2023-03-27 11:34:35 -04:00
// Copyright © 2023 Ory Corp
2022-11-03 10:31:10 -04:00
// SPDX-License-Identifier: Apache-2.0
2019-08-21 10:12:07 +02:00
package controllers
import (
"context"
2019-08-21 12:10:25 +02:00
"fmt"
2023-10-24 10:18:41 +02:00
"os"
2021-09-14 08:07:06 -04:00
"sync"
2019-08-21 10:12:07 +02:00
"github.com/go-logr/logr"
2019-08-21 12:10:25 +02:00
apiv1 "k8s.io/api/core/v1"
apierrs "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
2019-09-13 14:37:29 +02:00
"k8s.io/apimachinery/pkg/types"
2019-08-21 10:12:07 +02:00
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
2023-08-08 10:30:24 +02:00
"sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
2021-09-14 08:07:06 -04:00
hydrav1alpha1 "github.com/ory/hydra-maester/api/v1alpha1"
"github.com/ory/hydra-maester/hydra"
2019-08-21 12:10:25 +02:00
)
2019-08-21 10:12:07 +02:00
2019-08-21 12:10:25 +02:00
const (
2023-10-24 10:18:41 +02:00
DefaultClientID = "CLIENT_ID"
DefaultSecretKey = "CLIENT_SECRET"
FinalizerName = "finalizer.ory.hydra.sh"
2021-09-14 08:07:06 -04:00
DefaultNamespace = "default"
2019-08-21 10:12:07 +02:00
)
2023-10-24 10:18:41 +02:00
var (
ClientIDKey = DefaultClientID
ClientSecretKey = DefaultSecretKey
)
2021-09-14 08:07:06 -04:00
type clientKey struct {
2019-11-14 01:11:13 -07:00
url string
port int
endpoint string
forwardedProto string
}
2021-09-14 08:07:06 -04:00
// OAuth2ClientFactory is a function that creates oauth2 client.
// The OAuth2ClientReconciler defaults to use hydra.New and the factory allows
// to override this behavior for mocks during tests.
type OAuth2ClientFactory func (
spec hydrav1alpha1 . OAuth2ClientSpec ,
tlsTrustStore string ,
insecureSkipVerify bool ,
) ( hydra . Client , error )
2019-08-21 12:10:25 +02:00
2021-09-14 08:07:06 -04:00
// OAuth2ClientReconciler reconciles a OAuth2Client object.
2019-08-21 10:12:07 +02:00
type OAuth2ClientReconciler struct {
client . Client
2021-09-14 08:07:06 -04:00
HydraClient hydra . Client
Log logr . Logger
2021-05-13 13:50:21 +02:00
ControllerNamespace string
2021-09-14 08:07:06 -04:00
oauth2Clients map [ clientKey ] hydra . Client
oauth2ClientFactory OAuth2ClientFactory
mu sync . Mutex
}
// Options represent options to pass to the oauth2 client reconciler.
type Options struct {
Namespace string
OAuth2ClientFactory OAuth2ClientFactory
}
// Option is a functional option.
type Option func ( * Options )
2023-10-24 10:18:41 +02:00
func init ( ) {
if os . Getenv ( "CLIENT_ID_KEY" ) != "" {
ClientIDKey = os . Getenv ( "CLIENT_ID_KEY" )
}
if os . Getenv ( "CLIENT_SECRET_KEY" ) != "" {
ClientSecretKey = os . Getenv ( "CLIENT_SECRET_KEY" )
}
}
2021-09-14 08:07:06 -04:00
// WithNamespace sets the kubernetes namespace for the controller.
// The default is "default".
func WithNamespace ( ns string ) Option {
return func ( o * Options ) {
o . Namespace = ns
}
}
// WithClientFactory sets a function to create new oauth2 clients during the reconciliation logic.
func WithClientFactory ( factory OAuth2ClientFactory ) Option {
return func ( o * Options ) {
o . OAuth2ClientFactory = factory
}
}
// New returns a new Oauth2ClientReconciler.
