separated source files
This commit is contained in:
		
							
								
								
									
										16
									
								
								Dockerfile
									
									
									
									
									
								
							
							
						
						
									
										16
									
								
								Dockerfile
									
									
									
									
									
								
							@@ -40,14 +40,16 @@ RUN set -eux; \
 | 
				
			|||||||
    apt-get update; \
 | 
					    apt-get update; \
 | 
				
			||||||
    apt-get upgrade -y; \
 | 
					    apt-get upgrade -y; \
 | 
				
			||||||
    apt-get install -y --no-install-recommends python3 python3-pip; \
 | 
					    apt-get install -y --no-install-recommends python3 python3-pip; \
 | 
				
			||||||
    apt-get clean;
 | 
					    apt-get clean; \
 | 
				
			||||||
 | 
					    apt-get -y autoremove; \
 | 
				
			||||||
 | 
					    pip install -r requirements.txt; \
 | 
				
			||||||
 | 
					    rm requirements.txt; \
 | 
				
			||||||
 | 
					    pip cache purge; \
 | 
				
			||||||
 | 
					    rm -rf /root/.cache;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
COPY --chown=bw-operator:bw-operator bitwarden-crd-operator.py /home/bw-operator/bitwarden-crd-operator.py
 | 
					COPY --chown=bw-operator:bw-operator src /home/bw-operator
 | 
				
			||||||
 | 
					
 | 
				
			||||||
USER bw-operator
 | 
					USER bw-operator
 | 
				
			||||||
 | 
					
 | 
				
			||||||
RUN set -eux; \
 | 
					ENTRYPOINT [ "kopf", "run", "--all-namespaces", "--liveness=http://0.0.0.0:8080/healthz" ]
 | 
				
			||||||
    pip install -r requirements.txt --no-warn-script-location
 | 
					CMD [ "/home/bw-operator/bitwardenCrdOperator.py", "/home/bw-operator/kv.py", "/home/bw-operator/dockerlogin.py" ]
 | 
				
			||||||
 | 
					 | 
				
			||||||
ENTRYPOINT [ "/home/bw-operator/.local/bin/kopf", "run", "--all-namespaces", "--liveness=http://0.0.0.0:8080/healthz" ]
 | 
					 | 
				
			||||||
CMD [ "/home/bw-operator/bitwarden-crd-operator.py" ]
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,153 +0,0 @@
 | 
				
			|||||||
#!/usr/bin/env python3
 | 
					 | 
				
			||||||
import kopf
 | 
					 | 
				
			||||||
import kubernetes
 | 
					 | 
				
			||||||
import base64
 | 
					 | 
				
			||||||
import os
 | 
					 | 
				
			||||||
import subprocess
 | 
					 | 
				
			||||||
import json
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
from pprint import pprint
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
def get_secret_from_bitwarden(logger, id):
 | 
					 | 
				
			||||||
    logger.info(f"Locking up secret with ID: {id}")
 | 
					 | 
				
			||||||
    return command_wrapper(logger, f"get item {id}")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
def unlock_bw(logger):
 | 
					 | 
				
			||||||
    token_output = command_wrapper(logger, "unlock --passwordenv BW_PASSWORD")
 | 
					 | 
				
			||||||
    tokens = token_output.split('"')[1::2]
 | 
					 | 
				
			||||||
    os.environ["BW_SESSION"] = tokens[1]
 | 
					 | 
				
			||||||
    logger.info("Signin successful. Session exported")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
def command_wrapper(logger, command):
 | 
					 | 
				
			||||||
    system_env = dict(os.environ)
 | 
					 | 
				
			||||||
    sp = subprocess.Popen([f"bw {command}"], stdout=subprocess.PIPE, stderr=subprocess.PIPE, close_fds=True, shell=True, env=system_env)
 | 
					 | 
				
			||||||
    out, err = sp.communicate()
 | 
					 | 
				
			||||||
    if err:
 | 
					 | 
				
			||||||
        logger.warn(f"Error during bw cli invokement: {err}")
 | 
					 | 
				
			||||||
    return out.decode(encoding='UTF-8')
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
def create_kv(secret, secret_json, content_def):
 | 
					 | 
				
