioningLogs, l),
  212. mw.URLParam,
  213. mw.URLParam,
  214. ),
  215. mw.URLParam,
  216. mw.ReadAccess,
  217. ),
  218. )
  219. r.Method(
  220. "POST",
  221. "/projects/{project_id}/infra/{infra_id}/ecr/destroy",
  222. auth.DoesUserHaveProjectAccess(
  223. auth.DoesUserHaveInfraAccess(
  224. requestlog.NewHandler(a.HandleDestroyAWSECRInfra, l),
  225. mw.URLParam,
  226. mw.URLParam,
  227. ),
  228. mw.URLParam,
  229. mw.ReadAccess,
  230. ),
  231. )
  232. r.Method(
  233. "POST",
  234. "/projects/{project_id}/infra/{infra_id}/eks/destroy",
  235. auth.DoesUserHaveProjectAccess(
  236. auth.DoesUserHaveInfraAccess(
  237. requestlog.NewHandler(a.HandleDestroyAWSEKSInfra, l),
  238. mw.URLParam,
  239. mw.URLParam,
  240. ),
  241. mw.URLParam,
  242. mw.ReadAccess,
  243. ),
  244. )
  245. // /api/projects/{project_id}/clusters routes
  246. r.Method(
  247. "GET",
  248. "/projects/{project_id}/clusters",
  249. auth.DoesUserHaveProjectAccess(
  250. requestlog.NewHandler(a.HandleListProjectClusters, l),
  251. mw.URLParam,
  252. mw.ReadAccess,
  253. ),
  254. )
  255. r.Method(
  256. "POST",
  257. "/projects/{project_id}/clusters",
  258. auth.DoesUserHaveProjectAccess(
  259. requestlog.NewHandler(a.HandleCreateProjectCluster, l),
  260. mw.URLParam,
  261. mw.ReadAccess,
  262. ),
  263. )
  264. r.Method(
  265. "GET",
  266. "/projects/{project_id}/clusters/{cluster_id}",
  267. auth.DoesUserHaveProjectAccess(
  268. auth.DoesUserHaveClusterAccess(
  269. requestlog.NewHandler(a.HandleReadProjectCluster, l),
  270. mw.URLParam,
  271. mw.URLParam,
  272. ),
  273. mw.URLParam,
  274. mw.ReadAccess,
  275. ),
  276. )
  277. r.Method(
  278. "POST",
  279. "/projects/{project_id}/clusters/{cluster_id}",
  280. auth.DoesUserHaveProjectAccess(
  281. auth.DoesUserHaveClusterAccess(
  282. requestlog.NewHandler(a.HandleUpdateProjectCluster, l),
  283. mw.URLParam,
  284. mw.URLParam,
  285. ),
  286. mw.URLParam,
  287. mw.WriteAccess,
  288. ),
  289. )
  290. r.Method(
  291. "DELETE",
  292. "/projects/{project_id}/clusters/{cluster_id}",
  293. auth.DoesUserHaveProjectAccess(
  294. auth.DoesUserHaveClusterAccess(
  295. requestlog.NewHandler(a.HandleDeleteProjectCluster, l),
  296. mw.URLParam,
  297. mw.URLParam,
  298. ),
  299. mw.URLParam,
  300. mw.WriteAccess,
  301. ),
  302. )
  303. // /api/projects/{project_id}/clusters/candidates routes
  304. r.Method(
  305. "POST",
  306. "/projects/{project_id}/clusters/candidates",
  307. auth.DoesUserHaveProjectAccess(
  308. requestlog.NewHandler(a.HandleCreateProjectClusterCandidates, l),
  309. mw.URLParam,
  310. mw.WriteAccess,
  311. ),
  312. )
  313. r.Method(
  314. "GET",
  315. "/projects/{project_id}/clusters/candidates",
  316. auth.DoesUserHaveProjectAccess(
  317. requestlog.NewHandler(a.HandleListProjectClusterCandidates, l),
  318. mw.URLParam,
  319. mw.WriteAccess,
  320. ),
  321. )
  322. r.Method(
  323. "POST",
  324. "/projects/{project_id}/clusters/candidates/{candidate_id}/resolve",
  325. auth.DoesUserHaveProjectAccess(
  326. requestlog.NewHandler(a.HandleResolveClusterCandidate, l),
  327. mw.URLParam,
  328. mw.WriteAccess,
  329. ),
  330. )
  331. // /api/projects/{project_id}/integrations routes
  332. r.Method(
  333. "POST",
  334. "/projects/{project_id}/integrations/gcp",
  335. auth.DoesUserHaveProjectAccess(
  336. requestlog.NewHandler(a.HandleCreateGCPIntegration, l),
  337. mw.URLParam,
  338. mw.WriteAccess,
  339. ),
  340. )
  341. r.Method(
  342. "POST",
