get_kubeconfig.go 2.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889
  1. package cluster
  2. import (
  3. "errors"
  4. "net/http"
  5. "github.com/porter-dev/porter/api/server/authz"
  6. "github.com/porter-dev/porter/api/server/handlers"
  7. "github.com/porter-dev/porter/api/server/shared"
  8. "github.com/porter-dev/porter/api/server/shared/apierrors"
  9. "github.com/porter-dev/porter/api/server/shared/config"
  10. "github.com/porter-dev/porter/api/types"
  11. "github.com/porter-dev/porter/internal/models"
  12. "k8s.io/client-go/tools/clientcmd"
  13. )
  14. type GetTemporaryKubeconfigHandler struct {
  15. handlers.PorterHandlerWriter
  16. authz.KubernetesAgentGetter
  17. }
  18. func NewGetTemporaryKubeconfigHandler(
  19. config *config.Config,
  20. writer shared.ResultWriter,
  21. ) *GetTemporaryKubeconfigHandler {
  22. return &GetTemporaryKubeconfigHandler{
  23. PorterHandlerWriter: handlers.NewDefaultPorterHandler(config, nil, writer),
  24. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  25. }
  26. }
  27. func (c *GetTemporaryKubeconfigHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  28. if c.Config().ServerConf.DisableTemporaryKubeconfig {
  29. c.HandleAPIError(w, r, apierrors.NewErrNotFound(
  30. errors.New("temporary kubeconfig generation is disabled on this instance"),
  31. ))
  32. return
  33. }
  34. ctx := r.Context()
  35. cluster, _ := ctx.Value(types.ClusterScope).(*models.Cluster)
  36. outOfClusterConfig := c.GetOutOfClusterConfig(cluster)
  37. //
  38. //if cluster.ProvisionedBy == "CAPI" {
  39. // kubeconfigResp, err := c.Config().ClusterControlPlaneClient.KubeConfigForCluster(context.Background(), connect.NewRequest(
  40. // &porterv1.KubeConfigForClusterRequest{
  41. // ProjectId: int64(cluster.ProjectID),
  42. // ClusterId: int64(cluster.ID),
  43. // },
  44. // ))
  45. // if err != nil {
  46. // c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error getting temporary capi config: %w", err)))
  47. // return
  48. // }
  49. // if kubeconfigResp.Msg == nil {
  50. // c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("error reading temporary capi config: %w", err)))
  51. // return
  52. // }
  53. // b64, err := base64.StdEncoding.DecodeString(kubeconfigResp.Msg.KubeConfig)
  54. // if err != nil {
  55. // c.HandleAPIError(w, r, apierrors.NewErrInternal(fmt.Errorf("unable to decode base64 kubeconfig: %w", err)))
  56. // return
  57. // }
  58. // res := &types.GetTemporaryKubeconfigResponse{
  59. // Kubeconfig: b64,
  60. // }
  61. // c.WriteResult(w, r, res)
  62. // return
  63. //}
  64. kubeconfig, err := outOfClusterConfig.CreateRawConfigFromCluster()
  65. if err != nil {
  66. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  67. return
  68. }
  69. kubeconfigBytes, err := clientcmd.Write(*kubeconfig)
  70. if err != nil {
  71. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  72. return
  73. }
  74. res := &types.GetTemporaryKubeconfigResponse{
  75. Kubeconfig: kubeconfigBytes,
  76. }
  77. c.WriteResult(w, r, res)
  78. }