/
k8sresource_funcs.go
235 lines (177 loc) · 7.07 KB
/
k8sresource_funcs.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
// Copyright (c) 2020 Red Hat, Inc.
// Copyright Contributors to the Open Cluster Management project
package templates
import (
"context"
"encoding/base64"
"encoding/json"
"fmt"
k8serrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/klog"
)
// retrieves the value of the key in the given Secret, namespace.
func (t *TemplateResolver) fromSecret(namespace string, secretname string, key string) (string, error) {
klog.V(2).Infof("fromSecret for namespace: %v, secretname: %v, key:%v", namespace, secretname, key)
ns, err := t.getNamespace("fromSecret", namespace)
if err != nil {
return "", err
}
secretsClient := (*t.kubeClient).CoreV1().Secrets(ns)
secret, getErr := secretsClient.Get(context.TODO(), secretname, metav1.GetOptions{})
if getErr != nil {
if k8serrors.IsNotFound(getErr) {
// Add to the referenced objects if the object isn't found since the consumer may want to watch the object
// and resolve the templates again once it is present.
t.addToReferencedObjects("/v1", "Secret", ns, secretname)
}
klog.Errorf("Error Getting secret: %v", getErr)
err := fmt.Errorf("failed to get the secret %s from %s: %w", secretname, ns, getErr)
return "", err
}
keyVal := secret.Data[key]
// when using corev1 secret api, the data is returned decoded ,
// re-encododing to be able to use it in the referencing secret
sEnc := base64.StdEncoding.EncodeToString(keyVal)
// add this Secret to list of Objs referenced by the template
t.addToReferencedObjects("/v1", "Secret", secret.Namespace, secret.Name)
return sEnc, nil
}
// fromSecretProtected wraps fromSecret and encrypts the output value using the "protect" method.
func (t *TemplateResolver) fromSecretProtected(namespace string, secretName string, key string) (string, error) {
value, err := t.fromSecret(namespace, secretName, key)
if err != nil {
return "", err
}
return t.protect(value)
}
// copies all data in the given Secret, namespace.
func (t *TemplateResolver) copySecretDataBase(namespace string, secretname string) (map[string]interface{}, error) {
klog.V(2).Infof("copySecretDataBase for namespace: %v, secretname: %v", namespace, secretname)
ns, err := t.getNamespace("copySecretData", namespace)
if err != nil {
return nil, err
}
secretsClient := (*t.kubeClient).CoreV1().Secrets(ns)
secret, getErr := secretsClient.Get(context.TODO(), secretname, metav1.GetOptions{})
if getErr != nil {
if k8serrors.IsNotFound(getErr) {
// Add to the referenced objects if the object isn't found since the consumer may want to watch the object
// and resolve the templates again once it is present.
t.addToReferencedObjects("/v1", "Secret", ns, secretname)
}
klog.Errorf("Error Getting secret: %v", getErr)
err := fmt.Errorf("failed to get the secret %s from %s: %w", secretname, ns, getErr)
return nil, err
}
data := make(map[string]interface{})
for key, val := range secret.Data {
// when using corev1 secret api, the data is returned decoded,
// re-encododing to be able to use it in the referencing secret
sEnc := base64.StdEncoding.EncodeToString(val)
data[key] = sEnc
}
// add this Secret to list of Objs referenced by the template
t.addToReferencedObjects("/v1", "Secret", secret.Namespace, secret.Name)
return data, nil
}
// copies all data in the given Secret, namespace.
func (t *TemplateResolver) copySecretData(namespace string, secretname string) (string, error) {
klog.V(2).Infof("copySecretData for namespace: %v, secretname: %v", namespace, secretname)
data, err := t.copySecretDataBase(namespace, secretname)
if err != nil {
return "", err
}
rawData, err := json.Marshal(data)
if err != nil {
return "", err
}
return string(rawData), nil
}
// copySecretDataProtected wraps copySecretData and encrypts the output value using the "protect" method.
func (t *TemplateResolver) copySecretDataProtected(namespace string, secretName string) (string, error) {
data, err := t.copySecretDataBase(namespace, secretName)
if err != nil {
return "", err
}
for key, val := range data {
data[key], err = t.protect(fmt.Sprint(val))
if err != nil {
return "", err
}
}
rawData, err := json.Marshal(data)
if err != nil {
return "", err
}
return string(rawData), nil
}
// retrieves value for the key in the given Configmap, namespace.
func (t *TemplateResolver) fromConfigMap(namespace string, cmapname string, key string) (string, error) {
klog.V(2).Infof("fromConfigMap for namespace: %v, configmap name: %v, key:%v", namespace, cmapname, key)
ns, err := t.getNamespace("fromConfigMap", namespace)
if err != nil {
return "", err
}
configmapsClient := (*t.kubeClient).CoreV1().ConfigMaps(ns)
configmap, getErr := configmapsClient.Get(context.TODO(), cmapname, metav1.GetOptions{})
if getErr != nil {
if k8serrors.IsNotFound(getErr) {
// Add to the referenced objects if the object isn't found since the consumer may want to watch the object
// and resolve the templates again once it is present.
t.addToReferencedObjects("/v1", "ConfigMap", ns, cmapname)
}
klog.Errorf("Error getting configmap: %v", getErr)
err := fmt.Errorf("failed getting the ConfigMap %s from %s: %w", cmapname, ns, getErr)
return "", err
}
klog.V(2).Infof("Configmap is %v", configmap)
keyVal := configmap.Data[key]
klog.V(2).Infof("Configmap Key:%v, Value: %v", key, keyVal)
// add this Configmap to list of Objs referenced by the template
t.addToReferencedObjects("/v1", "ConfigMap", namespace, cmapname)
return keyVal, nil
}
// copies data values in the given Configmap, namespace.
func (t *TemplateResolver) copyConfigMapData(namespace string, cmapname string) (string, error) {
klog.V(2).Infof("copyConfigMapData for namespace: %v, configmap name: %v", namespace, cmapname)
ns, err := t.getNamespace("copyConfigMapData", namespace)
if err != nil {
return "", err
}
configmapsClient := (*t.kubeClient).CoreV1().ConfigMaps(ns)
configmap, getErr := configmapsClient.Get(context.TODO(), cmapname, metav1.GetOptions{})
if getErr != nil {
if k8serrors.IsNotFound(getErr) {
// Add to the referenced objects if the object isn't found since the consumer may want to watch the object
// and resolve the templates again once it is present.
t.addToReferencedObjects("/v1", "ConfigMap", ns, cmapname)
}
klog.Errorf("Error getting configmap: %v", getErr)
err := fmt.Errorf("failed getting the ConfigMap %s from %s: %w", cmapname, ns, getErr)
return "", err
}
klog.V(2).Infof("Configmap is %v", configmap)
data := make(map[string]interface{})
for key, val := range configmap.Data {
data[key] = val
}
rawData, err := json.Marshal(data)
if err != nil {
return "", err
}
t.addToReferencedObjects("/v1", "ConfigMap", namespace, cmapname)
return string(rawData), nil
}
// convenience functions to base64 encode string values
// for setting in value in Referencing Secret resources.
func base64encode(v string) string {
return base64.StdEncoding.EncodeToString([]byte(v))
}
func base64decode(v string) string {
data, err := base64.StdEncoding.DecodeString(v)
if err != nil {
return err.Error()
}
return string(data)
}