@@ -103,36 +103,35 @@ func NewCertificateManagerFromMRC(ctx context.Context, kubeClient kubernetes.Int
103
103
}
104
104
105
105
// GetCertIssuerForMRC returns a certificate.Issuer generated from the provided MRC.
106
- func (c * MRCProviderGenerator ) GetCertIssuerForMRC (mrc * v1alpha2.MeshRootCertificate ) (certificate.Issuer , pem.RootCertificate , string , error ) {
106
+ func (c * MRCProviderGenerator ) GetCertIssuerForMRC (mrc * v1alpha2.MeshRootCertificate ) (certificate.Issuer , pem.RootCertificate , error ) {
107
107
p := mrc .Spec .Provider
108
108
var issuer certificate.Issuer
109
- var id string
110
109
var err error
111
110
switch {
112
111
case p .Tresor != nil :
113
- issuer , id , err = c .getTresorOSMCertificateManager (mrc )
112
+ issuer , err = c .getTresorOSMCertificateManager (mrc )
114
113
case p .Vault != nil :
115
- issuer , id , err = c .getHashiVaultOSMCertificateManager (mrc )
114
+ issuer , err = c .getHashiVaultOSMCertificateManager (mrc )
116
115
case p .CertManager != nil :
117
- issuer , id , err = c .getCertManagerOSMCertificateManager (mrc )
116
+ issuer , err = c .getCertManagerOSMCertificateManager (mrc )
118
117
default :
119
- return nil , nil , "" , fmt .Errorf ("Unknown certificate provider: %+v" , p )
118
+ return nil , nil , fmt .Errorf ("Unknown certificate provider: %+v" , p )
120
119
}
121
120
122
121
if err != nil {
123
- return nil , nil , "" , err
122
+ return nil , nil , err
124
123
}
125
124
126
125
ca , err := c .caExtractorFunc (issuer )
127
126
if err != nil {
128
- return nil , nil , "" , fmt .Errorf ("error generating init cert: %w" , err )
127
+ return nil , nil , fmt .Errorf ("error generating init cert: %w" , err )
129
128
}
130
129
131
- return issuer , ca , id , nil
130
+ return issuer , ca , nil
132
131
}
133
132
134
133
// getTresorOSMCertificateManager returns a certificate manager instance with Tresor as the certificate provider
135
- func (c * MRCProviderGenerator ) getTresorOSMCertificateManager (mrc * v1alpha2.MeshRootCertificate ) (certificate.Issuer , string , error ) {
134
+ func (c * MRCProviderGenerator ) getTresorOSMCertificateManager (mrc * v1alpha2.MeshRootCertificate ) (certificate.Issuer , error ) {
136
135
var err error
137
136
var rootCert * certificate.Certificate
138
137
@@ -142,20 +141,20 @@ func (c *MRCProviderGenerator) getTresorOSMCertificateManager(mrc *v1alpha2.Mesh
142
141
// Regardless of success or failure, all instances can proceed to load the same CA.
143
142
rootCert , err = tresor .NewCA (constants .CertificationAuthorityCommonName , constants .CertificationAuthorityRootValidityPeriod , rootCertCountry , rootCertLocality , rootCertOrganization )
144
143
if err != nil {
145
- return nil , "" , errors .New ("Failed to create new Certificate Authority with cert issuer tresor" )
144
+ return nil , errors .New ("Failed to create new Certificate Authority with cert issuer tresor" )
146
145
}
147
146
148
147
if rootCert .GetPrivateKey () == nil {
149
- return nil , "" , errors .New ("Root cert does not have a private key" )
148
+ return nil , errors .New ("Root cert does not have a private key" )
150
149
}
151
150
152
151
rootCert , err = k8s .GetCertificateFromSecret (mrc .Namespace , mrc .Spec .Provider .Tresor .CA .SecretRef .Name , rootCert , c .kubeClient )
153
152
if err != nil {
154
- return nil , "" , fmt .Errorf ("Failed to synchronize certificate on Secrets API : %w" , err )
153
+ return nil , fmt .Errorf ("Failed to synchronize certificate on Secrets API : %w" , err )
155
154
}
156
155
157
156
if rootCert .GetPrivateKey () == nil {
158
- return nil , "" , fmt .Errorf ("Root cert does not have a private key: %w" , certificate .ErrInvalidCertSecret )