			||||||
    secret.type = "Opaque"
 | 
					 | 
				
			||||||
    secret.data = {}
 | 
					 | 
				
			||||||
    for eleml in content_def:
 | 
					 | 
				
			||||||
        for k, elem in eleml.items():
 | 
					 | 
				
			||||||
            for key,value in elem.items():
 | 
					 | 
				
			||||||
                if key == "secretName":
 | 
					 | 
				
			||||||
                    _secret_key = value
 | 
					 | 
				
			||||||
                if key == "secretRef":
 | 
					 | 
				
			||||||
                    _secret_ref = value
 | 
					 | 
				
			||||||
            secret.data[_secret_ref] = str(base64.b64encode(secret_json["login"][_secret_key].encode("utf-8")), "utf-8")
 | 
					 | 
				
			||||||
    return secret
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
def create_dockerlogin(logger, secret, secret_json, username_ref, password_ref, registry):
 | 
					 | 
				
			||||||
    secret.type = "dockerconfigjson"
 | 
					 | 
				
			||||||
    secret.data = {}
 | 
					 | 
				
			||||||
    auths_dict = {}
 | 
					 | 
				
			||||||
    registry_dict = {}
 | 
					 | 
				
			||||||
    reg_auth_dict = {}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    _username = secret_json["login"][username_ref]
 | 
					 | 
				
			||||||
    logger.info(f"Creating login with username: {_username}")
 | 
					 | 
				
			||||||
    _password = secret_json["login"][password_ref]
 | 
					 | 
				
			||||||
    cred_field = str(base64.b64encode(f"{_username}:{_password}".encode("utf-8")), "utf-8")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    reg_auth_dict["auth"] = cred_field
 | 
					 | 
				
			||||||
    registry_dict[registry] = reg_auth_dict
 | 
					 | 
				
			||||||
    auths_dict["auths"] = registry_dict
 | 
					 | 
				
			||||||
    secret.data[".dockerconfigjson"] = str(base64.b64encode(json.dumps(auths_dict).encode("utf-8")), "utf-8")
 | 
					 | 
				
			||||||
    return secret
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
@kopf.on.startup()
 | 
					 | 
				
			||||||
def bitwarden_signin(logger, **kwargs):
 | 
					 | 
				
			||||||
    if 'BW_HOST' in os.environ:
 | 
					 | 
				
			||||||
        command_wrapper(logger, f"config server {os.getenv('BW_HOST')}")
 | 
					 | 
				
			||||||
    else:
 | 
					 | 
				
			||||||
        logger.info(f"BW_HOST not set. Assuming SaaS installation")
 | 
					 | 
				
			||||||
    command_wrapper(logger, "login --apikey")
 | 
					 | 
				
			||||||
    unlock_bw(logger)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
@kopf.on.create('registry-credentials.lerentis.uploadfilter24.eu')
 | 
					 | 
				
			||||||
def create_managed_registry_secret(spec, name, namespace, logger, body, **kwargs):
 | 
					 | 
				
			||||||
    username_ref = spec.get('usernameRef')
 | 
					 | 
				
			||||||
    password_ref = spec.get('passwordRef')
 | 
					 | 
				
			||||||
    registry = spec.get('registry')
 | 
					 | 
				
			||||||
    id = spec.get('id')
 | 
					 | 
				
			||||||
    secret_name = spec.get('name')
 | 
					 | 
				
			||||||
    secret_namespace = spec.get('namespace')
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    unlock_bw(logger)
 | 
					 | 
				
			||||||
    
 | 
					 | 
				
			||||||
    secret_json_object = json.loads(get_secret_from_bitwarden(logger, id))
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    api = kubernetes.client.CoreV1Api()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    annotations = {
 | 
					 | 
				
			||||||
        "managed": "registry-credentials.lerentis.uploadfilter24.eu",
 | 
					 | 
				
			||||||
        "managedObject": f"{namespace}/{name}"
 | 
					 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
    secret = kubernetes.client.V1Secret()
 | 
					 | 
				
			||||||
    secret.metadata = kubernetes.client.V1ObjectMeta(name=secret_name, annotations=annotations)
 | 
					 | 
				
