Skip to content

Commit

Permalink
Various fixes (#47)
Browse files Browse the repository at this point in the history
Signed-off-by: Yoan Blanc <yoan.blanc@adfinis.com>
  • Loading branch information
yoan-adfinis committed Jan 24, 2021
1 parent 5547d73 commit 4a8d05b
Show file tree
Hide file tree
Showing 2 changed files with 20 additions and 10 deletions.
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -161,7 +161,7 @@ build: $(OUTBIN)
$(OUTBIN): .go/$(OUTBIN).stamp
@true

# This will build the binary under ./.go and update the real binary iff needed.
# This will build the binary under ./.go and update the real binary if needed.
.PHONY: .go/$(OUTBIN).stamp
.go/$(OUTBIN).stamp: $(BUILD_DIRS)
@echo "making $(OUTBIN)"
Expand Down
28 changes: 19 additions & 9 deletions pkg/worker/worker.go
Original file line number Diff line number Diff line change
Expand Up @@ -127,35 +127,44 @@ func (o *WorkerOptions) configureVault(vc *vaultapi.Client, keyStore kv.Service,
if err != nil {
return errors.Wrap(err, "failed to get root token")
}

vc.SetToken(string(rootToken))

k8sAuth := auth.NewKubernetesAuthenticator(vc, o.AuthenticatorOptions)

glog.Infoln("enable kubernetes auth")

err = k8sAuth.EnsureAuth()
if err != nil {
return errors.Wrap(err, "failed to enable kubernetes auth")
}

glog.Infoln("kubernetes auth is enabled")

glog.Infoln("configure kubernetes auth")

err = k8sAuth.ConfigureAuth()
if err != nil {
return errors.Wrap(err, "failed to configure kubernetes auth")
}

glog.Infoln("kubernetes auth is configured")

glog.Infoln("write policy and policy binding for policy controller")

err = policy.EnsurePolicyAndPolicyBinding(vc, o.PolicyManagerOptions)
if err != nil {
return errors.Wrap(err, "failed to write policy and policy binding for policy controller")
}

glog.Infoln("policy for policy and policy binding controller is written")

return nil
}

func (o *WorkerOptions) getKVService() (kv.Service, error) {
if o.Mode == ModeAwsKmsSsm {
switch o.Mode {
case ModeAwsKmsSsm:
ssmService, err := aws_ssm.New(o.AwsOptions.UseSecureString, o.AwsOptions.SsmKeyPrefix)
if err != nil {
return nil, errors.Wrap(err, "failed to create aws ssm service")
Expand All @@ -173,8 +182,8 @@ func (o *WorkerOptions) getKVService() (kv.Service, error) {
}

return kvService, nil
}
if o.Mode == ModeGoogleCloudKmsGCS {

case ModeGoogleCloudKmsGCS:
gcsService, err := gcs.New(o.GoogleOptions.StorageBucket, o.GoogleOptions.StoragePrefix)
if err != nil {
return nil, errors.Wrap(err, "failed to create google gcs service")
Expand All @@ -186,23 +195,24 @@ func (o *WorkerOptions) getKVService() (kv.Service, error) {
}

return kvService, nil
}
if o.Mode == ModeAzureKeyVault {

case ModeAzureKeyVault:
kvService, err := azure.NewKVService(o.AzureOptions)
if err != nil {
return nil, errors.Wrap(err, "failed to create azure kv service")
}

return kvService, nil
}
if o.Mode == ModeKubernetesSecret {

case ModeKubernetesSecret:
kvService, err := kubernetes.NewKVService(o.KubernetesOptions)
if err != nil {
return nil, errors.Wrap(err, "failed to create kv service for kubernetes")
}

return kvService, nil
}

return nil, errors.New("Invalid mode")
default:
return nil, errors.Errorf("failed to create unkown mode %q", o.Mode)
}
}

0 comments on commit 4a8d05b

Please sign in to comment.