157
+ return nil , fmt .Errorf ("Root cert does not have a private key: %w" , certificate .ErrInvalidCertSecret )
159
158
}
160
159
161
160
tresorClient , err := tresor .New (
@@ -164,14 +163,14 @@ func (c *MRCProviderGenerator) getTresorOSMCertificateManager(mrc *v1alpha2.Mesh
164
163
c .KeyBitSize ,
165
164
)
166
165
if err != nil {
167
- return nil , "" , fmt .Errorf ("failed to instantiate Tresor as a Certificate Manager: %w" , err )
166
+ return nil , fmt .Errorf ("failed to instantiate Tresor as a Certificate Manager: %w" , err )
168
167
}
169
168
170
- return tresorClient , mrc . Name , nil
169
+ return tresorClient , nil
171
170
}
172
171
173
172
// getHashiVaultOSMCertificateManager returns a certificate manager instance with Hashi Vault as the certificate provider
174
- func (c * MRCProviderGenerator ) getHashiVaultOSMCertificateManager (mrc * v1alpha2.MeshRootCertificate ) (certificate.Issuer , string , error ) {
173
+ func (c * MRCProviderGenerator ) getHashiVaultOSMCertificateManager (mrc * v1alpha2.MeshRootCertificate ) (certificate.Issuer , error ) {
175
174
provider := mrc .Spec .Provider .Vault
176
175
177
176
// A Vault address would have the following shape: "http://vault.default.svc.cluster.local:8200"
@@ -184,7 +183,7 @@ func (c *MRCProviderGenerator) getHashiVaultOSMCertificateManager(mrc *v1alpha2.
184
183
log .Debug ().Msgf ("Attempting to get Vault token from secret %s" , provider .Token .SecretKeyRef .Name )
185
184
vaultToken , err = getHashiVaultOSMToken (& provider .Token .SecretKeyRef , c .kubeClient )
186
185
if err != nil {
187
- return nil , "" , err
186
+ return nil , err
188
187
}
189
188
}
190
189
@@ -194,10 +193,10 @@ func (c *MRCProviderGenerator) getHashiVaultOSMCertificateManager(mrc *v1alpha2.
194
193
provider .Role ,
195
194
)
196
195
if err != nil {
197
- return nil , "" , fmt .Errorf ("error instantiating Hashicorp Vault as a Certificate Manager: %w" , err )
196
+ return nil , fmt .Errorf ("error instantiating Hashicorp Vault as a Certificate Manager: %w" , err )
198
197
}
199
198
200
- return vaultClient , mrc . Name , nil
199
+ return vaultClient , nil
201
200
}
202
201
203
202
// getHashiVaultOSMToken returns the Hashi Vault token from the secret specified in the provided secret key reference
@@ -216,11 +215,11 @@ func getHashiVaultOSMToken(secretKeyRef *v1alpha2.SecretKeyReferenceSpec, kubeCl
216
215
}
217
216
218
217
// getCertManagerOSMCertificateManager returns a certificate manager instance with cert-manager as the certificate provider
219
- func (c * MRCProviderGenerator ) getCertManagerOSMCertificateManager (mrc * v1alpha2.MeshRootCertificate ) (certificate.Issuer , string , error ) {
218
+ func (c * MRCProviderGenerator ) getCertManagerOSMCertificateManager (mrc * v1alpha2.MeshRootCertificate ) (certificate.Issuer , error ) {
220
219
provider := mrc .Spec .Provider .CertManager
221
220
client , err := cmversionedclient .NewForConfig (c .kubeConfig )
222
221
if err != nil {
223
- return nil , "" , fmt .Errorf ("Failed to build cert-manager client set: %s" , err )
222
+ return nil , fmt .Errorf ("Failed to build cert-manager client set: %s" , err )
224
223
}
225
224
226
225
cmClient , err := certmanager .New (
@@ -234,8 +233,8 @@ func (c *MRCProviderGenerator) getCertManagerOSMCertificateManager(mrc *v1alpha2
234
233
c .KeyBitSize ,
235
234
)
236
235
if err != nil {
237
- return nil , "" , fmt .Errorf ("error instantiating Jetstack cert-manager client: %w" , err )
236
+ return nil , fmt .Errorf ("error instantiating Jetstack cert-manager client: %w" , err )
238
237
}
239
238
240
- return cmClient , mrc . Name , nil
239
+ return cmClient , nil
241
240
}
0 commit comments