func New ( c client . Client , hydraClient hydra . Client , log logr . Logger , opts ... Option ) * OAuth2ClientReconciler {
options := & Options {
Namespace : DefaultNamespace ,
OAuth2ClientFactory : hydra . New ,
}
for _ , opt := range opts {
opt ( options )
}
return & OAuth2ClientReconciler {
Client : c ,
HydraClient : hydraClient ,
Log : log ,
ControllerNamespace : options . Namespace ,
oauth2Clients : make ( map [ clientKey ] hydra . Client , 0 ) ,
oauth2ClientFactory : options . OAuth2ClientFactory ,
}
2019-08-21 10:12:07 +02:00
}
// +kubebuilder:rbac:groups=hydra.ory.sh,resources=oauth2clients,verbs=get;list;watch;create;update;patch;delete
// +kubebuilder:rbac:groups=hydra.ory.sh,resources=oauth2clients/status,verbs=get;update;patch
2019-08-21 12:10:25 +02:00
// +kubebuilder:rbac:groups="",resources=secrets,verbs=get;list;watch;create;update;patch;delete
2019-08-21 10:12:07 +02:00
2021-05-10 10:35:08 +02:00
func ( r * OAuth2ClientReconciler ) Reconcile ( ctx context . Context , req ctrl . Request ) ( ctrl . Result , error ) {
2019-08-21 10:12:07 +02:00
_ = r . Log . WithValues ( "oauth2client" , req . NamespacedName )
2019-09-13 14:37:29 +02:00
var oauth2client hydrav1alpha1 . OAuth2Client
if err := r . Get ( ctx , req . NamespacedName , & oauth2client ) ; err != nil {
2019-08-21 12:10:25 +02:00
if apierrs . IsNotFound ( err ) {
2019-11-14 01:11:13 -07:00
if registerErr := r . unregisterOAuth2Clients ( ctx , & oauth2client ) ; registerErr != nil {
2019-09-19 09:29:18 +02:00
return ctrl . Result { } , registerErr
2019-08-21 12:10:25 +02:00
}
return ctrl . Result { } , nil
}
return ctrl . Result { } , err
}
2021-05-13 13:50:21 +02:00
// Check request namespace
if r . ControllerNamespace != "" {
2023-10-10 13:22:06 +02:00
r . Log . Info ( fmt . Sprintf ( "ControllerNamespace is set to: %s, working only on items in this namespace. Other namespaces are ignored." , r . ControllerNamespace ) )
2021-05-13 13:50:21 +02:00
if req . NamespacedName . Namespace != r . ControllerNamespace {
2023-10-10 13:22:06 +02:00
r . Log . Info ( fmt . Sprintf ( "Requested resource %s is not in namespace: %s and will be ignored" , req . String ( ) , r . ControllerNamespace ) )
2021-05-13 13:50:21 +02:00
return ctrl . Result { } , nil
}
}
2019-11-14 01:11:13 -07:00
// examine DeletionTimestamp to determine if object is under deletion
if oauth2client . ObjectMeta . DeletionTimestamp . IsZero ( ) {
// The object is not being deleted, so if it does not have our finalizer,
// then lets add the finalizer and update the object. This is equivalent
// registering our finalizer.
if ! containsString ( oauth2client . ObjectMeta . Finalizers , FinalizerName ) {
2019-12-16 10:35:25 +01:00
typeMeta := oauth2client . TypeMeta
2019-11-14 01:11:13 -07:00
oauth2client . ObjectMeta . Finalizers = append ( oauth2client . ObjectMeta . Finalizers , FinalizerName )
if err := r . Update ( ctx , & oauth2client ) ; err != nil {
return ctrl . Result { } , err
}
2019-12-16 10:35:25 +01:00
// restore the TypeMeta object as it is removed during Update, but need to be accessed later
oauth2client . TypeMeta = typeMeta
2019-11-14 01:11:13 -07:00
}
} else {
// The object is being deleted
if containsString ( oauth2client . ObjectMeta . Finalizers , FinalizerName ) {
// our finalizer is present, so lets handle any external dependency
if err := r . unregisterOAuth2Clients ( ctx , & oauth2client ) ; err != nil {
// if fail to delete the external dependency here, return with error
// so that it can be retried
return ctrl . Result { } , err
}
// remove our finalizer from the list and update it.
