mirror of https://github.com/kubernetes/kops.git
97 lines
2.0 KiB
Go
97 lines
2.0 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package fitasks
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"k8s.io/kops/upup/pkg/fi"
|
|
)
|
|
|
|
//go:generate fitask -type=Secret
|
|
type Secret struct {
|
|
Name *string
|
|
Lifecycle *fi.Lifecycle
|
|
}
|
|
|
|
var _ fi.HasCheckExisting = &Secret{}
|
|
|
|
// It's important always to check for the existing Secret, so we don't regenerate tokens e.g. on terraform
|
|
func (e *Secret) CheckExisting(c *fi.Context) bool {
|
|
return true
|
|
}
|
|
|
|
func (e *Secret) Find(c *fi.Context) (*Secret, error) {
|
|
secrets := c.SecretStore
|
|
|
|
name := fi.StringValue(e.Name)
|
|
if name == "" {
|
|
return nil, nil
|
|
}
|
|
|
|
secret, err := secrets.FindSecret(name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if secret == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
actual := &Secret{
|
|
Name: &name,
|
|
}
|
|
|
|
// Avoid spurious changes
|
|
actual.Lifecycle = e.Lifecycle
|
|
|
|
return actual, nil
|
|
}
|
|
|
|
func (e *Secret) Run(c *fi.Context) error {
|
|
return fi.DefaultDeltaRunMethod(e, c)
|
|
}
|
|
|
|
func (s *Secret) CheckChanges(a, e, changes *Secret) error {
|
|
if a != nil {
|
|
if changes.Name != nil {
|
|
return fi.CannotChangeField("Name")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (_ *Secret) Render(c *fi.Context, a, e, changes *Secret) error {
|
|
name := fi.StringValue(e.Name)
|
|
if name == "" {
|
|
return fi.RequiredField("Name")
|
|
}
|
|
|
|
secrets := c.SecretStore
|
|
|
|
secret, err := fi.CreateSecret()
|
|
if err != nil {
|
|
return fmt.Errorf("error creating secret %q: %v", name, err)
|
|
}
|
|
|
|
_, _, err = secrets.GetOrCreateSecret(name, secret)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating secret %q: %v", name, err)
|
|
}
|
|
|
|
return nil
|
|
}
|