summaryrefslogtreecommitdiffstats
path: root/kubernetes/uui/Makefile
AgeCommit message (Collapse)AuthorFilesLines
2021-12-07[GLOBAL] Migrate to helm v3efiacor1-2/+2
Move all Chart.yaml to use apiVersion: 2 Move dependencies from requirements.yaml to Chart.yaml Changes to all makeFiles Changes to helm deploy plugin Signed-off-by: efiacor <fiachra.corcoran@est.tech> Change-Id: I03c5290eee9e40f76eacbf171e774204cf5fb1c0 Issue-ID: OOM-2845
2021-11-06[UUI] Automatically retrieve certificatesSylvain Desbureaux1-0/+51
Instead of using hardcoded certificates, let's use certInitializer in order to retrieve them. Issue-ID: OOM-2695 Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com> Change-Id: I673b3c7b8087c150b1e4c1d522b92ec08260ec09
> 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101
/*
Copyright 2018 Intel Corporation.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
    http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package main

import (
	v1 "github.com/onap/multicloud-k8s/src/k8splugin/plugins/network/v1"
	"regexp"

	utils "github.com/onap/multicloud-k8s/src/k8splugin/internal"
	"github.com/onap/multicloud-k8s/src/k8splugin/internal/helm"
	"github.com/onap/multicloud-k8s/src/k8splugin/internal/plugin"

	pkgerrors "github.com/pkg/errors"
	"k8s.io/apimachinery/pkg/runtime/schema"
)

// ExportedVariable is what we will look for when calling the plugin
var ExportedVariable networkPlugin

type networkPlugin struct {
}

func extractData(data string) (cniType, networkName string) {
	re := regexp.MustCompile("_")
	split := re.Split(data, -1)
	if len(split) != 3 {
		return
	}
	cniType = split[1]
	networkName = split[2]
	return
}

// Create an ONAP Network object
func (p networkPlugin) Create(yamlFilePath string, namespace string, client plugin.KubernetesConnector) (string, error) {
	network := &v1.OnapNetwork{}
	if _, err := utils.DecodeYAML(yamlFilePath, network); err != nil {
		return "", pkgerrors.Wrap(err, "Decode network object error")
	}

	cniType := network.Spec.CniType
	typePlugin, ok := utils.LoadedPlugins[cniType+"-network"]
	if !ok {
		return "", pkgerrors.New("No plugin for resource " + cniType + " found")
	}

	symCreateNetworkFunc, err := typePlugin.Lookup("CreateNetwork")
	if err != nil {
		return "", pkgerrors.Wrap(err, "Error fetching "+cniType+" plugin")
	}

	name, err := symCreateNetworkFunc.(func(*v1.OnapNetwork) (string, error))(network)
	if err != nil {
		return "", pkgerrors.Wrap(err, "Error during the creation for "+cniType+" plugin")
	}

	return cniType + "_" + name, nil
}

// Get a Network
func (p networkPlugin) Get(resource helm.KubernetesResource, namespace string, client plugin.KubernetesConnector) (string, error) {
	return "", nil
}

// List of Networks
func (p networkPlugin) List(gvk schema.GroupVersionKind, namespace string,
	client plugin.KubernetesConnector) ([]helm.KubernetesResource, error) {

	return nil, nil
}

// Delete an existing Network
func (p networkPlugin) Delete(resource helm.KubernetesResource, namespace string, client plugin.KubernetesConnector) error {
	cniType, networkName := extractData(resource.Name)
	typePlugin, ok := utils.LoadedPlugins[cniType+"-network"]
	if !ok {
		return pkgerrors.New("No plugin for resource " + cniType + " found")
	}

	symDeleteNetworkFunc, err := typePlugin.Lookup("DeleteNetwork")
	if err != nil {
		return pkgerrors.Wrap(err, "Error fetching "+cniType+" plugin")
	}

	if err := symDeleteNetworkFunc.(func(string) error)(networkName); err != nil {
		return pkgerrors.Wrap(err, "Error during the deletion for "+cniType+" plugin")
	}

	return nil
}