			||||||
    secret = create_dockerlogin(logger, secret, secret_json_object, username_ref, password_ref, registry)   
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    obj = api.create_namespaced_secret(
 | 
					 | 
				
			||||||
        secret_namespace, secret
 | 
					 | 
				
			||||||
    )
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    logger.info(f"Registry Secret {secret_namespace}/{secret_name} has been created")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
@kopf.on.create('bitwarden-secrets.lerentis.uploadfilter24.eu')
 | 
					 | 
				
			||||||
def create_managed_secret(spec, name, namespace, logger, body, **kwargs):
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    content_def = body['spec']['content']
 | 
					 | 
				
			||||||
    id = spec.get('id')
 | 
					 | 
				
			||||||
    secret_name = spec.get('name')
 | 
					 | 
				
			||||||
    secret_namespace = spec.get('namespace')
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    unlock_bw(logger)
 | 
					 | 
				
			||||||
    
 | 
					 | 
				
			||||||
    secret_json_object = json.loads(get_secret_from_bitwarden(logger, id))
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    api = kubernetes.client.CoreV1Api()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    annotations = {
 | 
					 | 
				
			||||||
        "managed": "bitwarden-secrets.lerentis.uploadfilter24.eu",
 | 
					 | 
				
			||||||
        "managedObject": f"{namespace}/{name}"
 | 
					 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
    secret = kubernetes.client.V1Secret()
 | 
					 | 
				
			||||||
    secret.metadata = kubernetes.client.V1ObjectMeta(name=secret_name, annotations=annotations)
 | 
					 | 
				
			||||||
    secret = create_kv(secret, secret_json_object, content_def)   
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    obj = api.create_namespaced_secret(
 | 
					 | 
				
			||||||
        secret_namespace, secret
 | 
					 | 
				
			||||||
    )
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    logger.info(f"Secret {secret_namespace}/{secret_name} has been created")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
@kopf.on.update('bitwarden-secrets.lerentis.uploadfilter24.eu')
 | 
					 | 
				
			||||||
def my_handler(spec, old, new, diff, **_):
 | 
					 | 
				
			||||||
    pass
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
@kopf.on.delete('bitwarden-secrets.lerentis.uploadfilter24.eu')
 | 
					 | 
				
			||||||
def delete_managed_secret(spec, name, namespace, logger, **kwargs):
 | 
					 | 
				
			||||||
    secret_name = spec.get('name')
 | 
					 | 
				
			||||||
    secret_namespace = spec.get('namespace')
 | 
					 | 
				
			||||||
    api = kubernetes.client.CoreV1Api()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    try:
 | 
					 | 
				
			||||||
        api.delete_namespaced_secret(secret_name, secret_namespace)
 | 
					 | 
				
			||||||
        logger.info(f"Secret {secret_namespace}/{secret_name} has been deleted")
 | 
					 | 
				
			||||||
    except:
 | 
					 | 
				
			||||||
        logger.warn(f"Could not delete secret {secret_namespace}/{secret_name}!")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
@kopf.on.delete('registry-credentials.lerentis.uploadfilter24.eu')
 | 
					 | 
				
			||||||
def delete_managed_secret(spec, name, namespace, logger, **kwargs):
 | 
					 | 
				
			||||||
    secret_name = spec.get('name')
 | 
					 | 
				
			||||||
    secret_namespace = spec.get('namespace')
 | 
					 | 
				
			||||||
    api = kubernetes.client.CoreV1Api()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    try:
 | 
					 | 
				
			||||||
        api.delete_namespaced_secret(secret_name, secret_namespace)
 | 
					 | 
				
			||||||
        logger.info(f"Secret {secret_namespace}/{secret_name} has been deleted")
 | 
					 | 
				
			||||||
    except:
 | 
					 | 
				
			||||||
        logger.warn(f"Could not delete secret {secret_namespace}/{secret_name}!")
 | 
					 | 
				
			||||||
@@ -4,9 +4,9 @@ description: Deploy the Bitwarden CRD Operator
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
type: application
 | 
					type: application
 | 
				
