| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102 |
- package namespace
- import (
- "fmt"
- "net/http"
- "github.com/porter-dev/porter/api/server/authz"
- "github.com/porter-dev/porter/api/server/handlers"
- "github.com/porter-dev/porter/api/server/shared"
- "github.com/porter-dev/porter/api/server/shared/apierrors"
- "github.com/porter-dev/porter/api/server/shared/config"
- "github.com/porter-dev/porter/api/types"
- "github.com/porter-dev/porter/internal/kubernetes/envgroup"
- "github.com/porter-dev/porter/internal/models"
- )
- type UpdateConfigMapHandler struct {
- handlers.PorterHandlerReadWriter
- authz.KubernetesAgentGetter
- }
- func NewUpdateConfigMapHandler(
- config *config.Config,
- decoderValidator shared.RequestDecoderValidator,
- writer shared.ResultWriter,
- ) *UpdateConfigMapHandler {
- return &UpdateConfigMapHandler{
- PorterHandlerReadWriter: handlers.NewDefaultPorterHandler(config, decoderValidator, writer),
- KubernetesAgentGetter: authz.NewOutOfClusterAgentGetter(config),
- }
- }
- func (c *UpdateConfigMapHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
- request := &types.UpdateConfigMapRequest{}
- if ok := c.DecodeAndValidate(w, r, request); !ok {
- return
- }
- namespace := r.Context().Value(types.NamespaceScope).(string)
- cluster, _ := r.Context().Value(types.ClusterScope).(*models.Cluster)
- agent, err := c.GetAgent(r, cluster, "")
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- // get the env group: if it's MetaVersion=2, return an error
- envGroup, err := envgroup.GetEnvGroup(agent, request.Name, namespace, 0)
- // if the environment group exists and has MetaVersion=2, throw an error
- if envGroup != nil && envGroup.MetaVersion == 2 {
- c.HandleAPIError(w, r, apierrors.NewErrPassThroughToClient(
- fmt.Errorf("unsupported operation for versioned env groups"),
- http.StatusNotFound,
- ))
- return
- }
- secretData := envgroup.EncodeSecrets(request.SecretVariables)
- // create secret first
- err = agent.UpdateLinkedSecret(request.Name, namespace, request.Name, secretData)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- // add all secret env variables to configmap with value PORTERSECRET_${configmap_name}
- for key, val := range request.SecretVariables {
- // if val is empty and key does not exist in configmap already, set to empty
- if _, found := request.Variables[key]; val == "" && !found {
- request.Variables[key] = ""
- } else if val != "" {
- request.Variables[key] = fmt.Sprintf("PORTERSECRET_%s", request.Name)
- }
- }
- configMap, err := agent.UpdateConfigMap(request.Name, namespace, request.Variables)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- configMap, err = envgroup.ConvertV1ToV2EnvGroup(agent, request.Name, namespace)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- res, err := envgroup.ToEnvGroup(configMap)
- if err != nil {
- c.HandleAPIError(w, r, apierrors.NewErrInternal(err))
- return
- }
- c.WriteResult(w, r, res)
- }
|