activated = false; String name = "secrets-watch"; watches.put(name, kubernetesClient.secrets().watch(new Watcher<Secret>() { @Override public void eventReceived(Action action, Secret secret) {
secret = client.secrets().withName(name).get(); secret = client.secrets().inNamespace(namespace).withName(name).get(); client.secrets().withLabels(config.getLabels()).list().getItems() .forEach(s -> putAll(s, result)); client.secrets().inNamespace(namespace) .withLabels(config.getLabels()).list().getItems() .forEach(s -> putAll(s, result));
@Override public MixedOperation<Secret, SecretList, DoneableSecret, Resource<Secret, DoneableSecret>> secrets() { return delegate.secrets(); }
activated = false; String name = "secrets-watch"; watches.put(name, kubernetesClient.secrets() .watch(new Watcher<Secret>() { @Override
@Override protected MixedOperation<Secret, SecretList, DoneableSecret, Resource<Secret, DoneableSecret>> operation() { return client.secrets(); } }
public String getServiceaccountToken(String name, String namespace) { return new String(Base64.getDecoder().decode(client.secrets().inNamespace(namespace).list().getItems().stream() .filter(secret -> secret.getMetadata().getName().contains(name + "-token")).collect(Collectors.toList()) .get(0).getData().get("token")), StandardCharsets.UTF_8); } }
public String getKeycloakCA() throws UnsupportedEncodingException { Secret secret = client.secrets().inNamespace(globalNamespace).withName("standard-authservice-cert").get(); if (secret == null) { throw new IllegalStateException("Unable to find CA cert for keycloak"); } return new String(Base64.getDecoder().decode(secret.getData().get("tls.crt")), StandardCharsets.UTF_8); }
@Override protected void mocker(KubernetesClient mockClient, MixedOperation op) { when(mockClient.secrets()).thenReturn(op); }
public UserCredentials getKeycloakCredentials() { Secret creds = client.secrets().inNamespace(globalNamespace).withName("keycloak-credentials").get(); if (creds != null) { String username = new String(Base64.getDecoder().decode(creds.getData().get("admin.username"))); String password = new String(Base64.getDecoder().decode(creds.getData().get("admin.password"))); return new UserCredentials(username, password); } else { return null; } }
protected void doList(Exchange exchange, String operation) throws Exception { SecretList secretsList = getEndpoint().getKubernetesClient().secrets().inAnyNamespace() .list(); MessageHelper.copyHeaders(exchange.getIn(), exchange.getOut(), true); exchange.getOut().setBody(secretsList.getItems()); }
private Secret getProbeCredentialsSecret(AppDeploymentRequest request) { Secret secret = null; String probeCredentialsSecret = "spring.cloud.deployer.kubernetes.probeCredentialsSecret"; if (request.getDeploymentProperties().containsKey(probeCredentialsSecret)) { String secretName = request.getDeploymentProperties().get(probeCredentialsSecret); secret = client.secrets().withName(secretName).get(); } return secret; } }
@Override Map<String, String> getData(KubernetesClient client, String name) { Secret resource = client.secrets().withName(name).get(); return (resource != null) ? resource.getData() : null; }
@Override Secret createResource(Secret current) { return client .secrets() .inNamespace(getNamespace()) .create(current); }
protected void doCreateSecret(Secret secret, String namespace, String sourceName) { log.info("Creating a Secret from " + sourceName + " namespace " + namespace + " name " + getName(secret)); try { Object answer; if (StringUtils.isNotBlank(namespace)) { answer = kubernetesClient.secrets().inNamespace(namespace).create(secret); } else { answer = kubernetesClient.secrets().inNamespace(getNamespace()).create(secret); } logGeneratedEntity("Created Secret: ", namespace, secret, answer); } catch (Exception e) { onApplyError("Failed to create Secret from " + sourceName + ". " + e + ". " + secret, e); } }
private void deleteSecret(Secret secret) { LOG.info("[AUDIT] Deleting service account {} secret {}", serviceAccount(secret), secret.getMetadata().getName()); try { client.secrets().delete(secret); } catch (KubernetesClientException e) { if (e.getCode() == 404) { LOG.debug("Couldn't find secret to delete {}", secret.getMetadata().getName()); } else { LOG.warn("[AUDIT] Failed to delete secret {}", secret.getMetadata().getName()); throw e; } } }
@Override Secret getCurrentResource() { return client .secrets() .inNamespace(getNamespace()) .withName(getName()) .get(); }
protected boolean isNamespaceEmpty(String name) { return client.extensions().deployments().inNamespace(name).list().getItems().isEmpty() && client.services().inNamespace(name).list().getItems().isEmpty() && client.secrets().inNamespace(name).list().getItems().isEmpty(); }
private static void createSecret(KubernetesClient client) { Secret secret = new SecretBuilder() .withStringData(ImmutableMap.of(SECRET_KEY, CONTAINER_ENV_VAR_FROM_SECRET_VALUE)).withNewMetadata() .withName("container-secret").endMetadata().build(); client.secrets().createOrReplace(secret); secret = new SecretBuilder().withStringData(ImmutableMap.of(SECRET_KEY, POD_ENV_VAR_FROM_SECRET_VALUE)) .withNewMetadata().withName("pod-secret").endMetadata().build(); client.secrets().createOrReplace(secret); }
private static void createSecret(KubernetesClient client) { Secret secret = new SecretBuilder() .withStringData(ImmutableMap.of(SECRET_KEY, CONTAINER_ENV_VAR_FROM_SECRET_VALUE)).withNewMetadata() .withName("container-secret").endMetadata().build(); client.secrets().createOrReplace(secret); secret = new SecretBuilder().withStringData(ImmutableMap.of(SECRET_KEY, POD_ENV_VAR_FROM_SECRET_VALUE)) .withNewMetadata().withName("pod-secret").endMetadata().build(); client.secrets().createOrReplace(secret); }