gitlab-org--gitlab-foss/app/controllers/projects/clusters_controller.rb

220 lines
5.4 KiB
Ruby
Raw Normal View History

class Projects::ClustersController < Projects::ApplicationController
2018-05-23 15:30:00 +00:00
before_action :cluster, except: [:index, :new, :create]
before_action :authorize_read_cluster!
2018-05-23 15:30:00 +00:00
before_action :generate_gcp_authorize_url, only: [:new]
before_action :validate_gcp_token, only: [:new]
2018-05-23 15:30:00 +00:00
before_action :new_cluster, only: [:new]
before_action :existing_cluster, only: [:new]
before_action :authorize_create_cluster!, only: [:new]
before_action :authorize_update_cluster!, only: [:update]
before_action :authorize_admin_cluster!, only: [:destroy]
before_action :update_applications_status, only: [:status]
helper_method :token_in_session
2017-12-03 20:34:00 +00:00
STATUS_POLLING_INTERVAL = 10_000
def index
clusters = ClustersFinder.new(project, current_user, :all).execute
@clusters = clusters.page(params[:page]).per(20)
end
2017-12-03 14:00:33 +00:00
def new
end
def status
respond_to do |format|
format.json do
2017-12-04 13:21:23 +00:00
Gitlab::PollingInterval.set_header(response, interval: STATUS_POLLING_INTERVAL)
2017-10-03 21:21:54 +00:00
render json: ClusterSerializer
.new(project: @project, current_user: @current_user)
.represent_status(@cluster)
end
end
end
def show
end
def update
2017-10-23 08:36:35 +00:00
Clusters::UpdateService
.new(project, current_user, update_params)
.execute(cluster)
2017-10-04 19:13:01 +00:00
if cluster.valid?
2017-11-24 13:43:00 +00:00
respond_to do |format|
format.json do
head :no_content
end
format.html do
flash[:notice] = _('Kubernetes cluster was successfully updated.')
redirect_to project_cluster_path(project, cluster)
2017-11-24 13:43:00 +00:00
end
end
2017-10-04 19:13:01 +00:00
else
2017-11-24 13:43:00 +00:00
respond_to do |format|
format.json { head :bad_request }
format.html { render :show }
end
2017-10-04 19:13:01 +00:00
end
end
2017-09-27 13:17:41 +00:00
def destroy
if cluster.destroy
flash[:notice] = _('Kubernetes cluster integration was successfully removed.')
redirect_to project_clusters_path(project), status: 302
else
flash[:notice] = _('Kubernetes cluster integration was not removed.')
render :show
end
2017-09-27 13:17:41 +00:00
end
2018-05-23 15:30:00 +00:00
def create
case params[:type]
when 'new'
cluster_params = create_new_cluster_params
when 'existing'
cluster_params = create_existing_cluster_params
end
@cluster = ::Clusters::CreateService
.new(project, current_user, cluster_params)
.execute(token_in_session)
if @cluster.persisted?
redirect_to project_cluster_path(project, @cluster)
else
generate_gcp_authorize_url
validate_gcp_token
case params[:type]
when 'new'
@new_cluster = @cluster
2018-05-24 09:18:17 +00:00
existing_cluster
when 'existing'
@existing_cluster = @cluster
2018-05-24 09:18:17 +00:00
new_cluster
end
2018-05-24 09:18:17 +00:00
render :new, locals: { active_tab: params[:type] }
end
end
private
def cluster
2017-12-05 09:02:15 +00:00
@cluster ||= project.clusters.find(params[:id])
.present(current_user: current_user)
end
def update_params
2017-12-03 14:10:18 +00:00
if cluster.managed?
params.require(:cluster).permit(
:enabled,
:environment_scope,
2017-12-03 14:10:18 +00:00
platform_kubernetes_attributes: [
:namespace
]
)
else
params.require(:cluster).permit(
:enabled,
:name,
:environment_scope,
2017-12-03 14:10:18 +00:00
platform_kubernetes_attributes: [
:api_url,
:token,
:ca_cert,
:namespace
2017-12-03 14:33:10 +00:00
]
2017-12-03 14:10:18 +00:00
)
end
end
def create_new_cluster_params
params.require(:cluster).permit(
:enabled,
:name,
:environment_scope,
provider_gcp_attributes: [
:gcp_project_id,
:zone,
:num_nodes,
:machine_type
]).merge(
provider_type: :gcp,
platform_type: :kubernetes
)
end
def create_existing_cluster_params
params.require(:cluster).permit(
:enabled,
:name,
:environment_scope,
platform_kubernetes_attributes: [
:namespace,
:api_url,
:token,
:ca_cert
]).merge(
provider_type: :user,
platform_type: :kubernetes
)
end
def generate_gcp_authorize_url
state = generate_session_key_redirect(new_project_cluster_path(@project).to_s)
@authorize_url = GoogleApi::CloudPlatform::Client.new(
nil, callback_google_api_auth_url,
state: state).authorize_url
rescue GoogleApi::Auth::ConfigMissingError
# no-op
end
2018-05-23 15:30:00 +00:00
def new_cluster
@new_cluster = ::Clusters::Cluster.new.tap do |cluster|
cluster.build_provider_gcp
2018-05-23 15:30:00 +00:00
end
end
def existing_cluster
@existing_cluster = ::Clusters::Cluster.new.tap do |cluster|
cluster.build_platform_kubernetes
end
end
def validate_gcp_token
2018-05-25 23:36:56 +00:00
@valid_gcp_token = GoogleApi::CloudPlatform::Client.new(token_in_session, nil)
.validate_token(expires_at_in_session)
end
def token_in_session
session[GoogleApi::CloudPlatform::Client.session_key_for_token]
end
def expires_at_in_session
@expires_at_in_session ||=
session[GoogleApi::CloudPlatform::Client.session_key_for_expires_at]
end
def generate_session_key_redirect(uri)
GoogleApi::CloudPlatform::Client.new_session_key_for_redirect_uri do |key|
session[key] = uri
end
end
def authorize_update_cluster!
2017-10-03 21:21:54 +00:00
access_denied! unless can?(current_user, :update_cluster, cluster)
end
def authorize_admin_cluster!
2017-10-03 21:21:54 +00:00
access_denied! unless can?(current_user, :admin_cluster, cluster)
end
def update_applications_status
@cluster.applications.each(&:schedule_status_update)
end
end