Skip to content

Commit 61dad14

Browse files
authored
Merge pull request #5344 from stormqueen1990/feat/add-remove-secret-command
feat: add remove secret command
2 parents f65506d + a318d4d commit 61dad14

File tree

3 files changed

+219
-0
lines changed

3 files changed

+219
-0
lines changed

kustomize/commands/edit/remove/all.go

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ func NewCmdRemove(
2525
# Removes one or more configmap from the kustomization file
2626
kustomize edit remove configmap {name1},{name2}
2727
28+
# Removes one or more secret from the kustomization file
29+
kustomize edit remove secret {name1},{name2}
30+
2831
# Removes one or more patches from the kustomization file
2932
kustomize edit remove patch --path {filepath} --group {target group name} --version {target version}
3033
@@ -41,6 +44,7 @@ func NewCmdRemove(
4144
}
4245
c.AddCommand(
4346
newCmdRemoveConfigMap(fSys),
47+
newCmdRemoveSecret(fSys),
4448
newCmdRemoveResource(fSys),
4549
newCmdRemoveLabel(fSys, v.MakeLabelNameValidator()),
4650
newCmdRemoveAnnotation(fSys, v.MakeAnnotationNameValidator()),
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
// Copyright 2023 The Kubernetes Authors.
2+
// SPDX-License-Identifier: Apache-2.0
3+
4+
package remove
5+
6+
import (
7+
"errors"
8+
"fmt"
9+
"log"
10+
"strings"
11+
12+
"github.com/spf13/cobra"
13+
"sigs.k8s.io/kustomize/api/konfig"
14+
"sigs.k8s.io/kustomize/api/types"
15+
"sigs.k8s.io/kustomize/kustomize/v5/commands/internal/kustfile"
16+
"sigs.k8s.io/kustomize/kyaml/filesys"
17+
)
18+
19+
type removeSecretOptions struct {
20+
secretNamesToRemove []string
21+
}
22+
23+
// newCmdRemoveSecret removes secretGenerator(s) with the specified name(s).
24+
func newCmdRemoveSecret(fSys filesys.FileSystem) *cobra.Command {
25+
var o removeSecretOptions
26+
27+
cmd := &cobra.Command{
28+
Use: "secret",
29+
Short: "Removes the specified secret(s) from " +
30+
konfig.DefaultKustomizationFileName(),
31+
Long: "",
32+
Example: `
33+
remove secret my-secret
34+
`,
35+
RunE: func(cmd *cobra.Command, args []string) error {
36+
err := o.Validate(args)
37+
if err != nil {
38+
return err
39+
}
40+
return o.RunRemoveSecret(fSys)
41+
},
42+
}
43+
return cmd
44+
}
45+
46+
// Validate validates removeSecret command.
47+
func (o *removeSecretOptions) Validate(args []string) error {
48+
switch {
49+
case len(args) == 0:
50+
return errors.New("at least one secret name must be specified")
51+
case len(args) > 1:
52+
return fmt.Errorf("too many arguments: %s; to provide multiple secrets to remove, please separate secret names by commas", args)
53+
}
54+
55+
o.secretNamesToRemove = strings.Split(args[0], ",")
56+
return nil
57+
}
58+
59+
// RunRemoveSecret runs Secret command (do real work).
60+
func (o *removeSecretOptions) RunRemoveSecret(fSys filesys.FileSystem) error {
61+
mf, err := kustfile.NewKustomizationFile(fSys)
62+
if err != nil {
63+
return fmt.Errorf("could not read kustomization file: %w", err)
64+
}
65+
66+
m, err := mf.Read()
67+
if err != nil {
68+
return fmt.Errorf("could not read kustomization file contents: %w", err)
69+
}
70+
71+
foundSecrets := make(map[string]struct{})
72+
73+
newSecrets := make([]types.SecretArgs, 0, len(m.SecretGenerator))
74+
for _, currentSecret := range m.SecretGenerator {
75+
if kustfile.StringInSlice(currentSecret.Name, o.secretNamesToRemove) {
76+
foundSecrets[currentSecret.Name] = struct{}{}
77+
continue
78+
}
79+
newSecrets = append(newSecrets, currentSecret)
80+
}
81+
82+
if len(foundSecrets) == 0 {
