delete.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130
  1. package datastore
  2. import (
  3. "context"
  4. "net/http"
  5. "github.com/porter-dev/porter/api/server/authz"
  6. "github.com/porter-dev/porter/api/server/handlers"
  7. "github.com/porter-dev/porter/api/server/handlers/release"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/server/shared/requestutils"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/datastore"
  14. "github.com/porter-dev/porter/internal/models"
  15. "github.com/porter-dev/porter/internal/telemetry"
  16. )
  17. // DeleteDatastoreHandler is a struct for handling datastore deletion requests
  18. type DeleteDatastoreHandler struct {
  19. handlers.PorterHandlerReadWriter
  20. authz.KubernetesAgentGetter
  21. }
  22. // NewDeleteDatastoreHandler constructs a datastore DeleteDatastoreHandler
  23. func NewDeleteDatastoreHandler(
  24. config *config.Config,
  25. decoderValidator shared.RequestDecoderValidator,
  26. writer shared.ResultWriter,
  27. ) *DeleteDatastoreHandler {
  28. return &DeleteDatastoreHandler{
  29. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  30. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  31. }
  32. }
  33. func (h *DeleteDatastoreHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  34. ctx, span := telemetry.NewSpan(r.Context(), "serve-delete-datastore")
  35. defer span.End()
  36. project, _ := ctx.Value(types.ProjectScope).(*models.Project)
  37. datastoreName, reqErr := requestutils.GetURLParamString(r, types.URLParamDatastoreName)
  38. if reqErr != nil {
  39. err := telemetry.Error(ctx, span, nil, "error parsing datastore name")
  40. h.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusBadRequest))
  41. return
  42. }
  43. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "datastore-name", Value: datastoreName})
  44. datastore, err := datastore.DeleteRecord(ctx, datastore.DeleteRecordInput{
  45. ProjectID: project.ID,
  46. Name: datastoreName,
  47. DatastoreRepository: h.Repo().Datastore(),
  48. })
  49. if err != nil {
  50. err = telemetry.Error(ctx, span, err, "error deleting datastore record")
  51. h.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  52. return
  53. }
  54. // TODO: replace this with a CCP call
  55. err = h.UninstallDatastore(ctx, UninstallDatastoreInput{
  56. ProjectID: project.ID,
  57. Name: datastoreName,
  58. CloudProvider: datastore.CloudProvider,
  59. CloudProviderCredentialIdentifier: datastore.CloudProviderCredentialIdentifier,
  60. Request: r,
  61. })
  62. if err != nil {
  63. err = telemetry.Error(ctx, span, err, "error uninstalling datastore")
  64. h.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  65. return
  66. }
  67. // if the release was deleted by helm without error, mark it as accepted
  68. w.WriteHeader(http.StatusAccepted)
  69. }
  70. // UninstallDatastoreInput is the input type for UninstallDatastore
  71. type UninstallDatastoreInput struct {
  72. ProjectID uint
  73. Name string
  74. CloudProvider string
  75. CloudProviderCredentialIdentifier string
  76. Request *http.Request
  77. }
  78. // UninstallDatastore uninstalls a datastore from a cluster
  79. func (h *DeleteDatastoreHandler) UninstallDatastore(ctx context.Context, inp UninstallDatastoreInput) error {
  80. ctx, span := telemetry.NewSpan(ctx, "uninstall-datastore")
  81. defer span.End()
  82. telemetry.WithAttributes(span,
  83. telemetry.AttributeKV{Key: "project-id", Value: inp.ProjectID},
  84. telemetry.AttributeKV{Key: "name", Value: inp.Name},
  85. telemetry.AttributeKV{Key: "cloud-provider", Value: inp.CloudProvider},
  86. telemetry.AttributeKV{Key: "cloud-provider-credential-identifier", Value: inp.CloudProviderCredentialIdentifier},
  87. )
  88. var datastoreCluster *models.Cluster
  89. clusters, err := h.Repo().Cluster().ListClustersByProjectID(inp.ProjectID)
  90. if err != nil {
  91. return telemetry.Error(ctx, span, err, "unable to get project clusters")
  92. }
  93. for _, cluster := range clusters {
  94. if cluster.CloudProvider == inp.CloudProvider && cluster.CloudProviderCredentialIdentifier == inp.CloudProviderCredentialIdentifier {
  95. datastoreCluster = cluster
  96. }
  97. }
  98. if datastoreCluster == nil {
  99. return telemetry.Error(ctx, span, nil, "unable to find datastore cluster")
  100. }
  101. telemetry.WithAttributes(span, telemetry.AttributeKV{Key: "cluster-id", Value: datastoreCluster.ID})
  102. helmAgent, err := h.GetHelmAgent(ctx, inp.Request, datastoreCluster, release.Namespace_ACKSystem)
  103. if err != nil {
  104. return telemetry.Error(ctx, span, err, "unable to get helm client for cluster")
  105. }
  106. _, err = helmAgent.UninstallChart(ctx, inp.Name)
  107. if err != nil {
  108. return telemetry.Error(ctx, span, err, "unable to uninstall chart")
  109. }
  110. return nil
  111. }