			||||||
 | 
					
 | 
				
			||||||
version: "v0.3.0"
 | 
					version: "v0.3.1"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
appVersion: "0.2.0"
 | 
					appVersion: "0.2.1"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
keywords:
 | 
					keywords:
 | 
				
			||||||
  - operator
 | 
					  - operator
 | 
				
			||||||
@@ -42,8 +42,8 @@ annotations:
 | 
				
			|||||||
  artifacthub.io/license: MIT
 | 
					  artifacthub.io/license: MIT
 | 
				
			||||||
  artifacthub.io/operator: "true"  
 | 
					  artifacthub.io/operator: "true"  
 | 
				
			||||||
  artifacthub.io/changes: |
 | 
					  artifacthub.io/changes: |
 | 
				
			||||||
    - kind: added
 | 
					    - kind: changed
 | 
				
			||||||
      description: "Added support for regestry credentials"
 | 
					      description: "Mainternence update and image rebuild to include upstream fixes"
 | 
				
			||||||
  artifacthub.io/images: |
 | 
					  artifacthub.io/images: |
 | 
				
			||||||
    - name: bitwarden-crd-operator
 | 
					    - name: bitwarden-crd-operator
 | 
				
			||||||
      image: lerentis/bitwarden-crd-operator:0.2.0
 | 
					      image: lerentis/bitwarden-crd-operator:0.2.1
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,2 +1,2 @@
 | 
				
			|||||||
kopf
 | 
					kopf==1.35.6
 | 
				
			||||||
kubernetes
 | 
					kubernetes==24.2.0
 | 
				
			||||||
							
								
								
									
										33
									
								
								src/bitwardenCrdOperator.py
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										33
									
								
								src/bitwardenCrdOperator.py
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,33 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env python3
 | 
				
			||||||
 | 
					import kopf
 | 
				
			||||||
 | 
					import os
 | 
				
			||||||
 | 
					import subprocess
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					def get_secret_from_bitwarden(logger, id):
 | 
				
			||||||
 | 
					    logger.info(f"Locking up secret with ID: {id}")
 | 
				
			||||||
 | 
					    return command_wrapper(logger, f"get item {id}")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					def unlock_bw(logger):
 | 
				
			||||||
 | 
					    token_output = command_wrapper(logger, "unlock --passwordenv BW_PASSWORD")
 | 
				
			||||||
 | 
					    tokens = token_output.split('"')[1::2]
 | 
				
			||||||
 | 
					    os.environ["BW_SESSION"] = tokens[1]
 | 
				
			||||||
 | 
					    logger.info("Signin successful. Session exported")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					def command_wrapper(logger, command):
 | 
				
			||||||
 | 
					    system_env = dict(os.environ)
 | 
				
			||||||
 | 
					    sp = subprocess.Popen([f"bw {command}"], stdout=subprocess.PIPE, stderr=subprocess.PIPE, close_fds=True, shell=True, env=system_env)
 | 
				
			||||||
 | 
					    out, err = sp.communicate()
 | 
				
			||||||
 | 
					    if err:
 | 
				
			||||||
 | 
					        logger.warn(f"Error during bw cli invokement: {err}")
 | 
				
			||||||
 | 
					    return out.decode(encoding='UTF-8')
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@kopf.on.startup()
 | 
				
			||||||
 | 
					def bitwarden_signin(logger, **kwargs):
 | 
				
			||||||
 | 
					    if 'BW_HOST' in os.environ:
 | 
				
			||||||
 | 
					        command_wrapper(logger, f"config server {os.getenv('BW_HOST')}")
 | 
				
			||||||
 | 
					    else:
 | 
				
			||||||
 | 
					        logger.info(f"BW_HOST not set. Assuming SaaS installation")
 | 
				
			||||||
 | 
					    command_wrapper(logger, "login --apikey")
 | 
				
			||||||
 | 
					    unlock_bw(logger)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
							
								
								
