2
0

get_kubeconfig.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. package cluster
  2. import (
  3. "encoding/base64"
  4. "net/http"
  5. "github.com/bufbuild/connect-go"
  6. porterv1 "github.com/porter-dev/api-contracts/generated/go/porter/v1"
  7. "github.com/porter-dev/porter/api/server/authz"
  8. "github.com/porter-dev/porter/api/server/handlers"
  9. "github.com/porter-dev/porter/api/server/shared"
  10. "github.com/porter-dev/porter/api/server/shared/apierrors"
  11. "github.com/porter-dev/porter/api/server/shared/config"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/models"
  14. "github.com/porter-dev/porter/internal/telemetry"
  15. "k8s.io/client-go/tools/clientcmd"
  16. )
  17. type GetTemporaryKubeconfigHandler struct {
  18. handlers.PorterHandlerWriter
  19. authz.KubernetesAgentGetter
  20. }
  21. func NewGetTemporaryKubeconfigHandler(
  22. config *config.Config,
  23. writer shared.ResultWriter,
  24. ) *GetTemporaryKubeconfigHandler {
  25. return &GetTemporaryKubeconfigHandler{
  26. PorterHandlerWriter: handlers.NewDefaultPorterHandler(config, nil, writer),
  27. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  28. }
  29. }
  30. func (c *GetTemporaryKubeconfigHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  31. ctx, span := telemetry.NewSpan(r.Context(), "serve-get-temporary-kubeconfig")
  32. defer span.End()
  33. if c.Config().ServerConf.DisableTemporaryKubeconfig {
  34. e := telemetry.Error(ctx, span, nil, "temporary kubeconfig generation is disabled on this instance")
  35. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusNotFound))
  36. return
  37. }
  38. cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster)
  39. outOfClusterConfig := c.GetOutOfClusterConfig(cluster)
  40. if cluster.ProvisionedBy == "CAPI" {
  41. kubeconfigResp, err := c.Config().ClusterControlPlaneClient.KubeConfigForCluster(ctx, connect.NewRequest(
  42. &porterv1.KubeConfigForClusterRequest{
  43. ProjectId: int64(cluster.ProjectID),
  44. ClusterId: int64(cluster.ID),
  45. },
  46. ))
  47. if err != nil {
  48. e := telemetry.Error(ctx, span, err, "error getting temporary capi config")
  49. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusInternalServerError))
  50. return
  51. }
  52. if kubeconfigResp.Msg == nil {
  53. e := telemetry.Error(ctx, span, err, "error reading temporary capi config")
  54. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusInternalServerError))
  55. return
  56. }
  57. b64, err := base64.StdEncoding.DecodeString(kubeconfigResp.Msg.KubeConfig)
  58. if err != nil {
  59. e := telemetry.Error(ctx, span, err, "unable to decode base64 kubeconfig")
  60. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(e, http.StatusInternalServerError))
  61. return
  62. }
  63. res := &types.GetTemporaryKubeconfigResponse{
  64. Kubeconfig: b64,
  65. }
  66. c.WriteResult(w, r, res)
  67. return
  68. }
  69. kubeconfig, err := outOfClusterConfig.CreateRawConfigFromCluster(ctx)
  70. if err != nil {
  71. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  72. return
  73. }
  74. kubeconfigBytes, err := clientcmd.Write(*kubeconfig)
  75. if err != nil {
  76. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  77. return
  78. }
  79. res := &types.GetTemporaryKubeconfigResponse{
  80. Kubeconfig: kubeconfigBytes,
  81. }
  82. c.WriteResult(w, r, res)
  83. }