create.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154
  1. package cluster
  2. import (
  3. "encoding/base64"
  4. "fmt"
  5. "net/http"
  6. "regexp"
  7. "github.com/porter-dev/porter/api/server/handlers"
  8. "github.com/porter-dev/porter/api/server/shared"
  9. "github.com/porter-dev/porter/api/server/shared/apierrors"
  10. "github.com/porter-dev/porter/api/server/shared/config"
  11. "github.com/porter-dev/porter/api/types"
  12. "github.com/porter-dev/porter/internal/features"
  13. "github.com/porter-dev/porter/internal/kubernetes/resolver"
  14. "github.com/porter-dev/porter/internal/models"
  15. "github.com/porter-dev/porter/internal/repository"
  16. )
  17. type CreateClusterManualHandler struct {
  18. handlers.PorterHandlerReadWriter
  19. }
  20. func NewCreateClusterManualHandler(
  21. config *config.Config,
  22. decoderValidator shared.RequestDecoderValidator,
  23. writer shared.ResultWriter,
  24. ) *CreateClusterManualHandler {
  25. return &CreateClusterManualHandler{
  26. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  27. }
  28. }
  29. func (c *CreateClusterManualHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  30. // read the project from context
  31. proj, _ := r.Context().Value(types.ProjectScope).(*models.Project)
  32. request := &types.CreateClusterManualRequest{}
  33. if ok := c.DecodeAndValidate(w, r, request); !ok {
  34. return
  35. }
  36. cluster, err := getClusterModelFromManualRequest(c.Repo(), proj, request)
  37. if err != nil {
  38. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  39. return
  40. }
  41. cluster, err = c.Repo().Cluster().CreateCluster(cluster, c.Config().LaunchDarklyClient)
  42. if err != nil {
  43. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  44. return
  45. }
  46. c.WriteResult(w, r, cluster.ToClusterType())
  47. }
  48. func getClusterModelFromManualRequest(
  49. repo repository.Repository,
  50. project *models.Project,
  51. request *types.CreateClusterManualRequest,
  52. ) (*models.Cluster, error) {
  53. var authMechanism models.ClusterAuth
  54. if request.GCPIntegrationID != 0 {
  55. authMechanism = models.GCP
  56. // check that the integration exists
  57. _, err := repo.GCPIntegration().ReadGCPIntegration(project.ID, request.GCPIntegrationID)
  58. if err != nil {
  59. return nil, fmt.Errorf("gcp integration not found")
  60. }
  61. } else if request.AWSIntegrationID != 0 {
  62. authMechanism = models.AWS
  63. // check that the integration exists
  64. _, err := repo.AWSIntegration().ReadAWSIntegration(project.ID, request.AWSIntegrationID)
  65. if err != nil {
  66. return nil, fmt.Errorf("aws integration not found")
  67. }
  68. } else {
  69. return nil, fmt.Errorf("must include aws or gcp integration id")
  70. }
  71. cert := make([]byte, 0)
  72. if request.CertificateAuthorityData != "" {
  73. // determine if data is base64 decoded using regex
  74. re := regexp.MustCompile(`^([A-Za-z0-9+/]{4})*([A-Za-z0-9+/]{3}=|[A-Za-z0-9+/]{2}==)?$`)
  75. // if it matches the base64 regex, decode it
  76. if re.MatchString(request.CertificateAuthorityData) {
  77. decoded, err := base64.StdEncoding.DecodeString(request.CertificateAuthorityData)
  78. if err != nil {
  79. return nil, err
  80. }
  81. cert = []byte(decoded)
  82. }
  83. }
  84. return &models.Cluster{
  85. ProjectID: project.ID,
  86. AuthMechanism: authMechanism,
  87. Name: request.Name,
  88. Server: request.Server,
  89. GCPIntegrationID: request.GCPIntegrationID,
  90. AWSIntegrationID: request.AWSIntegrationID,
  91. CertificateAuthorityData: cert,
  92. }, nil
  93. }
  94. func createClusterFromCandidate(
  95. repo repository.Repository,
  96. project *models.Project,
  97. user *models.User,
  98. candidate *models.ClusterCandidate,
  99. clResolver *types.ClusterResolverAll,
  100. launchDarklyClient *features.Client,
  101. ) (*models.Cluster, *models.ClusterCandidate, error) {
  102. // we query the repo again to get the decrypted version of the cluster candidate
  103. cc, err := repo.Cluster().ReadClusterCandidate(project.ID, candidate.ID)
  104. if err != nil {
  105. return nil, nil, err
  106. }
  107. cResolver := &resolver.CandidateResolver{
  108. Resolver: clResolver,
  109. ClusterCandidateID: cc.ID,
  110. ProjectID: project.ID,
  111. UserID: user.ID,
  112. }
  113. err = cResolver.ResolveIntegration(repo)
  114. if err != nil {
  115. return nil, nil, err
  116. }
  117. cluster, err := cResolver.ResolveCluster(repo, launchDarklyClient)
  118. if err != nil {
  119. return nil, nil, err
  120. }
  121. cc, err = repo.Cluster().UpdateClusterCandidateCreatedClusterID(cc.ID, cluster.ID)
  122. if err != nil {
  123. return nil, nil, err
  124. }
  125. return cluster, cc, nil
  126. }