get.go 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244
  1. package datastore
  2. import (
  3. "context"
  4. "net/http"
  5. "connectrpc.com/connect"
  6. "github.com/aws/aws-sdk-go/aws/arn"
  7. "github.com/google/uuid"
  8. porterv1 "github.com/porter-dev/api-contracts/generated/go/porter/v1"
  9. "github.com/porter-dev/porter/api/server/authz"
  10. "github.com/porter-dev/porter/api/server/handlers"
  11. "github.com/porter-dev/porter/api/server/handlers/cloud_provider"
  12. "github.com/porter-dev/porter/api/server/shared"
  13. "github.com/porter-dev/porter/api/server/shared/apierrors"
  14. "github.com/porter-dev/porter/api/server/shared/config"
  15. "github.com/porter-dev/porter/api/server/shared/requestutils"
  16. "github.com/porter-dev/porter/api/types"
  17. "github.com/porter-dev/porter/internal/datastore"
  18. "github.com/porter-dev/porter/internal/models"
  19. "github.com/porter-dev/porter/internal/telemetry"
  20. )
  21. // GetDatastoreResponse describes the list datastores response body
  22. type GetDatastoreResponse struct {
  23. // Datastore is the datastore that has been retrieved
  24. Datastore datastore.Datastore `json:"datastore"`
  25. }
  26. // GetDatastoreHandler is a struct for retrieving a datastore
  27. type GetDatastoreHandler struct {
  28. handlers.PorterHandlerReadWriter
  29. authz.KubernetesAgentGetter
  30. }
  31. // NewGetDatastoreHandler returns a GetDatastoreHandler
  32. func NewGetDatastoreHandler(
  33. config *config.Config,
  34. decoderValidator shared.RequestDecoderValidator,
  35. writer shared.ResultWriter,
  36. ) *GetDatastoreHandler {
  37. return &GetDatastoreHandler{
  38. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  39. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  40. }
  41. }
  42. const (
  43. // SupportedDatastoreCloudProvider_AWS is the AWS cloud provider
  44. SupportedDatastoreCloudProvider_AWS string = "AWS"
  45. )
  46. // ServeHTTP retrieves the datastore in the given project
  47. func (c *GetDatastoreHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  48. ctx, span := telemetry.NewSpan(r.Context(), "serve-get-datastore")
  49. defer span.End()
  50. project, _ := ctx.Value(types.ProjectScope).(*models.Project)
  51. resp := GetDatastoreResponse{}
  52. datastoreName, reqErr := requestutils.GetURLParamString(r, types.URLParamDatastoreName)
  53. if reqErr != nil {
  54. err := telemetry.Error(ctx, span, nil, "error parsing datastore name")
  55. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  56. return
  57. }
  58. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "datastore-name", Value: datastoreName})
  59. datastoreRecord, err := c.Repo().Datastore().GetByProjectIDAndName(ctx, project.ID, datastoreName)
  60. if err != nil {
  61. err = telemetry.Error(ctx, span, err, "datastore record not found")
  62. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  63. return
  64. }
  65. if datastoreRecord == nil || datastoreRecord.ID == uuid.Nil {
  66. err = telemetry.Error(ctx, span, nil, "datastore record does not exist")
  67. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusNotFound))
  68. return
  69. }
  70. // TODO: delete this branch once all datastores are on the management cluster
  71. if !datastoreRecord.OnManagementCluster {
  72. awsArn, err := arn.Parse(datastoreRecord.CloudProviderCredentialIdentifier)
  73. if err != nil {
  74. err = telemetry.Error(ctx, span, err, "error parsing aws account id")
  75. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  76. return
  77. }
  78. datastore, err := c.LEGACY_handleGetDatastore(ctx, project.ID, awsArn.AccountID, datastoreName, datastoreRecord.ID)
  79. if err != nil {
  80. err = telemetry.Error(ctx, span, err, "error retrieving datastore")
  81. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  82. return
  83. }
  84. resp.Datastore = datastore
  85. c.WriteResult(w, r, resp)
  86. return
  87. }
  88. ds := datastore.Datastore{
  89. Name: datastoreRecord.Name,
  90. Type: datastoreRecord.Type,
  91. Engine: datastoreRecord.Engine,
  92. CreatedAtUTC: datastoreRecord.CreatedAt,
  93. Status: string(datastoreRecord.Status),
  94. CloudProvider: SupportedDatastoreCloudProvider_AWS,
  95. CloudProviderCredentialIdentifier: datastoreRecord.CloudProviderCredentialIdentifier,
  96. OnManagementCluster: true,
  97. }
  98. // this is done for backwards compatibility; eventually we will just return proto
  99. ds.ConnectedClusterIds = c.connectedClusters(ctx, project, datastoreRecord.ID)
  100. ds.Credential = c.credential(ctx, project, datastoreRecord.ID)
