clone_env_group.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120
  1. package namespace
  2. import (
  3. "errors"
  4. "fmt"
  5. "net/http"
  6. "strings"
  7. "github.com/porter-dev/porter/api/server/authz"
  8. "github.com/porter-dev/porter/api/server/handlers"
  9. "github.com/porter-dev/porter/api/server/shared"
  10. "github.com/porter-dev/porter/api/server/shared/apierrors"
  11. "github.com/porter-dev/porter/api/server/shared/config"
  12. "github.com/porter-dev/porter/api/types"
  13. "github.com/porter-dev/porter/internal/kubernetes"
  14. "github.com/porter-dev/porter/internal/kubernetes/envgroup"
  15. "github.com/porter-dev/porter/internal/models"
  16. )
  17. type CloneEnvGroupHandler struct {
  18. handlers.PorterHandlerReadWriter
  19. authz.KubernetesAgentGetter
  20. }
  21. func NewCloneEnvGroupHandler(
  22. config *config.Config,
  23. decoderValidator shared.RequestDecoderValidator,
  24. writer shared.ResultWriter,
  25. ) *CloneEnvGroupHandler {
  26. return &CloneEnvGroupHandler{
  27. PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
  28. KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
  29. }
  30. }
  31. func (c *CloneEnvGroupHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  32. request := &types.CloneEnvGroupRequest{}
  33. if ok := c.DecodeAndValidate(w, r, request); !ok {
  34. return
  35. }
  36. namespace := r.Context().Value(types.NamespaceScope).(string)
  37. cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
  38. agent, err := c.GetAgent(r, cluster, "")
  39. if err != nil {
  40. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  41. return
  42. }
  43. cm, _, err := agent.GetLatestVersionedConfigMap(request.SourceName, namespace)
  44. if err != nil {
  45. if errors.Is(err, kubernetes.IsNotFoundError) {
  46. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  47. fmt.Errorf("error cloning env group: envgroup %s in namespace %s not found", request.SourceName, namespace), http.StatusNotFound,
  48. "no config map found for envgroup",
  49. ))
  50. return
  51. }
  52. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  53. return
  54. }
  55. secret, _, err := agent.GetLatestVersionedSecret(request.SourceName, namespace)
  56. if err != nil {
  57. if errors.Is(err, kubernetes.IsNotFoundError) {
  58. c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
  59. fmt.Errorf("error cloning env group: envgroup %s in namespace %s not found", request.SourceName, namespace), http.StatusNotFound,
  60. "no k8s secret found for envgroup",
  61. ))
  62. return
  63. }
  64. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  65. return
  66. }
  67. if request.TargetName == "" {
  68. request.TargetName = request.SourceName
  69. }
  70. vars := make(map[string]string)
  71. secretVars := make(map[string]string)
  72. for key, val := range cm.Data {
  73. if !strings.Contains(val, "PORTERSECRET") {
  74. vars[key] = val
  75. }
  76. }
  77. for key, val := range secret.Data {
  78. secretVars[key] = string(val)
  79. }
  80. configMap, err := envgroup.CreateEnvGroup(agent, types.ConfigMapInput{
  81. Name: request.TargetName,
  82. Namespace: request.TargetNamespace,
  83. Variables: vars,
  84. SecretVariables: secretVars,
  85. })
  86. if err != nil {
  87. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  88. return
  89. }
  90. envGroup, err := envgroup.ToEnvGroup(configMap)
  91. if err != nil {
  92. c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
  93. return
  94. }
  95. c.WriteResult(w, r, envGroup)
  96. }