oauth2client . ObjectMeta . Finalizers = removeString ( oauth2client . ObjectMeta . Finalizers , FinalizerName )
if err := r . Update ( ctx , & oauth2client ) ; err != nil {
return ctrl . Result { } , err
}
}
return ctrl . Result { } , nil
}
2020-02-11 17:05:41 +01:00
var secret apiv1 . Secret
if err := r . Get ( ctx , types . NamespacedName { Name : oauth2client . Spec . SecretName , Namespace : req . Namespace } , & secret ) ; err != nil {
if apierrs . IsNotFound ( err ) {
2023-08-08 10:30:24 +02:00
if registerErr := r . registerOAuth2Client ( ctx , & oauth2client ) ; registerErr != nil {
2020-02-11 17:05:41 +01:00
return ctrl . Result { } , registerErr
2019-09-13 14:37:29 +02:00
}
2020-02-11 17:05:41 +01:00
return ctrl . Result { } , nil
2019-09-13 14:37:29 +02:00
}
2020-02-11 17:05:41 +01:00
return ctrl . Result { } , err
}
2019-08-21 12:10:25 +02:00
2020-03-26 10:19:11 +01:00
credentials , err := parseSecret ( secret , oauth2client . Spec . TokenEndpointAuthMethod )
2020-02-11 17:05:41 +01:00
if err != nil {
r . Log . Error ( err , fmt . Sprintf ( "secret %s/%s is invalid" , secret . Name , secret . Namespace ) )
if updateErr := r . updateReconciliationStatusError ( ctx , & oauth2client , hydrav1alpha1 . StatusInvalidSecret , err ) ; updateErr != nil {
return ctrl . Result { } , updateErr
2019-09-13 14:37:29 +02:00
}
2020-02-11 17:05:41 +01:00
return ctrl . Result { } , nil
}
2019-09-13 14:37:29 +02:00
2020-02-11 17:05:41 +01:00
hydraClient , err := r . getHydraClientForClient ( oauth2client )
if err != nil {
r . Log . Error ( err , fmt . Sprintf (
"hydra address %s:%d%s is invalid" ,
oauth2client . Spec . HydraAdmin . URL ,
oauth2client . Spec . HydraAdmin . Port ,
oauth2client . Spec . HydraAdmin . Endpoint ,
) )
if updateErr := r . updateReconciliationStatusError ( ctx , & oauth2client , hydrav1alpha1 . StatusInvalidHydraAddress , err ) ; updateErr != nil {
return ctrl . Result { } , updateErr
2019-11-14 01:11:13 -07:00
}
2020-02-11 17:05:41 +01:00
return ctrl . Result { } , nil
}
2019-11-14 01:11:13 -07:00
2020-02-11 17:05:41 +01:00
fetched , found , err := hydraClient . GetOAuth2Client ( string ( credentials . ID ) )
if err != nil {
return ctrl . Result { } , err
2023-08-08 10:30:24 +02:00
} else if ! found {
return ctrl . Result { } , fmt . Errorf ( "oauth2 client %s not found" , credentials . ID )
2020-02-11 17:05:41 +01:00
}
2019-08-21 12:10:25 +02:00
2020-02-11 17:05:41 +01:00
if found {
//conclude reconciliation if the client exists and has not been updated
if oauth2client . Generation == oauth2client . Status . ObservedGeneration {
return ctrl . Result { } , nil
}
2019-09-19 09:29:18 +02:00
2020-02-11 17:05:41 +01:00
if fetched . Owner != fmt . Sprintf ( "%s/%s" , oauth2client . Name , oauth2client . Namespace ) {
2023-08-08 10:30:24 +02:00
conflictErr := fmt . Errorf ( "ID provided in secret %s/%s is assigned to another resource" , secret . Name , secret . Namespace )
2020-02-11 17:05:41 +01:00
if updateErr := r . updateReconciliationStatusError ( ctx , & oauth2client , hydrav1alpha1 . StatusInvalidSecret , conflictErr ) ; updateErr != nil {
2019-09-19 09:29:18 +02:00
return ctrl . Result { } , updateErr
}
return ctrl . Result { } , nil
2019-08-21 12:10:25 +02:00
}
2020-02-11 17:05:41 +01:00
if updateErr := r . updateRegisteredOAuth2Client ( ctx , & oauth2client , credentials ) ; updateErr != nil {
return ctrl . Result { } , updateErr
2019-09-19 09:29:18 +02:00
}
2020-02-11 17:05:41 +01:00
return ctrl . Result { } , nil
}
2019-08-21 10:12:07 +02:00
return ctrl . Result { } , nil
}
func ( r * OAuth2ClientReconciler ) SetupWithManager ( mgr ctrl . Manager ) error {
return ctrl . NewControllerManagedBy ( mgr ) .
