/
resource.go
68 lines (53 loc) · 1.43 KB
/
resource.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
package peerrolearn
import (
"context"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/iam"
infrastructurev1alpha3 "github.com/giantswarm/apiextensions/v6/pkg/apis/infrastructure/v1alpha3"
"github.com/giantswarm/microerror"
"github.com/giantswarm/micrologger"
"github.com/giantswarm/aws-operator/v13/service/controller/controllercontext"
"github.com/giantswarm/aws-operator/v13/service/controller/key"
)
const (
Name = "peerrolearn"
)
type Config struct {
Logger micrologger.Logger
}
type Resource struct {
logger micrologger.Logger
}
func New(config Config) (*Resource, error) {
if config.Logger == nil {
return nil, microerror.Maskf(invalidConfigError, "%T.Logger must not be empty", config)
}
r := &Resource{
logger: config.Logger,
}
return r, nil
}
func (r *Resource) Name() string {
return Name
}
func (r *Resource) addPeerRoleARNToContext(ctx context.Context, cr infrastructurev1alpha3.AWSCluster) error {
cc, err := controllercontext.FromContext(ctx)
if err != nil {
return microerror.Mask(err)
}
var peerRoleArn string
{
i := &iam.GetRoleInput{
RoleName: aws.String(key.RolePeerAccess(cr)),
}
o, err := cc.Client.ControlPlane.AWS.IAM.GetRole(i)
if IsNotFound(err) {
return microerror.Maskf(notFoundError, key.RolePeerAccess(cr))
} else if err != nil {
return microerror.Mask(err)
}
peerRoleArn = *o.Role.Arn
}
cc.Status.ControlPlane.PeerRole.ARN = peerRoleArn
return nil
}