-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathlist.go
151 lines (124 loc) · 4.89 KB
/
list.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
// Copyright 2017 The Kubernetes Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package secret
import (
"log"
"github.com/kubernetes/dashboard/src/app/backend/api"
"github.com/kubernetes/dashboard/src/app/backend/errors"
"github.com/kubernetes/dashboard/src/app/backend/resource/common"
"github.com/kubernetes/dashboard/src/app/backend/resource/dataselect"
"k8s.io/api/core/v1"
metaV1 "k8s.io/apimachinery/pkg/apis/meta/v1"
kubernetes "k8s.io/client-go/kubernetes"
)
// SecretSpec is a common interface for the specification of different secrets.
type SecretSpec interface {
GetName() string
GetType() v1.SecretType
GetNamespace() string
GetData() map[string][]byte
}
// ImagePullSecretSpec is a specification of an image pull secret implements SecretSpec
type ImagePullSecretSpec struct {
Name string `json:"name"`
Namespace string `json:"namespace"`
// The value of the .dockercfg property. It must be Base64 encoded.
Data []byte `json:"data"`
}
// GetName returns the name of the ImagePullSecret
func (spec *ImagePullSecretSpec) GetName() string {
return spec.Name
}
// GetType returns the type of the ImagePullSecret, which is always api.SecretTypeDockercfg
func (spec *ImagePullSecretSpec) GetType() v1.SecretType {
return v1.SecretTypeDockercfg
}
// GetNamespace returns the namespace of the ImagePullSecret
func (spec *ImagePullSecretSpec) GetNamespace() string {
return spec.Namespace
}
// GetData returns the data the secret carries, it is a single key-value pair
func (spec *ImagePullSecretSpec) GetData() map[string][]byte {
return map[string][]byte{v1.DockerConfigKey: spec.Data}
}
// Secret is a single secret returned to the frontend.
type Secret struct {
ObjectMeta api.ObjectMeta `json:"objectMeta"`
TypeMeta api.TypeMeta `json:"typeMeta"`
Type v1.SecretType `json:"type"`
}
// SecretsList is a response structure for a queried secrets list.
type SecretList struct {
api.ListMeta `json:"listMeta"`
// Unordered list of Secrets.
Secrets []Secret `json:"secrets"`
// List of non-critical errors, that occurred during resource retrieval.
Errors []error `json:"errors"`
}
// GetSecretList returns all secrets in the given namespace.
func GetSecretList(client kubernetes.Interface, namespace *common.NamespaceQuery,
dsQuery *dataselect.DataSelectQuery) (*SecretList, error) {
log.Printf("Getting list of secrets in %s namespace\n", namespace)
secretList, err := client.CoreV1().Secrets(namespace.ToRequestParam()).List(api.ListEverything)
nonCriticalErrors, criticalError := errors.HandleError(err)
if criticalError != nil {
return nil, criticalError
}
return toSecretList(secretList.Items, nonCriticalErrors, dsQuery), nil
}
// GetSecretListFromChannels returns a list of all Secrets in the cluster reading required resource list once from the channels.
func GetSecretListFromChannels(channels *common.ResourceChannels, dsQuery *dataselect.DataSelectQuery) (*SecretList, error) {
secretList := <-channels.SecretList.List
err := <-channels.SecretList.Error
nonCriticalErrors, criticalError := errors.HandleError(err)
if criticalError != nil {
return nil, criticalError
}
return toSecretList(secretList.Items, nonCriticalErrors, dsQuery), nil
}
// CreateSecret creates a single secret using the cluster API client
func CreateSecret(client kubernetes.Interface, spec SecretSpec) (*Secret, error) {
namespace := spec.GetNamespace()
secret := &v1.Secret{
ObjectMeta: metaV1.ObjectMeta{
Name: spec.GetName(),
Namespace: namespace,
},
Type: spec.GetType(),
Data: spec.GetData(),
}
_, err := client.CoreV1().Secrets(namespace).Create(secret)
return toSecret(secret), err
}
func toSecret(secret *v1.Secret) *Secret {
return &Secret{
ObjectMeta: api.NewObjectMeta(secret.ObjectMeta),
TypeMeta: api.NewTypeMeta(api.ResourceKindSecret),
Type: secret.Type,
}
}
func toSecretList(secrets []v1.Secret, nonCriticalErrors []error, dsQuery *dataselect.DataSelectQuery) *SecretList {
newSecretList := &SecretList{
ListMeta: api.ListMeta{TotalItems: len(secrets)},
Secrets: make([]Secret, 0),
Errors: nonCriticalErrors,
}
secretCells, filteredTotal := dataselect.GenericDataSelectWithFilter(toCells(secrets), dsQuery)
secrets = fromCells(secretCells)
newSecretList.ListMeta = api.ListMeta{TotalItems: filteredTotal}
for _, secret := range secrets {
newSecretList.Secrets = append(newSecretList.Secrets, *toSecret(&secret))
}
return newSecretList
}