For ( & hydrav1alpha1 . OAuth2Client { } ) .
Complete ( r )
}
2019-08-21 12:10:25 +02:00
2023-08-08 10:30:24 +02:00
func ( r * OAuth2ClientReconciler ) registerOAuth2Client ( ctx context . Context , c * hydrav1alpha1 . OAuth2Client ) error {
2019-11-14 01:11:13 -07:00
if err := r . unregisterOAuth2Clients ( ctx , c ) ; err != nil {
return err
}
2021-09-14 08:07:06 -04:00
hydraClient , err := r . getHydraClientForClient ( * c )
2019-11-14 01:11:13 -07:00
if err != nil {
2019-09-13 14:37:29 +02:00
return err
}
2019-09-03 13:38:56 +02:00
2021-09-14 08:07:06 -04:00
oauth2client , err := hydra . FromOAuth2Client ( c )
2021-06-04 13:10:08 +02:00
if err != nil {
2021-06-04 13:48:35 +02:00
if updateErr := r . updateReconciliationStatusError ( ctx , c , hydrav1alpha1 . StatusRegistrationFailed , err ) ; updateErr != nil {
return updateErr
}
2021-06-04 13:10:08 +02:00
2023-08-08 10:30:24 +02:00
return fmt . Errorf ( "failed to construct hydra client for object: %w" , err )
2019-08-21 12:10:25 +02:00
}
2021-09-14 08:07:06 -04:00
created , err := hydraClient . PostOAuth2Client ( oauth2client )
2019-09-13 14:37:29 +02:00
if err != nil {
2019-09-19 09:29:18 +02:00
if updateErr := r . updateReconciliationStatusError ( ctx , c , hydrav1alpha1 . StatusRegistrationFailed , err ) ; updateErr != nil {
return updateErr
}
return nil
2019-09-13 14:37:29 +02:00
}
2019-08-21 12:10:25 +02:00
clientSecret := apiv1 . Secret {
ObjectMeta : metav1 . ObjectMeta {
2019-09-13 14:37:29 +02:00
Name : c . Spec . SecretName ,
Namespace : c . Namespace ,
2019-12-16 10:35:25 +01:00
OwnerReferences : [ ] metav1 . OwnerReference { {
APIVersion : c . TypeMeta . APIVersion ,
Kind : c . TypeMeta . Kind ,
Name : c . ObjectMeta . Name ,
UID : c . ObjectMeta . UID ,
} } ,
2019-08-21 12:10:25 +02:00
} ,
Data : map [ string ] [ ] byte {
2020-03-26 10:19:11 +01:00
ClientIDKey : [ ] byte ( * created . ClientID ) ,
2019-08-21 12:10:25 +02:00
} ,
}
2020-03-26 10:19:11 +01:00
if created . Secret != nil {
clientSecret . Data [ ClientSecretKey ] = [ ] byte ( * created . Secret )
}
2019-09-13 14:37:29 +02:00
if err := r . Create ( ctx , & clientSecret ) ; err != nil {
2019-09-19 09:29:18 +02:00
if updateErr := r . updateReconciliationStatusError ( ctx , c , hydrav1alpha1 . StatusCreateSecretFailed , err ) ; updateErr != nil {
return updateErr
}
2019-09-13 14:37:29 +02:00
}
2019-09-19 09:29:18 +02:00
return r . ensureEmptyStatusError ( ctx , c )
2019-09-13 14:37:29 +02:00
}
func ( r * OAuth2ClientReconciler ) updateRegisteredOAuth2Client ( ctx context . Context , c * hydrav1alpha1 . OAuth2Client , credentials * hydra . Oauth2ClientCredentials ) error {
2021-09-14 08:07:06 -04:00
hydraClient , err := r . getHydraClientForClient ( * c )
2019-11-14 01:11:13 -07:00
if err != nil {
return err
}
2021-09-14 08:07:06 -04:00
oauth2client , err := hydra . FromOAuth2Client ( c )
2021-06-04 13:10:08 +02:00
if err != nil {
2021-06-04 13:54:41 +02:00
if updateErr := r . updateReconciliationStatusError ( ctx , c , hydrav1alpha1 . StatusUpdateFailed , err ) ; updateErr != nil {
2021-06-04 13:48:35 +02:00
return updateErr
}
2023-08-08 10:30:24 +02:00