  343. "/projects/{project_id}/integrations/aws",
  344. auth.DoesUserHaveProjectAccess(
  345. requestlog.NewHandler(a.HandleCreateAWSIntegration, l),
  346. mw.URLParam,
  347. mw.WriteAccess,
  348. ),
  349. )
  350. r.Method(
  351. "POST",
  352. "/projects/{project_id}/integrations/basic",
  353. auth.DoesUserHaveProjectAccess(
  354. requestlog.NewHandler(a.HandleCreateBasicAuthIntegration, l),
  355. mw.URLParam,
  356. mw.WriteAccess,
  357. ),
  358. )
  359. // /api/projects/{project_id}/helmrepos routes
  360. r.Method(
  361. "POST",
  362. "/projects/{project_id}/helmrepos",
  363. auth.DoesUserHaveProjectAccess(
  364. requestlog.NewHandler(a.HandleCreateHelmRepo, l),
  365. mw.URLParam,
  366. mw.WriteAccess,
  367. ),
  368. )
  369. r.Method(
  370. "GET",
  371. "/projects/{project_id}/helmrepos",
  372. auth.DoesUserHaveProjectAccess(
  373. requestlog.NewHandler(a.HandleListProjectHelmRepos, l),
  374. mw.URLParam,
  375. mw.WriteAccess,
  376. ),
  377. )
  378. r.Method(
  379. "GET",
  380. "/projects/{project_id}/helmrepos/{helm_id}/charts",
  381. auth.DoesUserHaveProjectAccess(
  382. requestlog.NewHandler(a.HandleListHelmRepoCharts, l),
  383. mw.URLParam,
  384. mw.WriteAccess,
  385. ),
  386. )
  387. // /api/projects/{project_id}/registries routes
  388. r.Method(
  389. "POST",
  390. "/projects/{project_id}/registries",
  391. auth.DoesUserHaveProjectAccess(
  392. requestlog.NewHandler(a.HandleCreateRegistry, l),
  393. mw.URLParam,
  394. mw.WriteAccess,
  395. ),
  396. )
  397. r.Method(
  398. "GET",
  399. "/projects/{project_id}/registries",
  400. auth.DoesUserHaveProjectAccess(
  401. requestlog.NewHandler(a.HandleListProjectRegistries, l),
  402. mw.URLParam,
  403. mw.WriteAccess,
  404. ),
  405. )
  406. r.Method(
  407. "POST",
  408. "/projects/{project_id}/registries/{registry_id}",
  409. auth.DoesUserHaveProjectAccess(
  410. auth.DoesUserHaveRegistryAccess(
  411. requestlog.NewHandler(a.HandleUpdateProjectRegistry, l),
  412. mw.URLParam,
  413. mw.URLParam,
  414. ),
  415. mw.URLParam,
  416. mw.WriteAccess,
  417. ),
  418. )
  419. r.Method(
  420. "GET",
  421. "/projects/{project_id}/registries/ecr/{region}/token",
  422. auth.DoesUserHaveProjectAccess(
  423. requestlog.NewHandler(a.HandleGetProjectRegistryECRToken, l),
  424. mw.URLParam,
  425. mw.WriteAccess,
  426. ),
  427. )
  428. r.Method(
  429. "DELETE",
  430. "/projects/{project_id}/registries/{registry_id}",
  431. auth.DoesUserHaveProjectAccess(
  432. auth.DoesUserHaveRegistryAccess(
  433. requestlog.NewHandler(a.HandleDeleteProjectRegistry, l),
  434. mw.URLParam,
  435. mw.URLParam,
  436. ),
  437. mw.URLParam,
  438. mw.WriteAccess,
  439. ),
  440. )
  441. // /api/projects/{project_id}/registries/{registry_id}/repositories routes
  442. r.Method(
  443. "GET",
  444. "/projects/{project_id}/registries/{registry_id}/repositories",
  445. auth.DoesUserHaveProjectAccess(
  446. auth.DoesUserHaveRegistryAccess(
  447. requestlog.NewHandler(a.HandleListRepositories, l),
  448. mw.URLParam,
  449. mw.URLParam,
  450. ),
  451. mw.URLParam,
  452. mw.WriteAccess,
  453. ),
  454. )
  455. r.Method(
  456. "GET",
  457. // * is the repo name, which can itself be nested
  458. // for example, for GCR this is project-id/repo
  459. // need to use wildcard, see https://github.com/go-chi/chi/issues/243
  460. "/projects/{project_id}/registries/{registry_id}/repositories/*",
  461. auth.DoesUserHaveProjectAccess(
  462. auth.DoesUserHaveRegistryAccess(
