clusters_controller.rb 7.27 KB
Newer Older
1 2
# frozen_string_literal: true

3 4 5
class Clusters::ClustersController < Clusters::BaseController
  include RoutableActions

6
  before_action :cluster, except: [:index, :new, :create_gcp, :create_user, :authorize_aws_role]
7 8
  before_action :generate_gcp_authorize_url, only: [:new]
  before_action :validate_gcp_token, only: [:new]
9 10
  before_action :gcp_cluster, only: [:new]
  before_action :user_cluster, only: [:new]
11
  before_action :authorize_create_cluster!, only: [:new, :authorize_aws_role]
12 13
  before_action :authorize_update_cluster!, only: [:update]
  before_action :authorize_admin_cluster!, only: [:destroy]
14
  before_action :update_applications_status, only: [:cluster_status]
15 16 17
  before_action only: [:new, :create_gcp] do
    push_frontend_feature_flag(:create_eks_clusters)
  end
18 19 20
  before_action only: [:show] do
    push_frontend_feature_flag(:enable_cluster_application_elastic_stack)
  end
21

22
  helper_method :token_in_session
23

Kamil Trzcinski's avatar
Kamil Trzcinski committed
24 25
  STATUS_POLLING_INTERVAL = 10_000

26
  def index
27 28 29 30 31 32
    finder = ClusterAncestorsFinder.new(clusterable.subject, current_user)
    clusters = finder.execute

    # Note: We are paginating through an array here but this should OK as:
    #
    # In CE, we can have a maximum group nesting depth of 21, so including
33
    # project cluster, we can have max 22 clusters for a group hierarchy.
34 35 36
    # In EE (Premium) we can have any number, as multiple clusters are
    # supported, but the number of clusters are fairly low currently.
    #
37
    # See https://gitlab.com/gitlab-org/gitlab-foss/issues/55260 also.
38
    @clusters = Kaminari.paginate_array(clusters).page(params[:page]).per(20)
39 40

    @has_ancestor_clusters = finder.has_ancestor_clusters?
41 42
  end

43
  def new
44 45
    return unless Feature.enabled?(:create_eks_clusters)

46
    if params[:provider] == 'aws'
47 48
      @aws_role = current_user.aws_role || Aws::Role.new
      @aws_role.ensure_role_external_id!
49

50
    elsif params[:provider] == 'gcp'
51 52
      redirect_to @authorize_url if @authorize_url && !@valid_gcp_token
    end
53 54
  end

55 56
  # Overridding ActionController::Metal#status is NOT a good idea
  def cluster_status
57 58
    respond_to do |format|
      format.json do
59
        Gitlab::PollingInterval.set_header(response, interval: STATUS_POLLING_INTERVAL)
60

61
        render json: ClusterSerializer
62
          .new(current_user: @current_user)
63
          .represent_status(@cluster)
64 65
      end
    end
66 67
  end

68
  def show
69 70 71
  end

  def update
Shinya Maeda's avatar
Shinya Maeda committed
72
    Clusters::UpdateService
73
      .new(current_user, update_params)
74
      .execute(cluster)
75

Kamil Trzcinski's avatar
Kamil Trzcinski committed
76
    if cluster.valid?
77 78 79 80 81
      respond_to do |format|
        format.json do
          head :no_content
        end
        format.html do
82
          flash[:notice] = _('Kubernetes cluster was successfully updated.')
83
          redirect_to cluster.show_path
84 85
        end
      end
Kamil Trzcinski's avatar
Kamil Trzcinski committed
86
    else
87 88 89 90
      respond_to do |format|
        format.json { head :bad_request }
        format.html { render :show }
      end
Kamil Trzcinski's avatar
Kamil Trzcinski committed
91
    end
92 93
  end

94
  def destroy
95 96 97 98 99 100
    response = Clusters::DestroyService
      .new(current_user, destroy_params)
      .execute(cluster)

    flash[:notice] = response[:message]
    redirect_to clusterable.index_path, status: :found
101 102
  end

103 104
  def create_gcp
    @gcp_cluster = ::Clusters::CreateService
105
      .new(current_user, create_gcp_cluster_params)
106
      .execute(access_token: token_in_session)
107
      .present(current_user: current_user)
108 109

    if @gcp_cluster.persisted?
110
      redirect_to @gcp_cluster.show_path
111 112 113 114 115
    else
      generate_gcp_authorize_url
      validate_gcp_token
      user_cluster

116
      render :new, locals: { active_tab: 'create' }
117 118 119 120 121
    end
  end

  def create_user
    @user_cluster = ::Clusters::CreateService
122
      .new(current_user, create_user_cluster_params)
123
      .execute(access_token: token_in_session)
124
      .present(current_user: current_user)
125 126

    if @user_cluster.persisted?
127
      redirect_to @user_cluster.show_path
128 129 130 131 132
    else
      generate_gcp_authorize_url
      validate_gcp_token
      gcp_cluster