									
										69
									
								
								src/dockerlogin.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										69
									
								
								src/dockerlogin.py
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,69 @@
 | 
				
			|||||||
 | 
					import kopf
 | 
				
			||||||
 | 
					import kubernetes
 | 
				
			||||||
 | 
					import base64
 | 
				
			||||||
 | 
					import json
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					from bitwardenCrdOperator import unlock_bw, get_secret_from_bitwarden
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					def create_dockerlogin(logger, secret, secret_json, username_ref, password_ref, registry):
 | 
				
			||||||
 | 
					    secret.type = "dockerconfigjson"
 | 
				
			||||||
 | 
					    secret.data = {}
 | 
				
			||||||
 | 
					    auths_dict = {}
 | 
				
			||||||
 | 
					    registry_dict = {}
 | 
				
			||||||
 | 
					    reg_auth_dict = {}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    _username = secret_json["login"][username_ref]
 | 
				
			||||||
 | 
					    logger.info(f"Creating login with username: {_username}")
 | 
				
			||||||
 | 
					    _password = secret_json["login"][password_ref]
 | 
				
			||||||
 | 
					    cred_field = str(base64.b64encode(f"{_username}:{_password}".encode("utf-8")), "utf-8")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    reg_auth_dict["auth"] = cred_field
 | 
				
			||||||
 | 
					    registry_dict[registry] = reg_auth_dict
 | 
				
			||||||
 | 
					    auths_dict["auths"] = registry_dict
 | 
				
			||||||
 | 
					    secret.data[".dockerconfigjson"] = str(base64.b64encode(json.dumps(auths_dict).encode("utf-8")), "utf-8")
 | 
				
			||||||
 | 
					    return secret
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@kopf.on.create('registry-credentials.lerentis.uploadfilter24.eu')
 | 
				
			||||||
 | 
					def create_managed_registry_secret(spec, name, namespace, logger, **kwargs):
 | 
				
			||||||
 | 
					    username_ref = spec.get('usernameRef')
 | 
				
			||||||
 | 
					    password_ref = spec.get('passwordRef')
 | 
				
			||||||
 | 
					    registry = spec.get('registry')
 | 
				
			||||||
 | 
					    id = spec.get('id')
 | 
				
			||||||
 | 
					    secret_name = spec.get('name')
 | 
				
			||||||
 | 
					    secret_namespace = spec.get('namespace')
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    unlock_bw(logger)
 | 
				
			||||||
 | 
					    
 | 
				
			||||||
 | 
					    secret_json_object = json.loads(get_secret_from_bitwarden(logger, id))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    api = kubernetes.client.CoreV1Api()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    annotations = {
 | 
				
			||||||
 | 
					        "managed": "registry-credentials.lerentis.uploadfilter24.eu",
 | 
				
			||||||
 | 
					        "managedObject": f"{namespace}/{name}"
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    secret = kubernetes.client.V1Secret()
 | 
				
			||||||
 | 
					    secret.metadata = kubernetes.client.V1ObjectMeta(name=secret_name, annotations=annotations)
 | 
				
			||||||
 | 
					    secret = create_dockerlogin(logger, secret, secret_json_object, username_ref, password_ref, registry)   
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    obj = api.create_namespaced_secret(
 | 
				
			||||||
 | 
					        secret_namespace, secret
 | 
				
			||||||
 | 
					    )
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    logger.info(f"Registry Secret {secret_namespace}/{secret_name} has been created")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@kopf.on.update('registry-credentials.lerentis.uploadfilter24.eu')
 | 
				
			||||||
 | 
					def my_handler(spec, old, new, diff, **_):
 | 
				
			||||||
 | 
					    pass
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@kopf.on.delete('registry-credentials.lerentis.uploadfilter24.eu')
 | 
				
			||||||
 | 
					def delete_managed_secret(spec, name, namespace, logger, **kwargs):
 | 
				
			||||||
 | 
					    secret_name = spec.get('name')
 | 
				
			||||||
 | 
					    secret_namespace = spec.get('namespace')
 | 
				
			||||||
 | 
					    api = kubernetes.client.CoreV1Api()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    try:
 | 
				
			||||||
 | 
					        api.delete_namespaced_secret(secret_name, secret_namespace)
 | 
				
			||||||
 | 
					        logger.info(f"Secret {secret_namespace}/{secret_name} has been deleted")
 | 
				
			||||||
 | 
					    except:
 | 
				
			||||||
 | 
					        logger.warn(f"Could not delete secret {secret_namespace}/{secret_name}!")
 | 
				
			||||||
							
								
								
