Skip to content

Commit

Permalink
Kubeconfig storing
Browse files Browse the repository at this point in the history
Signed-off-by: PrimalPimmy <Prashant20.pm@gmail.com>
  • Loading branch information
PrimalPimmy committed Jul 2, 2024
1 parent 905e623 commit ca000a7
Showing 1 changed file with 30 additions and 24 deletions.
54 changes: 30 additions & 24 deletions controllers/pkg/reconcilers/spire-bootstrap/reconciler.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@ import (
"encoding/json"
"fmt"
"io/ioutil"
"strings"

reconcilerinterface "github.com/nephio-project/nephio/controllers/pkg/reconcilers/reconciler-interface"
"github.com/spiffe/go-spiffe/v2/workloadapi"
Expand Down Expand Up @@ -117,13 +118,6 @@ func (r *reconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Resu
return ctrl.Result{}, errors.Wrap(err, msg)
}

// for _, secret := range secrets.Items {
// if strings.Contains(secret.GetName(), cl.Name) {
// // secret := secret
// // clusterClient, ok := cluster.Cluster{Client: r.Client}.GetClusterClient(&secret)
// }
// }

// found := false
// for _, secret := range secrets.Items {
// if strings.Contains(secret.GetName(), cl.Name) {
Expand Down Expand Up @@ -201,12 +195,22 @@ func (r *reconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Resu

client.SetToken(clientToken)

secret, err := getSecret(client, "secret/my-super-secret")
for _, secret := range secrets.Items {
if strings.Contains(secret.GetName(), cl.Name) {
secret := secret
storeKubeconfig(secret, client, "secret/my-super-secret", cl.Name)
// clusterClient, ok := cluster.Cluster{Client: r.Client}.GetClusterClient(&secret)
}
}

// secret, err := getSecret(client, "secret/my-super-secret")

kubeconfig, err := fetchKubeconfig(client, "secret/my-super-secret", cl.Name)
if err != nil {
log.Error(err, "Error retrieving secret:")
}

fmt.Printf("Secret retrieved: %v\n", secret)
fmt.Printf("Secret retrieved: %v\n", kubeconfig)

return reconcile.Result{}, nil
}
Expand Down Expand Up @@ -294,24 +298,26 @@ func getSecret(client *vault.Client, secretPath string) (map[string]interface{},
return secret.Data, nil
}

// func storeKubeconfig(kubeconfigData corev1.Secret, client *vault.Client, secretPath, clusterName, kubeconfigPath string) error {
// // Read the Kubeconfig file
func storeKubeconfig(kubeconfigData corev1.Secret, client *vault.Client, secretPath, clusterName string) error {
// Read the Kubeconfig file

// // Prepare the data to store
// data := map[string]interface{}{
// "data": map[string]interface{}{
// clusterName: string(),
// },
// }
fmt.Println("Base64 encoded secret data:", kubeconfigData.Data)

// // Store the data in Vault
// _, err = client.Logical().Write(secretPath, data)
// if err != nil {
// return fmt.Errorf("unable to write secret to Vault: %w", err)
// }
// Prepare the data to store
data := map[string]interface{}{
"data": map[string]interface{}{
clusterName: kubeconfigData.Data,
},
}

// return nil
// }
// Store the data in Vault
_, err := client.Logical().Write(secretPath, data)
if err != nil {
return fmt.Errorf("unable to write secret to Vault: %w", err)
}

return nil
}

func fetchKubeconfig(client *vault.Client, secretPath, clusterName string) (string, error) {
// Read the secret
Expand Down

0 comments on commit ca000a7

Please sign in to comment.