  463. requestlog.NewHandler(a.HandleListImages, l),
  464. mw.URLParam,
  465. mw.URLParam,
  466. ),
  467. mw.URLParam,
  468. mw.WriteAccess,
  469. ),
  470. )
  471. // /api/projects/{project_id}/releases routes
  472. r.Method(
  473. "GET",
  474. "/projects/{project_id}/releases",
  475. auth.DoesUserHaveProjectAccess(
  476. auth.DoesUserHaveClusterAccess(
  477. requestlog.NewHandler(a.HandleListReleases, l),
  478. mw.URLParam,
  479. mw.QueryParam,
  480. ),
  481. mw.URLParam,
  482. mw.ReadAccess,
  483. ),
  484. )
  485. r.Method(
  486. "GET",
  487. "/projects/{project_id}/releases/{name}/{revision}/components",
  488. auth.DoesUserHaveProjectAccess(
  489. auth.DoesUserHaveClusterAccess(
  490. requestlog.NewHandler(a.HandleGetReleaseComponents, l),
  491. mw.URLParam,
  492. mw.QueryParam,
  493. ),
  494. mw.URLParam,
  495. mw.ReadAccess,
  496. ),
  497. )
  498. r.Method(
  499. "GET",
  500. "/projects/{project_id}/releases/{name}/{revision}/controllers",
  501. auth.DoesUserHaveProjectAccess(
  502. auth.DoesUserHaveClusterAccess(
  503. requestlog.NewHandler(a.HandleGetReleaseControllers, l),
  504. mw.URLParam,
  505. mw.QueryParam,
  506. ),
  507. mw.URLParam,
  508. mw.ReadAccess,
  509. ),
  510. )
  511. r.Method(
  512. "GET",
  513. "/projects/{project_id}/releases/{name}/history",
  514. auth.DoesUserHaveProjectAccess(
  515. auth.DoesUserHaveClusterAccess(
  516. requestlog.NewHandler(a.HandleListReleaseHistory, l),
  517. mw.URLParam,
  518. mw.QueryParam,
  519. ),
  520. mw.URLParam,
  521. mw.ReadAccess,
  522. ),
  523. )
  524. r.Method(
  525. "GET",
  526. "/projects/{project_id}/releases/{name}/webhook_token",
  527. auth.DoesUserHaveProjectAccess(
  528. auth.DoesUserHaveClusterAccess(
  529. requestlog.NewHandler(a.HandleGetReleaseToken, l),
  530. mw.URLParam,
  531. mw.QueryParam,
  532. ),
  533. mw.URLParam,
  534. mw.ReadAccess,
  535. ),
  536. )
  537. r.Method(
  538. "POST",
  539. "/projects/{project_id}/releases/{name}/upgrade",
  540. auth.DoesUserHaveProjectAccess(
  541. auth.DoesUserHaveClusterAccess(
  542. requestlog.NewHandler(a.HandleUpgradeRelease, l),
  543. mw.URLParam,
  544. mw.QueryParam,
  545. ),
  546. mw.URLParam,
  547. mw.ReadAccess,
  548. ),
  549. )
  550. r.Method(
  551. "GET",
  552. "/projects/{project_id}/releases/{name}/{revision}",
  553. auth.DoesUserHaveProjectAccess(
  554. auth.DoesUserHaveClusterAccess(
  555. requestlog.NewHandler(a.HandleGetRelease, l),
  556. mw.URLParam,
  557. mw.QueryParam,
  558. ),
  559. mw.URLParam,
  560. mw.ReadAccess,
  561. ),
  562. )
  563. r.Method(
  564. "POST",
  565. "/projects/{project_id}/releases/{name}/rollback",
  566. auth.DoesUserHaveProjectAccess(
  567. auth.DoesUserHaveClusterAccess(
  568. requestlog.NewHandler(a.HandleRollbackRelease, l),
  569. mw.URLParam,
  570. mw.QueryParam,
  571. ),
  572. mw.URLParam,
  573. mw.ReadAccess,
  574. ),
  575. )
  576. // r.Method(
  577. // "POST",
  578. // "/projects/{project_id}/releases/{name}/upgrade/hook",
  579. // requestlog.NewHandler(a.HandleReleaseDeployHook, l),
  580. // )
  581. r.Method(
  582. "POST",
  583. "/webhooks/deploy/{token}",
  584. requestlog.NewHandler(a.HandleReleaseDeployWebhook, l),
  585. )
  586. // /api/projects/{project_id}/gitrepos routes
  587. r.Method(
  588. "GET",
  589. "/projects/{project_id}/gitrepos",
  590. auth.DoesUserHaveProjectAccess(
  591. requestlog.NewHandler(a.HandleListProjectGitRepos, l),
  592. mw.URLParam,
  593. mw.ReadAccess,
  594. ),
  595. )
  596. r.Method(