									
										63
									
								
								src/kv.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										63
									
								
								src/kv.py
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,63 @@
 | 
				
			|||||||
 | 
					import kopf
 | 
				
			||||||
 | 
					import kubernetes
 | 
				
			||||||
 | 
					import base64
 | 
				
			||||||
 | 
					import json
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					from bitwardenCrdOperator import unlock_bw, get_secret_from_bitwarden
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					def create_kv(secret, secret_json, content_def):
 | 
				
			||||||
 | 
					    secret.type = "Opaque"
 | 
				
			||||||
 | 
					    secret.data = {}
 | 
				
			||||||
 | 
					    for eleml in content_def:
 | 
				
			||||||
 | 
					        for k, elem in eleml.items():
 | 
				
			||||||
 | 
					            for key,value in elem.items():
 | 
				
			||||||
 | 
					                if key == "secretName":
 | 
				
			||||||
 | 
					                    _secret_key = value
 | 
				
			||||||
 | 
					                if key == "secretRef":
 | 
				
			||||||
 | 
					                    _secret_ref = value
 | 
				
			||||||
 | 
					            secret.data[_secret_ref] = str(base64.b64encode(secret_json["login"][_secret_key].encode("utf-8")), "utf-8")
 | 
				
			||||||
 | 
					    return secret
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@kopf.on.create('bitwarden-secrets.lerentis.uploadfilter24.eu')
 | 
				
			||||||
 | 
					def create_managed_secret(spec, name, namespace, logger, body, **kwargs):
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    content_def = body['spec']['content']
 | 
				
			||||||
 | 
					    id = spec.get('id')
 | 
				
			||||||
 | 
					    secret_name = spec.get('name')
 | 
				
			||||||
 | 
					    secret_namespace = spec.get('namespace')
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    unlock_bw(logger)
 | 
				
			||||||
 | 
					    
 | 
				
			||||||
 | 
					    secret_json_object = json.loads(get_secret_from_bitwarden(logger, id))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    api = kubernetes.client.CoreV1Api()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    annotations = {
 | 
				
			||||||
 | 
					        "managed": "bitwarden-secrets.lerentis.uploadfilter24.eu",
 | 
				
			||||||
 | 
					        "managedObject": f"{namespace}/{name}"
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    secret = kubernetes.client.V1Secret()
 | 
				
			||||||
 | 
					    secret.metadata = kubernetes.client.V1ObjectMeta(name=secret_name, annotations=annotations)
 | 
				
			||||||
 | 
					    secret = create_kv(secret, secret_json_object, content_def)   
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    obj = api.create_namespaced_secret(
 | 
				
			||||||
 | 
					        secret_namespace, secret
 | 
				
			||||||
 | 
					    )
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    logger.info(f"Secret {secret_namespace}/{secret_name} has been created")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@kopf.on.update('bitwarden-secrets.lerentis.uploadfilter24.eu')
 | 
				
			||||||
 | 
					def my_handler(spec, old, new, diff, **_):
 | 
				
			||||||
 | 
					    pass
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					@kopf.on.delete('bitwarden-secrets.lerentis.uploadfilter24.eu')
 | 
				
			||||||
 | 
					def delete_managed_secret(spec, name, namespace, logger, **kwargs):
 | 
				
			||||||
 | 
					    secret_name = spec.get('name')
 | 
				
			||||||
 | 
					    secret_namespace = spec.get('namespace')
 | 
				
			||||||
 | 
					    api = kubernetes.client.CoreV1Api()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    try:
 | 
				
			||||||
 | 
					        api.delete_namespaced_secret(secret_name, secret_namespace)
 | 
				
			||||||
 | 
					        logger.info(f"Secret {secret_namespace}/{secret_name} has been deleted")
 | 
				
			||||||
 | 
					    except:
 | 
				
			||||||
 | 
					        logger.warn(f"Could not delete secret {secret_namespace}/{secret_name}!")
 | 
				
			||||||
		Reference in New Issue
	
	Block a user