-
Notifications
You must be signed in to change notification settings - Fork 1
/
kubernetes.go
95 lines (87 loc) · 3.01 KB
/
kubernetes.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
package pkg
import (
"context"
"os"
"strings"
"github.com/go-logr/logr"
corev1 "k8s.io/api/core/v1"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes"
"k8s.io/client-go/rest"
"k8s.io/client-go/tools/clientcmd"
)
type KubernetesHelper struct {
logger logr.Logger
clientSet *kubernetes.Clientset
defaultNamespace string
}
func NewKubernetesHelper(log logr.Logger, defaultNamespace string) (*KubernetesHelper, error) {
config, err := rest.InClusterConfig()
if err != nil {
log.Info("Failed to get in cluster config, trying kubeconfig")
config, err = clientcmd.BuildConfigFromFlags("", os.Getenv("KUBECONFIG"))
if err != nil {
log.Error(err, "Failed to get kubeconfig")
return nil, err
}
}
clientSet, err := kubernetes.NewForConfig(config)
if err != nil {
log.Error(err, "Failed to create clientset")
return nil, err
}
return &KubernetesHelper{
logger: log,
clientSet: clientSet,
defaultNamespace: defaultNamespace,
}, nil
}
func (k *KubernetesHelper) SearchSecret(urls []string) (*[]corev1.Secret, error) {
ctx := context.Background()
secretList, err := k.clientSet.CoreV1().Secrets(k.defaultNamespace).List(ctx, v1.ListOptions{
LabelSelector: LabelSelector,
})
if err != nil {
k.logger.Error(err, "Failed to retrieve secretsList", "namespace", k.defaultNamespace, "urls", urls)
return nil, err
}
matchingSecrets := make([]corev1.Secret, 0)
for _, secret := range secretList.Items {
k.logger.Info("Checking secret", "secret", secret.Name)
secretUrl := string(secret.Data["url"])
for _, url := range urls {
if strings.Contains(secretUrl, url) {
k.logger.Info("Found secret", "name", secret.Name, "namespace", secret.Namespace)
matchingSecrets = append(matchingSecrets, secret)
}
}
}
return &matchingSecrets, nil
}
func (k *KubernetesHelper) UpdateSecret(accessToken string, secret *corev1.Secret) error {
updatedSecret := secret.DeepCopy()
updatedSecret.Data["password"] = []byte(accessToken)
updatedSecret.Data["username"] = []byte(DefaultUsername)
k.logger.Info("Updating secret", "namespace", updatedSecret.Namespace, "name", updatedSecret.Name)
_, err := k.clientSet.CoreV1().Secrets(updatedSecret.Namespace).Update(context.Background(), updatedSecret, v1.UpdateOptions{})
if err != nil {
k.logger.Error(err, "Failed to update secret", "namespace", updatedSecret.Namespace, "name", updatedSecret.Name)
return err
}
k.logger.Info("Updated secret", "namespace", updatedSecret.Namespace, "name", updatedSecret.Name)
return nil
}
func (k *KubernetesHelper) GetInClusterConfiguration(cmName string) ([]string, error) {
cm, err := k.clientSet.CoreV1().ConfigMaps(k.defaultNamespace).Get(context.Background(), cmName, v1.GetOptions{})
if err != nil {
k.logger.Error(err, "Failed to get configmap", "name", cmName)
return nil, err
}
matchUrls, ok := cm.Data["matchUrls"]
if !ok {
k.logger.Info("No 'matchUrls' found in configmap", "name", cmName)
return nil, nil
}
urls := strings.Split(matchUrls, ",")
return urls, nil
}