  597. "GET",
  598. "/projects/{project_id}/gitrepos/{git_repo_id}/repos",
  599. auth.DoesUserHaveProjectAccess(
  600. auth.DoesUserHaveGitRepoAccess(
  601. requestlog.NewHandler(a.HandleListRepos, l),
  602. mw.URLParam,
  603. mw.QueryParam,
  604. ),
  605. mw.URLParam,
  606. mw.ReadAccess,
  607. ),
  608. )
  609. r.Method(
  610. "GET",
  611. "/projects/{project_id}/gitrepos/{git_repo_id}/repos/{kind}/{name}/branches",
  612. auth.DoesUserHaveProjectAccess(
  613. auth.DoesUserHaveGitRepoAccess(
  614. requestlog.NewHandler(a.HandleGetBranches, l),
  615. mw.URLParam,
  616. mw.QueryParam,
  617. ),
  618. mw.URLParam,
  619. mw.ReadAccess,
  620. ),
  621. )
  622. r.Method(
  623. "GET",
  624. "/projects/{project_id}/gitrepos/{git_repo_id}/repos/{kind}/{name}/{branch}/contents",
  625. auth.DoesUserHaveProjectAccess(
  626. auth.DoesUserHaveGitRepoAccess(
  627. requestlog.NewHandler(a.HandleGetBranchContents, l),
  628. mw.URLParam,
  629. mw.QueryParam,
  630. ),
  631. mw.URLParam,
  632. mw.ReadAccess,
  633. ),
  634. )
  635. // /api/projects/{project_id}/deploy routes
  636. r.Method(
  637. "POST",
  638. "/projects/{project_id}/deploy/{name}/{version}",
  639. auth.DoesUserHaveProjectAccess(
  640. auth.DoesUserHaveClusterAccess(
  641. requestlog.NewHandler(a.HandleDeployTemplate, l),
  642. mw.URLParam,
  643. mw.QueryParam,
  644. ),
  645. mw.URLParam,
  646. mw.ReadAccess,
  647. ),
  648. )
  649. // /api/projects/{project_id}/k8s routes
  650. r.Method(
  651. "GET",
  652. "/projects/{project_id}/k8s/namespaces",
  653. auth.DoesUserHaveProjectAccess(
  654. auth.DoesUserHaveClusterAccess(
  655. requestlog.NewHandler(a.HandleListNamespaces, l),
  656. mw.URLParam,
  657. mw.QueryParam,
  658. ),
  659. mw.URLParam,
  660. mw.ReadAccess,
  661. ),
  662. )
  663. r.Method(
  664. "GET",
  665. "/projects/{project_id}/k8s/{namespace}/pod/{name}/logs",
  666. auth.DoesUserHaveProjectAccess(
  667. auth.DoesUserHaveClusterAccess(
  668. requestlog.NewHandler(a.HandleGetPodLogs, l),
  669. mw.URLParam,
  670. mw.QueryParam,
  671. ),
  672. mw.URLParam,
  673. mw.ReadAccess,
  674. ),
  675. )
  676. r.Method(
  677. "GET",
  678. "/projects/{project_id}/k8s/{namespace}/ingress/{name}",
  679. auth.DoesUserHaveProjectAccess(
  680. auth.DoesUserHaveClusterAccess(
  681. requestlog.NewHandler(a.HandleGetIngress, l),
  682. mw.URLParam,
  683. mw.QueryParam,
  684. ),
  685. mw.URLParam,
  686. mw.ReadAccess,
  687. ),
  688. )
  689. r.Method(
  690. "GET",
  691. "/projects/{project_id}/k8s/{kind}/status",
  692. auth.DoesUserHaveProjectAccess(
  693. auth.DoesUserHaveClusterAccess(
  694. requestlog.NewHandler(a.HandleStreamControllerStatus, l),
  695. mw.URLParam,
  696. mw.QueryParam,
  697. ),
  698. mw.URLParam,
  699. mw.ReadAccess,
  700. ),
  701. )
  702. r.Method(
  703. "GET",
  704. "/projects/{project_id}/k8s/pods",
  705. auth.DoesUserHaveProjectAccess(
  706. auth.DoesUserHaveClusterAccess(
  707. requestlog.NewHandler(a.HandleListPods, l),
  708. mw.URLParam,
  709. mw.QueryParam,
  710. ),
  711. mw.URLParam,
  712. mw.ReadAccess,
  713. ),
  714. )
  715. })
  716. staticFilePath := a.ServerConf.StaticFilePath
  717. fs := http.FileServer(http.Dir(staticFilePath))
  718. r.Get("/*", func(w http.ResponseWriter, r *http.Request) {
  719. if _, err := os.Stat(staticFilePath + r.RequestURI); os.IsNotExist(err) {
  720. http.StripPrefix(r.URL.Path, fs).ServeHTTP(w, r)
  721. } else {
  722. fs.ServeHTTP(w, r)
  723. }
  724. })
  725. return r
  726. }