SDK - Python support for arbitrary secret, similar to ".use_gcp_secret('user-gcp-sa')" (#2639)

* added new secret support

* updated the documentation and env settings

* updated after feedback

* added tests

* nameing issue fixed

* renamed test to follow unittest standard

* updated after feedback

* the new test after renaming

* added the test to main

* updates after feedback

* added licensce agreement

* removed space

* updated the volume named to be generated

* secret_name as volume name and updated test

* updated the file structure

* fixed build
This commit is contained in:
Niklas Hansson 2019-12-03 21:00:59 +01:00 committed by Kubernetes Prow Robot
parent 675b1cde81
commit 88b4757d5b
6 changed files with 144 additions and 0 deletions

View File

@ -0,0 +1,76 @@
# Copyright 2019 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import random
import string
def use_secret(secret_name:str, secret_volume_mount_path:str, env_variable:str=None, secret_file_path_in_volume:str=None):
"""
An operator that configures the container to use a secret.
This assumes that the secret is created and availabel in the k8s cluster.
Keyword Arguments:
secret_name {String} -- [Required] The k8s secret name.
secret_volume_mount_path {String} -- [Required] The path to the secret that is mounted.
env_variable {String} -- Env variable pointing to the mounted secret file. Requires both the env_variable and secret_file_path_in_volume to be defined.
The value is the path to the secret.
secret_file_path_in_volume {String} -- The path to the secret in the volume. This will be the value of env_variable.
Both env_variable and secret_file_path_in_volume needs to be set if any env variable should be created.
Raises:
ValueError: If not the necessary variables (secret_name, volume_name", secret_volume_mount_path) are supplied.
Or only one of env_variable and secret_file_path_in_volume are supplied
Returns:
[ContainerOperator] -- Returns the container operator after it has been modified.
"""
secret_name = str(secret_name)
if '{{' in secret_name:
volume_name = ''.join(random.choices(string.ascii_lowercase + string.digits, k=10)) + "_volume"
else:
volume_name = secret_name
for param, param_name in zip([secret_name, secret_volume_mount_path],["secret_name","secret_volume_mount_path"]):
if param == "":
raise ValueError("The '{}' must not be empty".format(param_name))
if bool(env_variable) != bool(secret_file_path_in_volume):
raise ValueError("Both {} and {} needs to be supplied together or not at all".format(env_variable, secret_file_path_in_volume))
def _use_secret(task):
import os
from kubernetes import client as k8s_client
task = task.add_volume(
k8s_client.V1Volume(
name=volume_name,
secret=k8s_client.V1SecretVolumeSource(
secret_name=secret_name
)
)
).add_volume_mount(
k8s_client.V1VolumeMount(
name=volume_name,
mount_path=secret_volume_mount_path
)
)
if env_variable:
task.container.add_env_variable(
k8s_client.V1EnvVar(
name=env_variable,
value=os.path.join(secret_volume_mount_path, secret_file_path_in_volume),
)
)
return task
return _use_secret

View File

@ -71,6 +71,7 @@ setup(
'kfp.components.structures.kubernetes',
'kfp.containers',
'kfp.dsl',
'kfp.dsl.extensions',
'kfp.notebook',
],
classifiers=[

View File

@ -0,0 +1,65 @@
# Copyright 2019 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
from kfp.dsl import ContainerOp
from kfp.dsl.extensions.kubernetes import use_secret
import unittest
import inspect
class TestAddSecrets(unittest.TestCase):
def test_use_default_use_secret(self):
op1 = ContainerOp(name="op1", image="image")
secret_name = "my-secret"
secret_path = "/here/are/my/secret"
op1 = op1.apply(use_secret(secret_name=secret_name,
secret_volume_mount_path=secret_path))
self.assertEqual(type(op1.container.env), type(None))
container_dict = op1.container.to_dict()
volume_mounts = container_dict["volume_mounts"][0]
self.assertEqual(volume_mounts["name"], secret_name)
self.assertEqual(type(volume_mounts), dict)
self.assertEqual(volume_mounts["mount_path"], secret_path)
def test_use_set_volume_use_secret(self):
op1 = ContainerOp(name="op1", image="image")
secret_name = "my-secret"
secret_path = "/here/are/my/secret"
op1 = op1.apply(use_secret(secret_name=secret_name,
secret_volume_mount_path=secret_path))
self.assertEqual(type(op1.container.env), type(None))
container_dict = op1.container.to_dict()
volume_mounts = container_dict["volume_mounts"][0]
self.assertEqual(type(volume_mounts), dict)
self.assertEqual(volume_mounts["mount_path"], secret_path)
def test_use_set_env_use_secret(self):
op1 = ContainerOp(name="op1", image="image")
secret_name = "my-secret"
secret_path = "/here/are/my/secret/"
env_variable = "MY_SECRET"
secret_file_path_in_volume = "secret.json"
op1 = op1.apply(use_secret(secret_name=secret_name,
secret_volume_mount_path=secret_path,
env_variable=env_variable,
secret_file_path_in_volume=secret_file_path_in_volume))
self.assertEqual(len(op1.container.env), 1)
container_dict = op1.container.to_dict()
volume_mounts = container_dict["volume_mounts"][0]
self.assertEqual(type(volume_mounts), dict)
self.assertEqual(volume_mounts["mount_path"], secret_path)
env_dict = op1.container.env[0].to_dict()
self.assertEqual(env_dict["name"], env_variable)
self.assertEqual(env_dict["value"], secret_path + secret_file_path_in_volume)

View File

@ -29,6 +29,7 @@ import resource_op_tests
import volume_op_tests
import pipeline_volume_tests
import volume_snapshotop_tests
import extensions.test_kubernetes as test_kubernetes
if __name__ == '__main__':
@ -54,6 +55,7 @@ if __name__ == '__main__':
suite.addTests(
unittest.defaultTestLoader.loadTestsFromModule(volume_snapshotop_tests)
)
suite.addTests(unittest.defaultTestLoader.loadTestsFromModule(test_kubernetes))
runner = unittest.TextTestRunner()
if not runner.run(suite).wasSuccessful():