create.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227
  1. package envgroup
  2. import (
  3. "errors"
  4. "fmt"
  5. "strconv"
  6. "strings"
  7. "github.com/porter-dev/porter/api/types"
  8. "github.com/porter-dev/porter/internal/helm"
  9. "github.com/porter-dev/porter/internal/kubernetes"
  10. "github.com/stefanmcshane/helm/pkg/release"
  11. v1 "k8s.io/api/core/v1"
  12. )
  13. func ConvertV1ToV2EnvGroup(agent *kubernetes.Agent, name, namespace string) (*v1.ConfigMap, error) {
  14. cm, err := agent.GetConfigMap(name, namespace)
  15. if err != nil {
  16. return nil, err
  17. }
  18. secret, err := agent.GetSecret(name, namespace)
  19. if err != nil {
  20. return nil, err
  21. }
  22. variables := make(map[string]string)
  23. secretVariables := make(map[string]string)
  24. for key, val := range cm.Data {
  25. if strings.Contains(val, "PORTERSECRET") {
  26. secretVariables[key] = val
  27. } else {
  28. variables[key] = val
  29. }
  30. }
  31. for key, val := range secret.Data {
  32. secretVariables[key] = string(val)
  33. }
  34. envGroup, err := CreateEnvGroup(agent, types.ConfigMapInput{
  35. Name: name,
  36. Namespace: namespace,
  37. Variables: variables,
  38. SecretVariables: secretVariables,
  39. })
  40. if err != nil {
  41. return nil, err
  42. }
  43. // delete the old configmap
  44. // note: we keep the old secret to ensure existing secret references are kept intact
  45. if err := agent.DeleteConfigMap(name, namespace); err != nil {
  46. return nil, err
  47. }
  48. return envGroup, nil
  49. }
  50. func CreateEnvGroup(agent *kubernetes.Agent, input types.ConfigMapInput) (*v1.ConfigMap, error) {
  51. // look for a latest configmap
  52. oldCM, latestVersion, err := agent.GetLatestVersionedConfigMap(input.Name, input.Namespace)
  53. if err != nil && !errors.Is(err, kubernetes.IsNotFoundError) {
  54. return nil, err
  55. } else if err != nil {
  56. latestVersion = 1
  57. } else {
  58. latestVersion += 1
  59. }
  60. apps := make([]string, 0)
  61. if oldCM != nil {
  62. oldEG, err := ToEnvGroup(oldCM)
  63. if err == nil {
  64. apps = oldEG.Applications
  65. }
  66. }
  67. oldSecret, _, err := agent.GetLatestVersionedSecret(input.Name, input.Namespace)
  68. if input.SecretVariables == nil {
  69. input.SecretVariables = make(map[string]string)
  70. }
  71. if err != nil && !errors.Is(err, kubernetes.IsNotFoundError) {
  72. return nil, err
  73. } else if err == nil && oldSecret != nil {
  74. // In this case, we find all old variables referencing a secret value, and add those
  75. // values to the new secret variables. The frontend will only send **new** secret values.
  76. for key1, val1 := range input.Variables {
  77. if strings.Contains(val1, "PORTERSECRET") {
  78. // get that value from the secret
  79. for key2, val2 := range oldSecret.Data {
  80. if key2 == key1 {
  81. input.SecretVariables[key1] = string(val2)
  82. }
  83. }
  84. }
  85. }
  86. }
  87. // add all secret env variables to configmap with value PORTERSECRET_${configmap_name}
  88. for key := range input.SecretVariables {
  89. input.Variables[key] = fmt.Sprintf("PORTERSECRET_%s.v%d", input.Name, latestVersion)
  90. }
  91. cm, err := agent.CreateVersionedConfigMap(input.Name, input.Namespace, latestVersion, input.Variables, apps...)
  92. if err != nil {
  93. return nil, err
  94. }
  95. secretData := EncodeSecrets(input.SecretVariables)
  96. // create secret first
  97. if _, err := agent.CreateLinkedVersionedSecret(input.Name, input.Namespace, cm.ObjectMeta.Name, latestVersion, secretData); err != nil {
  98. return nil, err
  99. }
  100. return cm, err
  101. }
  102. func ToEnvGroup(configMap *v1.ConfigMap) (*types.EnvGroup, error) {
  103. res := &types.EnvGroup{
  104. CreatedAt: configMap.ObjectMeta.CreationTimestamp.Time,
  105. Namespace: configMap.Namespace,
  106. Variables: configMap.Data,
  107. }
  108. // if the label "porter"="true" exists, this is a V1 env group
  109. porterLabel, porterLabelExists := configMap.Labels["porter"]
  110. if porterLabelExists && porterLabel == "true" {
  111. res.MetaVersion = 1
  112. res.Name = configMap.ObjectMeta.Name
  113. return res, nil
  114. }
  115. // set the meta version to 2 if porter label is not captured
  116. res.MetaVersion = 2
  117. // get the name
  118. name, nameExists := configMap.Labels["envgroup"]
  119. if !nameExists {
  120. return nil, fmt.Errorf("not a valid configmap: envgroup label does not exist")
  121. }
  122. res.Name = name
  123. // get the version
  124. versionLabelStr, versionLabelExists := configMap.Labels["version"]
  125. if !versionLabelExists {
  126. return nil, fmt.Errorf("not a valid configmap: version label does not exist")
  127. }
  128. versionInt, err := strconv.Atoi(versionLabelStr)
  129. if err != nil {
  130. return nil, fmt.Errorf("not a valid configmap, error converting version: %v", err)
  131. }
  132. res.Version = uint(versionInt)
  133. // get applications, if they exist
  134. appStr, appAnnonExists := configMap.Annotations[kubernetes.PorterAppAnnotationName]
  135. if appAnnonExists && appStr != "" {
  136. res.Applications = strings.Split(appStr, ",")
  137. } else {
  138. res.Applications = []string{}
  139. }
  140. return res, nil
  141. }
  142. func GetSyncedReleases(helmAgent *helm.Agent, configMap *v1.ConfigMap) ([]*release.Release, error) {
  143. res := make([]*release.Release, 0)
  144. // get applications, if they exist
  145. appStr, appAnnonExists := configMap.Annotations[kubernetes.PorterAppAnnotationName]
  146. if !appAnnonExists || appStr == "" {
  147. return res, nil
  148. }
  149. appStrArr := strings.Split(appStr, ",")
  150. // list all latest helm releases and check them against app string
  151. releases, err := helmAgent.ListReleases(configMap.Namespace, &types.ReleaseListFilter{
  152. StatusFilter: []string{
  153. "deployed",
  154. "uninstalled",
  155. "pending",
  156. "pending-install",
  157. "pending-upgrade",
  158. "pending-rollback",
  159. "failed",
  160. },
  161. })
  162. if err != nil {
  163. return nil, err
  164. }
  165. for _, rel := range releases {
  166. for _, appName := range appStrArr {
  167. if rel.Name == appName {
  168. res = append(res, rel)
  169. }
  170. }
  171. }
  172. return res, nil
  173. }
  174. func EncodeSecrets(data map[string]string) map[string][]byte {
  175. res := make(map[string][]byte)
  176. for key, rawValue := range data {
  177. res[key] = []byte(rawValue)
  178. }
  179. return res
  180. }