clone_env_group.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154
  1. package namespace
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/http"
  6. "strings"
  7. "github.com/porter-dev/porter/api/server/authz"
  8. "github.com/porter-dev/porter/api/server/handlers"
  9. "github.com/porter-dev/porter/api/server/shared"
  10. "github.com/porter-dev/porter/api/server/shared/apierrors"
  11. "github.com/porter-dev/porter/api/server/shared/config"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/kubernetes"
  14. "github.com/porter-dev/porter/internal/kubernetes/envgroup"
  15. "github.com/porter-dev/porter/internal/models"
  16. "github.com/porter-dev/porter/internal/telemetry"
  17. v1 "k8s.io/api/core/v1"
  18. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  19. )
  20. type CloneEnvGroupHandler struct {
  21. handlers.PorterHandlerReadWriter
  22. authz.KubernetesAgentGetter
  23. }
  24. func NewCloneEnvGroupHandler(
  25. config *config.Config,
  26. decoderValidator shared.RequestDecoderValidator,
  27. writer shared.ResultWriter,
  28. ) *CloneEnvGroupHandler {
  29. return &CloneEnvGroupHandler{
  30. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  31. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  32. }
  33. }
  34. func (c *CloneEnvGroupHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  35. ctx, span := telemetry.NewSpan(r.Context(), "clone-env-group-legacy")
  36. defer span.End()
  37. request := &types.CloneEnvGroupRequest{}
  38. if ok := c.DecodeAndValidate(w, r, request); !ok {
  39. return
  40. }
  41. namespace := r.Context().Value(types.NamespaceScope).(string)
  42. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  43. agent, err := c.GetAgent(r, cluster, "")
  44. if err != nil {
  45. err = telemetry.Error(ctx, span, err, "error getting kubernetes agent")
  46. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  47. return
  48. }
  49. cm, _, err := agent.GetLatestVersionedConfigMap(request.SourceName, namespace)
  50. if err != nil {
  51. if errors.Is(err, kubernetes.IsNotFoundError) {
  52. _ = telemetry.Error(ctx, span, err, "error finding latest config map")
  53. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  54. fmt.Errorf("error cloning env group: envgroup %s in namespace %s not found", request.SourceName, namespace), http.StatusNotFound,
  55. "no config map found for envgroup",
  56. ))
  57. return
  58. }
  59. err = telemetry.Error(ctx, span, err, "error getting latest config map")
  60. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  61. return
  62. }
  63. secret, _, err := agent.GetLatestVersionedSecret(request.SourceName, namespace)
  64. if err != nil {
  65. if errors.Is(err, kubernetes.IsNotFoundError) {
  66. _ = telemetry.Error(ctx, span, err, "error finding latest secret")
  67. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  68. fmt.Errorf("error cloning env group: envgroup %s in namespace %s not found", request.SourceName, namespace), http.StatusNotFound,
  69. "no k8s secret found for envgroup",
  70. ))
  71. return
  72. }
  73. err = telemetry.Error(ctx, span, err, "error getting secret")
  74. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  75. return
  76. }
  77. if request.TargetName == "" {
  78. request.TargetName = request.SourceName
  79. }
  80. vars := make(map[string]string)
  81. secretVars := make(map[string]string)
  82. for key, val := range cm.Data {
  83. if !strings.Contains(val, "PORTERSECRET") {
  84. vars[key] = val
  85. }
  86. }
  87. for key, val := range secret.Data {
  88. secretVars[key] = string(val)
  89. }
  90. _, err = agent.Clientset.CoreV1().Namespaces().Get(ctx, namespace, metav1.GetOptions{})
  91. if err != nil {
  92. if !errors.Is(err, kubernetes.IsNotFoundError) {
  93. err = telemetry.Error(ctx, span, err, "error getting namespace")
  94. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  95. return
  96. }
  97. _, err = agent.Clientset.CoreV1().Namespaces().Create(ctx, &v1.Namespace{
  98. TypeMeta: metav1.TypeMeta{
  99. Kind: "Namespace",
  100. APIVersion: "v1",
  101. },
  102. ObjectMeta: metav1.ObjectMeta{
  103. Name: namespace,
  104. },
  105. }, metav1.CreateOptions{})
  106. if err != nil {
  107. err = telemetry.Error(ctx, span, err, "error creating namespace")
  108. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  109. return
  110. }
  111. }
  112. configMap, err := envgroup.CreateEnvGroup(agent, types.ConfigMapInput{
  113. Name: request.TargetName,
  114. Namespace: request.TargetNamespace,
  115. Variables: vars,
  116. SecretVariables: secretVars,
  117. })
  118. if err != nil {
  119. err = telemetry.Error(ctx, span, err, "error creating env group")
  120. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  121. return
  122. }
  123. envGroup, err := envgroup.ToEnvGroup(configMap)
  124. if err != nil {
  125. err = telemetry.Error(ctx, span, err, "error converting env group")
  126. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(err, http.StatusInternalServerError))
  127. return
  128. }
  129. c.WriteResult(w, r, envGroup)
  130. }