-
Notifications
You must be signed in to change notification settings - Fork 38
/
secret.go
73 lines (60 loc) · 2.33 KB
/
secret.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
/*
Copyright 2019 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package secret
import (
"context"
"errors"
"fmt"
"strings"
corev1 "k8s.io/api/core/v1"
"sigs.k8s.io/controller-runtime/pkg/client"
)
var ErrSecretInvalidSuffix = errors.New("not a valid cluster secret name")
// Get retrieves the specified Secret (if any) from the given
// cluster name and namespace.
func Get(ctx context.Context, c client.Reader, cluster client.ObjectKey, purpose Purpose) (*corev1.Secret, error) {
return GetFromNamespacedName(ctx, c, cluster, purpose)
}
// GetFromNamespacedName retrieves the specified Secret (if any) from the given
// cluster name and namespace.
func GetFromNamespacedName(ctx context.Context, c client.Reader, clusterName client.ObjectKey, purpose Purpose) (*corev1.Secret, error) {
secret := &corev1.Secret{}
secretKey := client.ObjectKey{
Namespace: clusterName.Namespace,
Name: Name(clusterName.Name, purpose),
}
if err := c.Get(ctx, secretKey, secret); err != nil {
return nil, err
}
return secret, nil
}
// Name returns the name of the secret for a cluster.
func Name(cluster string, suffix Purpose) string {
return fmt.Sprintf("%s-%s", cluster, suffix)
}
// ParseSecretName return the cluster name and the suffix Purpose in name is a valid cluster secrets,
// otherwise it return error.
func ParseSecretName(name string) (string, Purpose, error) {
separatorPos := strings.LastIndex(name, "-")
if separatorPos == -1 {
return "", "", fmt.Errorf("the purpose of the suffix is missing %q: %w", name, ErrSecretInvalidSuffix)
}
clusterName := name[:separatorPos]
purposeSuffix := Purpose(name[separatorPos+1:])
for _, purpose := range allSecretPurposes {
if purpose == purposeSuffix {
return clusterName, purposeSuffix, nil
}
}
return "", "", fmt.Errorf("invalid purpose suffix %q: %w", name, ErrSecretInvalidSuffix)
}