update_configmap.go 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102
  1. package namespace
  2. import (
  3. "fmt"
  4. "net/http"
  5. "github.com/porter-dev/porter/api/server/authz"
  6. "github.com/porter-dev/porter/api/server/handlers"
  7. "github.com/porter-dev/porter/api/server/shared"
  8. "github.com/porter-dev/porter/api/server/shared/apierrors"
  9. "github.com/porter-dev/porter/api/server/shared/config"
  10. "github.com/porter-dev/porter/api/types"
  11. "github.com/porter-dev/porter/internal/kubernetes/envgroup"
  12. "github.com/porter-dev/porter/internal/models"
  13. )
  14. type UpdateConfigMapHandler struct {
  15. handlers.PorterHandlerReadWriter
  16. authz.KubernetesAgentGetter
  17. }
  18. func NewUpdateConfigMapHandler(
  19. config *config.Config,
  20. decoderValidator shared.RequestDecoderValidator,
  21. writer shared.ResultWriter,
  22. ) *UpdateConfigMapHandler {
  23. return &UpdateConfigMapHandler{
  24. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  25. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  26. }
  27. }
  28. func (c *UpdateConfigMapHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  29. request := &types.UpdateConfigMapRequest{}
  30. if ok := c.DecodeAndValidate(w, r, request); !ok {
  31. return
  32. }
  33. namespace := r.Context().Value(types.NamespaceScope).(string)
  34. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  35. agent, err := c.GetAgent(r, cluster, "")
  36. if err != nil {
  37. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  38. return
  39. }
  40. // get the env group: if it's MetaVersion=2, return an error
  41. envGroup, err := envgroup.GetEnvGroup(agent, request.Name, namespace, 0)
  42. // if the environment group exists and has MetaVersion=2, throw an error
  43. if envGroup != nil && envGroup.MetaVersion == 2 {
  44. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  45. fmt.Errorf("unsupported operation for versioned env groups"),
  46. http.StatusNotFound,
  47. ))
  48. return
  49. }
  50. secretData := envgroup.EncodeSecrets(request.SecretVariables)
  51. // create secret first
  52. err = agent.UpdateLinkedSecret(request.Name, namespace, request.Name, secretData)
  53. if err != nil {
  54. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  55. return
  56. }
  57. // add all secret env variables to configmap with value PORTERSECRET_${configmap_name}
  58. for key, val := range request.SecretVariables {
  59. // if val is empty and key does not exist in configmap already, set to empty
  60. if _, found := request.Variables[key]; val == "" && !found {
  61. request.Variables[key] = ""
  62. } else if val != "" {
  63. request.Variables[key] = fmt.Sprintf("PORTERSECRET_%s", request.Name)
  64. }
  65. }
  66. configMap, err := agent.UpdateConfigMap(request.Name, namespace, request.Variables)
  67. if err != nil {
  68. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  69. return
  70. }
  71. configMap, err = envgroup.ConvertV1ToV2EnvGroup(agent, request.Name, namespace)
  72. if err != nil {
  73. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  74. return
  75. }
  76. res, err := envgroup.ToEnvGroup(configMap)
  77. if err != nil {
  78. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  79. return
  80. }
  81. c.WriteResult(w, r, res)
  82. }