-
Notifications
You must be signed in to change notification settings - Fork 413
/
secrets_handlers.go
96 lines (84 loc) · 2.63 KB
/
secrets_handlers.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
// -------------------------------------------------------------------------------------------
// Copyright (c) Microsoft Corporation. All rights reserved.
// Licensed under the MIT License. See License.txt in the project root for license information.
// --------------------------------------------------------------------------------------------
package k8scontext
import (
"reflect"
v1 "k8s.io/api/core/v1"
"k8s.io/client-go/tools/cache"
"github.com/Azure/application-gateway-kubernetes-ingress/pkg/events"
"github.com/Azure/application-gateway-kubernetes-ingress/pkg/utils"
)
// secret resource handlers
func (h handlers) secretAdd(obj interface{}) {
sec := obj.(*v1.Secret)
if _, exists := namespacesToIgnore[sec.Namespace]; exists {
return
}
if _, exists := h.context.namespaces[sec.Namespace]; len(h.context.namespaces) > 0 && !exists {
return
}
secKey := utils.GetResourceKey(sec.Namespace, sec.Name)
if h.context.ingressSecretsMap.ContainsValue(secKey) {
// find if this secKey exists in the map[string]UnorderedSets
if err := h.context.CertificateSecretStore.ConvertSecret(secKey, sec); err == nil {
h.context.Work <- events.Event{
Type: events.Create,
Value: obj,
}
h.context.MetricStore.IncK8sAPIEventCounter()
}
}
}
func (h handlers) secretUpdate(oldObj, newObj interface{}) {
sec := newObj.(*v1.Secret)
if _, exists := namespacesToIgnore[sec.Namespace]; exists {
return
}
if _, exists := h.context.namespaces[sec.Namespace]; len(h.context.namespaces) > 0 && !exists {
return
}
if reflect.DeepEqual(oldObj, newObj) {
return
}
secKey := utils.GetResourceKey(sec.Namespace, sec.Name)
if h.context.ingressSecretsMap.ContainsValue(secKey) {
if err := h.context.CertificateSecretStore.ConvertSecret(secKey, sec); err == nil {
h.context.Work <- events.Event{
Type: events.Update,
Value: newObj,
}
h.context.MetricStore.IncK8sAPIEventCounter()
}
}
}
func (h handlers) secretDelete(obj interface{}) {
sec, ok := obj.(*v1.Secret)
if _, exists := namespacesToIgnore[sec.Namespace]; exists {
return
}
if _, exists := h.context.namespaces[sec.Namespace]; len(h.context.namespaces) > 0 && !exists {
return
}
if !ok {
tombstone, ok := obj.(cache.DeletedFinalStateUnknown)
if !ok {
// unable to get from tombstone
return
}
sec, ok = tombstone.Obj.(*v1.Secret)
}
if sec == nil {
return
}
secKey := utils.GetResourceKey(sec.Namespace, sec.Name)
h.context.CertificateSecretStore.delete(secKey)
if h.context.ingressSecretsMap.ContainsValue(secKey) {
h.context.Work <- events.Event{
Type: events.Delete,
Value: obj,
}
h.context.MetricStore.IncK8sAPIEventCounter()
}
}