mirror of https://github.com/fluxcd/flux2.git
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
120 lines
3.4 KiB
Go
120 lines
3.4 KiB
Go
/*
|
|
Copyright 2021 The Flux authors
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package kustomization
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/drone/envsubst"
|
|
corev1 "k8s.io/api/core/v1"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
"sigs.k8s.io/kustomize/api/resource"
|
|
"sigs.k8s.io/yaml"
|
|
)
|
|
|
|
const (
|
|
// varsubRegex is the regular expression used to validate
|
|
// the var names before substitution
|
|
varsubRegex = "^[_[:alpha:]][_[:alpha:][:digit:]]*$"
|
|
DisabledValue = "disabled"
|
|
)
|
|
|
|
// substituteVariables replaces the vars with their values in the specified resource.
|
|
// If a resource is labeled or annotated with
|
|
// 'kustomize.toolkit.fluxcd.io/substitute: disabled' the substitution is skipped.
|
|
func substituteVariables(
|
|
ctx context.Context,
|
|
kubeClient client.Client,
|
|
kustomization Kustomize,
|
|
res *resource.Resource) (*resource.Resource, error) {
|
|
resData, err := res.AsYAML()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
key := fmt.Sprintf("%s/substitute", kustomization.GetObjectKind().GroupVersionKind().Group)
|
|
|
|
if res.GetLabels()[key] == DisabledValue || res.GetAnnotations()[key] == DisabledValue {
|
|
return nil, nil
|
|
}
|
|
|
|
vars := make(map[string]string)
|
|
|
|
// load vars from ConfigMaps and Secrets data keys
|
|
for _, reference := range kustomization.GetSubstituteFrom() {
|
|
namespacedName := types.NamespacedName{Namespace: kustomization.GetNamespace(), Name: reference.Name}
|
|
switch reference.Kind {
|
|
case "ConfigMap":
|
|
resource := &corev1.ConfigMap{}
|
|
if err := kubeClient.Get(ctx, namespacedName, resource); err != nil {
|
|
return nil, fmt.Errorf("substitute from 'ConfigMap/%s' error: %w", reference.Name, err)
|
|
}
|
|
for k, v := range resource.Data {
|
|
vars[k] = strings.Replace(v, "\n", "", -1)
|
|
}
|
|
case "Secret":
|
|
resource := &corev1.Secret{}
|
|
if err := kubeClient.Get(ctx, namespacedName, resource); err != nil {
|
|
return nil, fmt.Errorf("substitute from 'Secret/%s' error: %w", reference.Name, err)
|
|
}
|
|
for k, v := range resource.Data {
|
|
vars[k] = strings.Replace(string(v), "\n", "", -1)
|
|
}
|
|
}
|
|
}
|
|
|
|
// load in-line vars (overrides the ones from resources)
|
|
if kustomization.GetSubstitute() != nil {
|
|
for k, v := range kustomization.GetSubstitute() {
|
|
vars[k] = strings.Replace(v, "\n", "", -1)
|
|
}
|
|
}
|
|
|
|
// run bash variable substitutions
|
|
if len(vars) > 0 {
|
|
r, _ := regexp.Compile(varsubRegex)
|
|
for v := range vars {
|
|
if !r.MatchString(v) {
|
|
return nil, fmt.Errorf("'%s' var name is invalid, must match '%s'", v, varsubRegex)
|
|
}
|
|
}
|
|
|
|
output, err := envsubst.Eval(string(resData), func(s string) string {
|
|
return vars[s]
|
|
})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("variable substitution failed: %w", err)
|
|
}
|
|
|
|
jsonData, err := yaml.YAMLToJSON([]byte(output))
|
|
if err != nil {
|
|
return nil, fmt.Errorf("YAMLToJSON: %w", err)
|
|
}
|
|
|
|
err = res.UnmarshalJSON(jsonData)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("UnmarshalJSON: %w", err)
|
|
}
|
|
}
|
|
|
|
return res, nil
|
|
}
|