133
      render :new, locals: { active_tab: 'add' }
134 135 136
    end
  end

137 138 139 140 141 142
  def authorize_aws_role
    role = current_user.build_aws_role(create_role_params)

    role.save ? respond_201 : respond_422
  end

143 144
  private

145 146 147 148 149 150 151 152
  def destroy_params
    # To be uncomented on https://gitlab.com/gitlab-org/gitlab/merge_requests/16954
    # This MR got split into other since it was too big.
    #
    # params.permit(:cleanup)
    {}
  end

153
  def update_params
154
    if cluster.provided_by_user?
Kamil Trzcinski's avatar
Kamil Trzcinski committed
155 156
      params.require(:cluster).permit(
        :enabled,
157
        :name,
158
        :environment_scope,
159
        :managed,
160
        :base_domain,
161
        :management_project_id,
Kamil Trzcinski's avatar
Kamil Trzcinski committed
162
        platform_kubernetes_attributes: [
163 164 165
          :api_url,
          :token,
          :ca_cert,
Kamil Trzcinski's avatar
Kamil Trzcinski committed
166 167 168 169 170 171
          :namespace
        ]
      )
    else
      params.require(:cluster).permit(
        :enabled,
172
        :environment_scope,
173
        :managed,
174
        :base_domain,
175
        :management_project_id,
Kamil Trzcinski's avatar
Kamil Trzcinski committed
176 177
        platform_kubernetes_attributes: [
          :namespace
Kamil Trzcinski's avatar
Kamil Trzcinski committed
178
        ]
Kamil Trzcinski's avatar
Kamil Trzcinski committed
179 180
      )
    end
181 182
  end

183 184 185 186 187
  def create_gcp_cluster_params
    params.require(:cluster).permit(
      :enabled,
      :name,
      :environment_scope,
188
      :managed,
189 190 191 192
      provider_gcp_attributes: [
        :gcp_project_id,
        :zone,
        :num_nodes,
193
        :machine_type,
194
        :cloud_run,
195
        :legacy_abac
196 197
      ]).merge(
        provider_type: :gcp,
198
        platform_type: :kubernetes,
199
        clusterable: clusterable.subject
200 201 202 203 204 205 206 207
      )
  end

  def create_user_cluster_params
    params.require(:cluster).permit(
      :enabled,
      :name,
      :environment_scope,
208
      :managed,
209 210 211 212
      platform_kubernetes_attributes: [
        :namespace,
        :api_url,
        :token,
213 214
        :ca_cert,
        :authorization_type
215 216
      ]).merge(
        provider_type: :user,
217
        platform_type: :kubernetes,
218
        clusterable: clusterable.subject
219 220 221
      )
  end

222 223 224 225
  def create_role_params
    params.require(:cluster).permit(:role_arn, :role_external_id)
  end

226
  def generate_gcp_authorize_url
227 228
    params = Feature.enabled?(:create_eks_clusters) ? { provider: :gke } : {}
    state = generate_session_key_redirect(clusterable.new_path(params).to_s)
229 230 231 232 233 234 235 236 237

    @authorize_url = GoogleApi::CloudPlatform::Client.new(
      nil, callback_google_api_auth_url,
      state: state).authorize_url
  rescue GoogleApi::Auth::ConfigMissingError
    # no-op
  end

  def gcp_cluster
238 239 240
    cluster = Clusters::BuildService.new(clusterable.subject).execute
    cluster.build_provider_gcp
    @gcp_cluster = cluster.present(current_user: current_user)
241 242 243
  end

  def user_cluster
244 245 246
    cluster = Clusters::BuildService.new(clusterable.subject).execute
    cluster.build_platform_kubernetes
    @user_cluster = cluster.present(current_user: current_user)
247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268
  end

  def validate_gcp_token
    @valid_gcp_token = GoogleApi::CloudPlatform::Client.new(token_in_session, nil)
      .validate_token(expires_at_in_session)
  end

  def token_in_session
    session[GoogleApi::CloudPlatform::Client.session_key_for_token]
  end

  def expires_at_in_session
    @expires_at_in_session ||=
      session[GoogleApi::CloudPlatform::Client.session_key_for_expires_at]
  end

  def generate_session_key_redirect(uri)
    GoogleApi::CloudPlatform::Client.new_session_key_for_redirect_uri do |key|
      session[key] = uri
    end
  end

269 270
  def update_applications_status
    @cluster.applications.each(&:schedule_status_update)
271
  end
272
end
273

274
Clusters::ClustersController.prepend_if_ee('EE::Clusters::ClustersController')