return fmt . Errorf ( "failed to construct hydra client for object: %w" , err )
2021-06-04 13:10:08 +02:00
}
2021-09-14 08:07:06 -04:00
if _ , err := hydraClient . PutOAuth2Client ( oauth2client . WithCredentials ( credentials ) ) ; err != nil {
2019-09-19 09:29:18 +02:00
if updateErr := r . updateReconciliationStatusError ( ctx , c , hydrav1alpha1 . StatusUpdateFailed , err ) ; updateErr != nil {
return updateErr
}
2019-09-13 14:37:29 +02:00
}
2019-09-19 09:29:18 +02:00
return r . ensureEmptyStatusError ( ctx , c )
2019-09-13 14:37:29 +02:00
}
2019-11-14 01:11:13 -07:00
func ( r * OAuth2ClientReconciler ) unregisterOAuth2Clients ( ctx context . Context , c * hydrav1alpha1 . OAuth2Client ) error {
2023-10-10 13:22:06 +02:00
// if a required field is empty, that means this is deleted after
2019-11-14 01:11:13 -07:00
// the finalizers have done their job, so just return
if c . Spec . Scope == "" || c . Spec . SecretName == "" {
return nil
}
2023-10-10 13:22:06 +02:00
h , err := r . getHydraClientForClient ( * c )
2019-11-14 01:11:13 -07:00
if err != nil {
return err
}
2019-08-30 13:47:27 +02:00
2023-10-10 13:22:06 +02:00
clients , err := h . ListOAuth2Client ( )
2019-08-21 12:10:25 +02:00
if err != nil {
2019-09-13 14:37:29 +02:00
return err
}
2019-11-14 01:11:13 -07:00
for _ , cJSON := range clients {
if cJSON . Owner == fmt . Sprintf ( "%s/%s" , c . Name , c . Namespace ) {
2024-11-15 16:38:17 +01:00
if c . Spec . DeletionPolicy == hydrav1alpha1 . OAuth2ClientDeletionPolicyOrphan {
// Do not delete the OAuth2 client.
r . Log . Info ( "oauth2 client deletion, leave the row orphan" )
return nil
}
2023-10-10 13:22:06 +02:00
if err := h . DeleteOAuth2Client ( * cJSON . ClientID ) ; err != nil {
2019-09-19 09:29:18 +02:00
return err
}
2019-09-03 13:38:56 +02:00
}
2019-08-21 12:10:25 +02:00
}
2019-09-13 14:37:29 +02:00
return nil
2019-08-21 12:10:25 +02:00
}
2019-09-13 14:37:29 +02:00
func ( r * OAuth2ClientReconciler ) updateReconciliationStatusError ( ctx context . Context , c * hydrav1alpha1 . OAuth2Client , code hydrav1alpha1 . StatusCode , err error ) error {
r . Log . Error ( err , fmt . Sprintf ( "error processing client %s/%s " , c . Name , c . Namespace ) , "oauth2client" , "register" )
2023-08-08 10:30:24 +02:00
_ , err = controllerutil . CreateOrPatch ( ctx , r . Client , c , func ( ) error {
c . Status . ObservedGeneration = c . Generation
c . Status . ReconciliationError = hydrav1alpha1 . ReconciliationError {
Code : code ,
Description : err . Error ( ) ,
}
c . Status . Conditions = [ ] hydrav1alpha1 . OAuth2ClientCondition {
{
Type : hydrav1alpha1 . OAuth2ClientConditionReady ,
Status : hydrav1alpha1 . ConditionFalse ,
} ,
}
return nil
} )
if err != nil {
r . Log . Error ( err , fmt . Sprintf ( "status update failed for client %s/%s " , c . Name , c . Namespace ) , "oauth2client" , "update status" )
2023-03-27 11:34:35 -04:00
}
2019-09-13 14:37:29 +02:00
2023-08-08 10:30:24 +02:00
return err
2019-09-19 09:29:18 +02:00
}
func ( r * OAuth2ClientReconciler ) ensureEmptyStatusError ( ctx context . Context , c * hydrav1alpha1 . OAuth2Client ) error {
2023-08-08 10:30:24 +02:00
