create_configmap.go 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102
  1. package namespace
  2. import (
  3. "fmt"
  4. "net/http"
  5. v1 "k8s.io/api/core/v1"
  6. "github.com/porter-dev/porter/api/server/authz"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/types"
  12. "github.com/porter-dev/porter/internal/kubernetes"
  13. "github.com/porter-dev/porter/internal/models"
  14. )
  15. type CreateConfigMapHandler struct {
  16. handlers.PorterHandlerReadWriter
  17. authz.KubernetesAgentGetter
  18. }
  19. func NewCreateConfigMapHandler(
  20. config *config.Config,
  21. decoderValidator shared.RequestDecoderValidator,
  22. writer shared.ResultWriter,
  23. ) *CreateConfigMapHandler {
  24. return &CreateConfigMapHandler{
  25. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  26. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  27. }
  28. }
  29. func (c *CreateConfigMapHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  30. request := &types.CreateConfigMapRequest{}
  31. if ok := c.DecodeAndValidate(w, r, request); !ok {
  32. return
  33. }
  34. namespace := r.Context().Value(types.NamespaceScope).(string)
  35. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  36. agent, err := c.GetAgent(r, cluster, "")
  37. if err != nil {
  38. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  39. return
  40. }
  41. configMap, err := createConfigMap(agent, types.ConfigMapInput{
  42. Name: request.Name,
  43. Namespace: namespace,
  44. Variables: request.Variables,
  45. SecretVariables: request.SecretVariables,
  46. })
  47. if err != nil {
  48. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  49. return
  50. }
  51. var res = types.CreateConfigMapResponse{
  52. ConfigMap: configMap,
  53. }
  54. c.WriteResult(w, r, res)
  55. }
  56. func createConfigMap(agent *kubernetes.Agent, input types.ConfigMapInput) (*v1.ConfigMap, error) {
  57. secretData := encodeSecrets(input.SecretVariables)
  58. // create secret first
  59. if _, err := agent.CreateLinkedSecret(input.Name, input.Namespace, input.Name, secretData); err != nil {
  60. return nil, err
  61. }
  62. // add all secret env variables to configmap with value PORTERSECRET_${configmap_name}
  63. for key := range input.SecretVariables {
  64. input.Variables[key] = fmt.Sprintf("PORTERSECRET_%s", input.Name)
  65. }
  66. return agent.CreateConfigMap(input.Name, input.Namespace, input.Variables)
  67. }
  68. func encodeSecrets(data map[string]string) map[string][]byte {
  69. res := make(map[string][]byte)
  70. for key, rawValue := range data {
  71. // encodedValue := base64.StdEncoding.EncodeToString([]byte(rawValue))
  72. // if err != nil {
  73. // app.handleErrorInternal(err, w)
  74. // return
  75. // }
  76. res[key] = []byte(rawValue)
  77. }
  78. return res
  79. }