forked from kubernetes-sigs/kustomize
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathSecretsFromDatabase.go
53 lines (46 loc) · 1.4 KB
/
SecretsFromDatabase.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
// Copyright 2019 The Kubernetes Authors.
// SPDX-License-Identifier: Apache-2.0
package main
import (
"sigs.k8s.io/kustomize/api/kv"
"sigs.k8s.io/kustomize/api/resmap"
"sigs.k8s.io/kustomize/api/types"
"sigs.k8s.io/yaml"
)
// A secret generator example that gets data
// from a database (simulated by a hardcoded map).
type plugin struct {
h *resmap.PluginHelpers
types.ObjectMeta `json:"metadata,omitempty" yaml:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
// List of keys to use in database lookups
Keys []string `json:"keys,omitempty" yaml:"keys,omitempty"`
}
//nolint: golint
//noinspection GoUnusedGlobalVariable
var KustomizePlugin plugin
var database = map[string]string{
"TREE": "oak",
"ROCKET": "SaturnV",
"FRUIT": "apple",
"VEGETABLE": "carrot",
"SIMPSON": "homer",
}
func (p *plugin) Config(h *resmap.PluginHelpers, c []byte) error {
p.h = h
return yaml.Unmarshal(c, p)
}
// The plan here is to convert the plugin's input
// into the format used by the builtin secret generator plugin.
func (p *plugin) Generate() (resmap.ResMap, error) {
args := types.SecretArgs{}
args.Name = p.Name
args.Namespace = p.Namespace
for _, k := range p.Keys {
if v, ok := database[k]; ok {
args.LiteralSources = append(
args.LiteralSources, k+"="+v)
}
}
return p.h.ResmapFactory().FromSecretArgs(
kv.NewLoader(p.h.Loader(), p.h.Validator()), nil, args)
}