are_external_providers_enabled.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. package environment_groups
  2. import (
  3. "net/http"
  4. "connectrpc.com/connect"
  5. porterv1 "github.com/porter-dev/api-contracts/generated/go/porter/v1"
  6. "github.com/porter-dev/porter/api/server/authz"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/types"
  12. "github.com/porter-dev/porter/internal/models"
  13. "github.com/porter-dev/porter/internal/telemetry"
  14. )
  15. // AreExternalProvidersEnabledHandler is the handler for the /environment-group/are-external-providers-enabled endpoint
  16. type AreExternalProvidersEnabledHandler struct {
  17. handlers.PorterHandlerReadWriter
  18. authz.KubernetesAgentGetter
  19. }
  20. // NewAreExternalProvidersEnabledHandler creates an instance of AreExternalProvidersEnabledHandler
  21. func NewAreExternalProvidersEnabledHandler(
  22. config *config.Config,
  23. decoderValidator shared.RequestDecoderValidator,
  24. writer shared.ResultWriter,
  25. ) *AreExternalProvidersEnabledHandler {
  26. return &AreExternalProvidersEnabledHandler{
  27. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  28. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  29. }
  30. }
  31. // ExternalEnvGroupOperator is the type of external env group operator, which syncs secrets from external sources
  32. type ExternalEnvGroupOperator string
  33. const (
  34. // ExternalEnvGroupOperator_ExternalSecrets is the external secrets operator
  35. ExternalEnvGroupOperator_ExternalSecrets ExternalEnvGroupOperator = "external-secrets"
  36. // ExternalEnvGroupOperator_Infisical is the infisical secrets operator
  37. ExternalEnvGroupOperator_Infisical ExternalEnvGroupOperator = "infisical"
  38. )
  39. // ExternalEnvGroupOperatorEnabledStatus is the status of an external env group operator
  40. type ExternalEnvGroupOperatorEnabledStatus struct {
  41. // Type is the type of external provider
  42. Type ExternalEnvGroupOperator `json:"type"`
  43. // Enabled is true if external providers are enabled
  44. Enabled bool `json:"enabled"`
  45. // ReprovisionRequired is true if the cluster needs to be reprovisioned to enable external providers
  46. ReprovisionRequired bool `json:"reprovision_required"`
  47. // K8SUpgradeRequired is true if the cluster needs to be upgraded to v1.27 to enable external providers
  48. K8SUpgradeRequired bool `json:"k8s_upgrade_required"`
  49. }
  50. // AreExternalProvidersEnabledResponse is the response object for the /environment-group/are-external-providers-enabled endpoint
  51. type AreExternalProvidersEnabledResponse struct {
  52. Operators []ExternalEnvGroupOperatorEnabledStatus `json:"operators"`
  53. }
  54. // ServeHTTP checks if external providers are enabled
  55. func (c *AreExternalProvidersEnabledHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  56. ctx, span := telemetry.NewSpan(r.Context(), "serve-are-external-providers-enabled")
  57. defer span.End()
  58. project, _ := ctx.Value(types.ProjectScope).(*models.Project)
  59. cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster)
  60. resp, err := c.Config().ClusterControlPlaneClient.AreExternalEnvGroupProvidersEnabled(ctx, connect.NewRequest(&porterv1.AreExternalEnvGroupProvidersEnabledRequest{
  61. ProjectId: int64(project.ID),
  62. ClusterId: int64(cluster.ID),
  63. }))
  64. if err != nil {
  65. err := telemetry.Error(ctx, span, err, "unable to check if external providers are enabled")
  66. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  67. return
  68. }
  69. var operators []ExternalEnvGroupOperatorEnabledStatus
  70. for _, operator := range resp.Msg.Operators {
  71. var operatorType ExternalEnvGroupOperator
  72. switch operator.Operator {
  73. case porterv1.EnumExternalEnvGroupOperatorType_ENUM_EXTERNAL_ENV_GROUP_OPERATOR_TYPE_EXTERNAL_SECRETS:
  74. operatorType = ExternalEnvGroupOperator_ExternalSecrets
  75. case porterv1.EnumExternalEnvGroupOperatorType_ENUM_EXTERNAL_ENV_GROUP_OPERATOR_TYPE_INFISICAL:
  76. operatorType = ExternalEnvGroupOperator_Infisical
  77. default:
  78. continue
  79. }
  80. operators = append(operators, ExternalEnvGroupOperatorEnabledStatus{
  81. Type: operatorType,
  82. Enabled: operator.Enabled,
  83. ReprovisionRequired: operator.ReprovisionRequired,
  84. K8SUpgradeRequired: operator.K8SUpgradeRequired,
  85. })
  86. }
  87. c.WriteResult(w, r, &AreExternalProvidersEnabledResponse{
  88. Operators: operators,
  89. })
  90. }