83+
return fmt.Errorf("no specified secret(s) were found in the %s file",
84+
konfig.DefaultKustomizationFileName())
85+
}
86+
87+
for _, name := range o.secretNamesToRemove {
88+
if _, found := foundSecrets[name]; !found {
89+
log.Printf("secret %s doesn't exist in kustomization file", name)
90+
}
91+
}
92+
m.SecretGenerator = newSecrets
93+
94+
err = mf.Write(m)
95+
if err != nil {
96+
return fmt.Errorf("failed to write kustomization file: %w", err)
97+
}
98+
return nil
99+
}
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
// Copyright 2023 The Kubernetes Authors.
2+
// SPDX-License-Identifier: Apache-2.0
3+
4+
package remove //nolint:testpackage
5+
6+
import (
7+
"fmt"
8+
"testing"
9+
10+
"github.com/stretchr/testify/require"
11+
testutils_test "sigs.k8s.io/kustomize/kustomize/v5/commands/internal/testutils"
12+
"sigs.k8s.io/kustomize/kyaml/filesys"
13+
)
14+
15+
func TestRemoveSecret(t *testing.T) {
16+
const secretName01 = "example-secret-01"
17+
const secretName02 = "example-secret-02"
18+
19+
tests := map[string]struct {
20+
input string
21+
args []string
22+
expectedOutput string
23+
expectedErr string
24+
}{
25+
"happy path": {
26+
input: fmt.Sprintf(`
27+
apiVersion: kustomize.config.k8s.io/v1beta1
28+
kind: Kustomization
29+
secretGenerator:
30+
- name: %s
31+
files:
32+
- longsecret.txt
33+
`, secretName01),
34+
args: []string{secretName01},
35+
expectedOutput: `
36+
apiVersion: kustomize.config.k8s.io/v1beta1
37+
kind: Kustomization
38+
`,
39+
},
40+
"multiple": {
41+
input: fmt.Sprintf(`
42+
apiVersion: kustomize.config.k8s.io/v1beta1
43+
kind: Kustomization
44+
secretGenerator:
45+
- name: %s
46+
files:
47+
- longsecret.txt
48+
- name: %s
49+
files:
50+
- longsecret.txt
51+
`, secretName01, secretName02),
52+
args: []string{
53+
fmt.Sprintf("%s,%s", secretName01, secretName02),
54+
},
55+
expectedOutput: `
56+
apiVersion: kustomize.config.k8s.io/v1beta1
57+
kind: Kustomization
58+
`,
59+
},
60+
"miss": {
61+
input: fmt.Sprintf(`
62+
apiVersion: kustomize.config.k8s.io/v1beta1
63+
kind: Kustomization
64+
secretGenerator:
65+
- name: %s
66+
files:
67+
- longsecret.txt
68+
`, secretName01),
69+
args: []string{"foo"},
70+
expectedErr: "no specified secret(s) were found",
71+
},
72+
"no secret name specified": {
73+
args: []string{},
74+
expectedErr: "at least one secret name must be specified",
75+
},
76+
"too many secret names specified": {
77+
args: []string{"test1", "test2"},
78+
expectedErr: "too many arguments",
79+
},
80+
"one existing and one non-existing": {
81+
input: fmt.Sprintf(`
82+
apiVersion: kustomize.config.k8s.io/v1beta1
83+
kind: Kustomization
84+
secretGenerator:
85+
- name: %s
86+
files:
87+
- application.properties
88+
`, secretName01),
89+
args: []string{fmt.Sprintf("%s,%s", secretName01, "foo")},
90+
expectedOutput: `
91+
apiVersion: kustomize.config.k8s.io/v1beta1
92+
kind: Kustomization
93+
`,
94+
},
95+
}
96+
97+
for name, tc := range tests {
98+
t.Run(name, func(t *testing.T) {
99+
fSys := filesys.MakeFsInMemory()
100+
testutils_test.WriteTestKustomizationWith(fSys, []byte(tc.input))
101+
cmd := newCmdRemoveSecret(fSys)
102+
err := cmd.RunE(cmd, tc.args)
103+
104+
if tc.expectedErr != "" {
105+
require.Error(t, err)
106+
require.Contains(t, err.Error(), tc.expectedErr)
107+
return
108+
}
109+
110+
require.NoError(t, err)
111+
content, err := testutils_test.ReadTestKustomization(fSys)
112+
require.NoError(t, err)
113+
require.Equal(t, tc.expectedOutput, string(content))
114+
})
115+
}
116+
}

0 commit comments

Comments
 (0)