  101. resp.Datastore = ds
  102. c.WriteResult(w, r, resp)
  103. }
  104. // LEGACY_handleGetDatastore retrieves the datastore in the given project for datastores that are on the customer clusters rather than the management cluster
  105. func (c *GetDatastoreHandler) LEGACY_handleGetDatastore(ctx context.Context, projectId uint, accountId string, datastoreName string, datastoreId uuid.UUID) (datastore.Datastore, error) {
  106. ctx, span := telemetry.NewSpan(ctx, "legacy-handle-get-datastore")
  107. defer span.End()
  108. var ds datastore.Datastore
  109. datastores, err := Datastores(ctx, DatastoresInput{
  110. ProjectID: projectId,
  111. CloudProvider: cloud_provider.CloudProvider{
  112. AccountID: accountId,
  113. Type: porterv1.EnumCloudProvider_ENUM_CLOUD_PROVIDER_AWS,
  114. },
  115. Name: datastoreName,
  116. IncludeEnvGroup: true,
  117. IncludeMetadata: true,
  118. CCPClient: c.Config().ClusterControlPlaneClient,
  119. DatastoreRepository: c.Repo().Datastore(),
  120. })
  121. if err != nil {
  122. return ds, telemetry.Error(ctx, span, err, "error listing datastores")
  123. }
  124. if len(datastores) != 1 {
  125. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "datastore-count", Value: len(datastores)})
  126. if len(datastores) == 0 {
  127. return ds, telemetry.Error(ctx, span, nil, "datastore not found")
  128. }
  129. return ds, telemetry.Error(ctx, span, nil, "unexpected number of datastores found matching filters")
  130. }
  131. ds = datastores[0]
  132. message := porterv1.DatastoreCredentialRequest{
  133. ProjectId: int64(projectId),
  134. DatastoreId: datastoreId.String(),
  135. }
  136. req := connect.NewRequest(&message)
  137. ccpResp, err := c.Config().ClusterControlPlaneClient.DatastoreCredential(ctx, req)
  138. // the credential may not exist because the datastore is not yet ready
  139. if err == nil && ccpResp != nil && ccpResp.Msg != nil {
  140. ds.Credential = datastore.Credential{
  141. Host: ccpResp.Msg.Credential.Host,
  142. Port: int(ccpResp.Msg.Credential.Port),
  143. Username: ccpResp.Msg.Credential.Username,
  144. Password: ccpResp.Msg.Credential.Password,
  145. DatabaseName: ccpResp.Msg.Credential.DatabaseName,
  146. }
  147. }
  148. return ds, nil
  149. }
  150. func (c *GetDatastoreHandler) connectedClusters(ctx context.Context, project *models.Project, datastoreID uuid.UUID) []uint {
  151. ctx, span := telemetry.NewSpan(ctx, "hydrate-connected-clusters")
  152. defer span.End()
  153. connectedClusterIds := make([]uint, 0)
  154. req := connect.NewRequest(&porterv1.ReadCloudContractRequest{
  155. ProjectId: int64(project.ID),
  156. })
  157. ccpResp, err := c.Config().ClusterControlPlaneClient.ReadCloudContract(ctx, req)
  158. if err != nil {
  159. return connectedClusterIds
  160. }
  161. if ccpResp.Msg == nil {
  162. return connectedClusterIds
  163. }
  164. cloudContract := ccpResp.Msg.CloudContract
  165. if cloudContract == nil {
  166. return connectedClusterIds
  167. }
  168. datastores := cloudContract.Datastores
  169. if datastores == nil {
  170. return connectedClusterIds
  171. }
  172. var matchingDatastore *porterv1.ManagedDatastore
  173. for _, ds := range datastores {
  174. if ds.Id == datastoreID.String() {
  175. matchingDatastore = ds
  176. break
  177. }
  178. }
  179. if matchingDatastore != nil && matchingDatastore.ConnectedClusters != nil {
  180. for _, cc := range matchingDatastore.ConnectedClusters.ConnectedClusterIds {
  181. connectedClusterIds = append(connectedClusterIds, uint(cc))
  182. }
  183. }
  184. return connectedClusterIds
  185. }
  186. func (c *GetDatastoreHandler) credential(ctx context.Context, project *models.Project, datastoreID uuid.UUID) datastore.Credential {
  187. ctx, span := telemetry.NewSpan(ctx, "hydrate-credential")
  188. defer span.End()
  189. message := porterv1.DatastoreCredentialRequest{
  190. ProjectId: int64(project.ID),
  191. DatastoreId: datastoreID.String(),
  192. }
  193. req := connect.NewRequest(&message)
  194. ccpResp, err := c.Config().ClusterControlPlaneClient.DatastoreCredential(ctx, req)
  195. if err != nil {
  196. return datastore.Credential{}
  197. }
  198. if ccpResp == nil || ccpResp.Msg == nil {
  199. return datastore.Credential{}
  200. }
  201. return datastore.Credential{
  202. Host: ccpResp.Msg.Credential.Host,
  203. Port: int(ccpResp.Msg.Credential.Port),
  204. Username: ccpResp.Msg.Credential.Username,
  205. Password: ccpResp.Msg.Credential.Password,
  206. DatabaseName: ccpResp.Msg.Credential.DatabaseName,
  207. }
  208. }