are_external_providers_enabled.go 2.9 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970
  1. package environment_groups
  2. import (
  3. "net/http"
  4. "connectrpc.com/connect"
  5. porterv1 "github.com/porter-dev/api-contracts/generated/go/porter/v1"
  6. "github.com/porter-dev/porter/api/server/authz"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/types"
  12. "github.com/porter-dev/porter/internal/models"
  13. "github.com/porter-dev/porter/internal/telemetry"
  14. )
  15. // AreExternalProvidersEnabledHandler is the handler for the /environment-group/are-external-providers-enabled endpoint
  16. type AreExternalProvidersEnabledHandler struct {
  17. handlers.PorterHandlerReadWriter
  18. authz.KubernetesAgentGetter
  19. }
  20. // NewAreExternalProvidersEnabledHandler creates an instance of AreExternalProvidersEnabledHandler
  21. func NewAreExternalProvidersEnabledHandler(
  22. config *config.Config,
  23. decoderValidator shared.RequestDecoderValidator,
  24. writer shared.ResultWriter,
  25. ) *AreExternalProvidersEnabledHandler {
  26. return &AreExternalProvidersEnabledHandler{
  27. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  28. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  29. }
  30. }
  31. // AreExternalProvidersEnabledResponse is the response object for the /environment-group/are-external-providers-enabled endpoint
  32. type AreExternalProvidersEnabledResponse struct {
  33. // Enabled is true if external providers are enabled
  34. Enabled bool `json:"enabled"`
  35. // ReprovisionRequired is true if the cluster needs to be reprovisioned to enable external providers
  36. ReprovisionRequired bool `json:"reprovision_required"`
  37. // K8SUpgradeRequired is true if the cluster needs to be upgraded to v1.27 to enable external providers
  38. K8SUpgradeRequired bool `json:"k8s_upgrade_required"`
  39. }
  40. // ServeHTTP checks if external providers are enabled
  41. func (c *AreExternalProvidersEnabledHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  42. ctx, span := telemetry.NewSpan(r.Context(), "serve-are-external-providers-enabled")
  43. defer span.End()
  44. project, _ := ctx.Value(types.ProjectScope).(*models.Project)
  45. cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster)
  46. resp, err := c.Config().ClusterControlPlaneClient.AreExternalEnvGroupProvidersEnabled(ctx, connect.NewRequest(&porterv1.AreExternalEnvGroupProvidersEnabledRequest{
  47. ProjectId: int64(project.ID),
  48. ClusterId: int64(cluster.ID),
  49. }))
  50. if err != nil {
  51. err := telemetry.Error(ctx, span, err, "unable to check if external providers are enabled")
  52. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  53. return
  54. }
  55. c.WriteResult(w, r, &AreExternalProvidersEnabledResponse{
  56. Enabled: resp.Msg.Enabled,
  57. ReprovisionRequired: resp.Msg.ReprovisionRequired,
  58. K8SUpgradeRequired: resp.Msg.K8SUpgradeRequired,
  59. })
  60. }