Skip to content

Commit

Permalink
Merge pull request #12 from dcarley/dcarley/handle-empty-secrets
Browse files Browse the repository at this point in the history
[fixes #11] Improve handling of empty secrets
  • Loading branch information
rajatjindal authored Oct 21, 2020
2 parents 877d8fd + daa45a1 commit 0007dd1
Show file tree
Hide file tree
Showing 3 changed files with 126 additions and 4 deletions.
14 changes: 12 additions & 2 deletions pkg/cmd/modify_secret.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ type ModifySecretOptions struct {
IOStreams genericclioptions.IOStreams

args []string
kubeclient *kubernetes.Clientset
kubeclient kubernetes.Interface
secretName string
namespace string
printVersion bool
Expand Down Expand Up @@ -128,7 +128,7 @@ func (o *ModifySecretOptions) Run() error {
}
defer os.Remove(tempfile.Name())

yamlData, err := yaml.Marshal(data)
yamlData, err := yamlOrEmpty(data)
if err != nil {
return err
}
Expand Down Expand Up @@ -180,6 +180,16 @@ func (o *ModifySecretOptions) Run() error {
return nil
}

// yamlOrEmpty renders a map to a YAML, with the exception that an empty map
// becomes an empty byte slice instead of []byte(`{}`)
func yamlOrEmpty(data map[string]string) ([]byte, error) {
if len(data) == 0 {
return []byte{}, nil
}

return yaml.Marshal(data)
}

// getNamespace takes a set of kubectl flag values and returns the namespace we should be operating in
func getNamespace(flags *genericclioptions.ConfigFlags) string {
namespace, _, err := flags.ToRawKubeConfigLoader().Namespace()
Expand Down
112 changes: 112 additions & 0 deletions pkg/cmd/modify_secret_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,112 @@
package cmd

import (
"io/ioutil"
"os"
"testing"

"github.com/sirupsen/logrus"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
v1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/client-go/kubernetes/fake"
)

func TestModifySecrets(t *testing.T) {
const (
name = "mysecret"
namespace = "mynamespace"
)

logrus.SetOutput(ioutil.Discard)
origEditor := os.Getenv("EDITOR")
if origEditor != "" {
defer os.Setenv("EDITOR", origEditor)
} else {
defer os.Unsetenv("EDITOR")
}

testcases := []struct {
name string
command string
secret map[string][]byte
expected map[string][]byte
}{
{
name: "no changes to empty secret",
command: "touch",
secret: map[string][]byte{},
expected: map[string][]byte{},
}, {
name: "no changes to populated secret",
command: "touch",
secret: map[string][]byte{"key": []byte("value")},
expected: map[string][]byte{"key": []byte("value")},
}, {
name: "changes to populated secret",
command: "sed -i= s/value/updated/",
secret: map[string][]byte{"key": []byte("value")},
expected: map[string][]byte{"key": []byte("updated")},
},
}

for _, tc := range testcases {
t.Run(tc.name, func(t *testing.T) {
os.Setenv("EDITOR", tc.command)

client := fake.NewSimpleClientset(&v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: name,
Namespace: namespace,
Annotations: map[string]string{},
},
Data: tc.secret,
})

modify := ModifySecretOptions{
kubeclient: client,
secretName: name,
namespace: namespace,
}
require.NoError(t, modify.Run())

object, err := client.Tracker().Get(
schema.GroupVersionResource{
Version: "v1",
Resource: "secrets",
},
namespace, name,
)
require.NoError(t, err)
assert.Equal(t, tc.expected, object.(*v1.Secret).Data)
})
}
}

func TestYamlOrEmpty(t *testing.T) {
testcases := []struct {
name string
input map[string]string
expected []byte
}{
{
name: "empty map",
input: map[string]string{},
expected: []byte{},
}, {
name: "populated map",
input: map[string]string{"foo": "bar"},
expected: []byte("foo: bar\n"),
},
}

for _, tc := range testcases {
t.Run(tc.name, func(t *testing.T) {
output, err := yamlOrEmpty(tc.input)
assert.NoError(t, err)
assert.Equal(t, tc.expected, output)
})
}
}
4 changes: 2 additions & 2 deletions pkg/secrets/secrets.go
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,11 @@ import (
)

// Get gets the secret from Kubernetes
func Get(kubeclient *kubernetes.Clientset, name, namespace string) (*v1.Secret, error) {
func Get(kubeclient kubernetes.Interface, name, namespace string) (*v1.Secret, error) {
return kubeclient.CoreV1().Secrets(namespace).Get(name, metav1.GetOptions{})
}

// Update updates the secret to Kubernetes
func Update(kubeclient *kubernetes.Clientset, secret *v1.Secret) (*v1.Secret, error) {
func Update(kubeclient kubernetes.Interface, secret *v1.Secret) (*v1.Secret, error) {
return kubeclient.CoreV1().Secrets(secret.Namespace).Update(secret)
}

0 comments on commit 0007dd1

Please sign in to comment.