_ , err := controllerutil . CreateOrPatch ( ctx , r . Client , c , func ( ) error {
c . Status . ObservedGeneration = c . Generation
c . Status . ReconciliationError = hydrav1alpha1 . ReconciliationError { }
c . Status . Conditions = [ ] hydrav1alpha1 . OAuth2ClientCondition {
{
Type : hydrav1alpha1 . OAuth2ClientConditionReady ,
Status : hydrav1alpha1 . ConditionTrue ,
} ,
}
2019-09-19 09:29:18 +02:00
2023-08-08 10:30:24 +02:00
return nil
} )
if err != nil {
2019-09-19 09:29:18 +02:00
r . Log . Error ( err , fmt . Sprintf ( "status update failed for client %s/%s " , c . Name , c . Namespace ) , "oauth2client" , "update status" )
}
2023-08-08 10:30:24 +02:00
return err
2019-09-13 14:37:29 +02:00
}
2020-03-26 10:19:11 +01:00
func parseSecret ( secret apiv1 . Secret , authMethod hydrav1alpha1 . TokenEndpointAuthMethod ) ( * hydra . Oauth2ClientCredentials , error ) {
2019-09-13 14:37:29 +02:00
id , found := secret . Data [ ClientIDKey ]
if ! found {
2024-03-21 03:03:01 -05:00
return nil , fmt . Errorf ( "%s property missing" , ClientIDKey )
2019-08-21 12:10:25 +02:00
}
2019-09-13 14:37:29 +02:00
psw , found := secret . Data [ ClientSecretKey ]
2020-03-26 10:19:11 +01:00
if ! found && authMethod != "none" {
2024-03-21 03:03:01 -05:00
return nil , fmt . Errorf ( "%s property missing" , ClientSecretKey )
2019-09-13 14:37:29 +02:00
}
return & hydra . Oauth2ClientCredentials {
ID : id ,
Password : psw ,
} , nil
2019-08-21 12:10:25 +02:00
}
2019-11-14 01:11:13 -07:00
2021-09-14 08:07:06 -04:00
func ( r * OAuth2ClientReconciler ) getHydraClientForClient (
oauth2client hydrav1alpha1 . OAuth2Client ) ( hydra . Client , error ) {
2019-11-14 01:11:13 -07:00
spec := oauth2client . Spec
2021-09-14 08:07:06 -04:00
if spec . HydraAdmin . URL != "" {
key := clientKey {
url : spec . HydraAdmin . URL ,
port : spec . HydraAdmin . Port ,
endpoint : spec . HydraAdmin . Endpoint ,
forwardedProto : spec . HydraAdmin . ForwardedProto ,
}
r . mu . Lock ( )
defer r . mu . Unlock ( )
if c , ok := r . oauth2Clients [ key ] ; ok {
return c , nil
}
2023-10-10 13:22:06 +02:00
c , err := r . oauth2ClientFactory ( spec , "" , false )
2021-09-14 08:07:06 -04:00
if err != nil {
2023-10-10 13:22:06 +02:00
return nil , fmt . Errorf ( "cannot create oauth2 c from CRD: %w" , err )
2021-09-14 08:07:06 -04:00
}
2023-10-10 13:22:06 +02:00
r . oauth2Clients [ key ] = c
return c , nil
2019-11-14 01:11:13 -07:00
}
2021-09-14 08:07:06 -04:00
2021-05-10 11:18:39 +02:00
if r . HydraClient == nil {
2023-08-08 10:30:24 +02:00
return nil , fmt . Errorf ( "no default client configured" )
2021-05-10 11:18:39 +02:00
}
2023-08-08 10:30:24 +02:00
r . Log . Info ( "Using default client" )
2021-05-10 11:18:39 +02:00
return r . HydraClient , nil
2019-11-14 01:11:13 -07:00
}
// Helper functions to check and remove string from a slice of strings.
func containsString ( slice [ ] string , s string ) bool {
for _ , item := range slice {
if item == s {
return true
}
}
return false
}
func removeString ( slice [ ] string , s string ) ( result [ ] string ) {
for _ , item := range slice {
if item == s {
continue
}
result = append ( result , item )
}
return
}