Skip to content

Commit

Permalink
Maintain uniform aws creds field names throughout (#390)
Browse files Browse the repository at this point in the history
* Maintain uniform aws creds field names

* Address reviews
  • Loading branch information
SupriyaKasten authored and mergify[bot] committed Nov 8, 2019
1 parent 77091d2 commit 88a527d
Show file tree
Hide file tree
Showing 5 changed files with 22 additions and 22 deletions.
8 changes: 4 additions & 4 deletions helm/profile/templates/profile.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,8 @@ metadata:
type: Opaque
data:
{{- if .Values.aws.accessKey }}
access_key_id: {{ .Values.aws.accessKey | b64enc | quote }}
secret_access_key: {{ .Values.aws.secretKey | b64enc | quote }}
aws_access_key_id: {{ .Values.aws.accessKey | b64enc | quote }}
aws_secret_access_key: {{ .Values.aws.secretKey | b64enc | quote }}
{{- else if .Values.gcp.projectID }}
project_id: {{ .Values.gcp.projectID | b64enc | quote }}
service_key: {{ .Values.gcp.serviceKey | b64enc | quote }}
Expand All @@ -36,8 +36,8 @@ credential:
type: keyPair
keyPair:
{{- if .Values.aws.accessKey }}
idField: access_key_id
secretField: secret_access_key
idField: aws_access_key_id
secretField: aws_secret_access_key
{{- else if .Values.gcp.projectID }}
idField: project_id
secretField: service_key
Expand Down
6 changes: 3 additions & 3 deletions pkg/kanctl/profile.go
Original file line number Diff line number Diff line change
Expand Up @@ -50,9 +50,9 @@ const (
AzureStorageAccountFlag = "storage-account"
AzureStorageKeyFlag = "storage-key"

idField = "access_key_id"
secretField = "secret_access_key"
roleField = "role" // required only for AWS IAM role
idField = secrets.AWSAccessKeyID
secretField = secrets.AWSSecretAccessKey
roleField = secrets.ConfigRole // required only for AWS IAM role
skipSSLVerifyFlag = "skip-SSL-verification"

schemaValidation = "Validate Profile schema"
Expand Down
17 changes: 9 additions & 8 deletions pkg/restic/restic_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@ import (
"github.com/kanisterio/kanister/pkg/apis/cr/v1alpha1"
"github.com/kanisterio/kanister/pkg/config"
"github.com/kanisterio/kanister/pkg/param"
"github.com/kanisterio/kanister/pkg/secrets"
)

type ResticDataSuite struct{}
Expand Down Expand Up @@ -153,8 +154,8 @@ func (s *ResticDataSuite) TestResticArgs(c *C) {
Secret: &v1.Secret{
Type: "secrets.kanister.io/aws",
Data: map[string][]byte{
"access_key_id": []byte("id"),
"secret_access_key": []byte("secret"),
secrets.AWSAccessKeyID: []byte("id"),
secrets.AWSSecretAccessKey: []byte("secret"),
},
},
},
Expand Down Expand Up @@ -192,9 +193,9 @@ func (s *ResticDataSuite) TestResticArgsWithAWSRole(c *C) {
Secret: &v1.Secret{
Type: "secrets.kanister.io/aws",
Data: map[string][]byte{
"access_key_id": []byte(config.GetEnvOrSkip(c, "AWS_ACCESS_KEY_ID")),
"secret_access_key": []byte(config.GetEnvOrSkip(c, "AWS_SECRET_ACCESS_KEY")),
"role": []byte(config.GetEnvOrSkip(c, "role")),
secrets.AWSAccessKeyID: []byte(config.GetEnvOrSkip(c, "AWS_ACCESS_KEY_ID")),
secrets.AWSSecretAccessKey: []byte(config.GetEnvOrSkip(c, "AWS_SECRET_ACCESS_KEY")),
secrets.ConfigRole: []byte(config.GetEnvOrSkip(c, "role")),
},
},
},
Expand All @@ -212,9 +213,9 @@ func (s *ResticDataSuite) TestResticArgsWithAWSRole(c *C) {
Secret: &v1.Secret{
Type: "secrets.kanister.io/aws",
Data: map[string][]byte{
"access_key_id": []byte(config.GetEnvOrSkip(c, "AWS_ACCESS_KEY_ID")),
"secret_access_key": []byte(config.GetEnvOrSkip(c, "AWS_SECRET_ACCESS_KEY")),
"role": []byte("arn:aws:iam::000000000000:role/test-fake-role"),
secrets.AWSAccessKeyID: []byte(config.GetEnvOrSkip(c, "AWS_ACCESS_KEY_ID")),
secrets.AWSSecretAccessKey: []byte(config.GetEnvOrSkip(c, "AWS_SECRET_ACCESS_KEY")),
secrets.ConfigRole: []byte("arn:aws:iam::000000000000:role/test-fake-role"),
},
},
},
Expand Down
6 changes: 2 additions & 4 deletions pkg/secrets/aws.go
Original file line number Diff line number Diff line change
Expand Up @@ -16,11 +16,9 @@ const (
AWSSecretType string = "secrets.kanister.io/aws"

// AWSAccessKeyID is the key for AWS access key ID.
AWSAccessKeyID string = "access_key_id"
AWSAccessKeyID string = "aws_access_key_id"
// AWSSecretAccessKey is the key for AWS secret access key.
AWSSecretAccessKey string = "secret_access_key"
// AWSSessionToken is the key for optional AWS session token.
AWSSessionToken string = "session_token"
AWSSecretAccessKey string = "aws_secret_access_key"
// ConfigRole represents the key for the ARN of the role which can be assumed.
// It is optional.
ConfigRole = "role"
Expand Down
7 changes: 4 additions & 3 deletions pkg/testutil/fixture.go
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ import (
awsconfig "github.com/kanisterio/kanister/pkg/config/aws"
"github.com/kanisterio/kanister/pkg/objectstore"
"github.com/kanisterio/kanister/pkg/param"
"github.com/kanisterio/kanister/pkg/secrets"
)

const (
Expand Down Expand Up @@ -84,9 +85,9 @@ func s3ProfileWithSecretCredential(location crv1alpha1.Location, accessKeyID, se
Secret: &v1.Secret{
Type: "secrets.kanister.io/aws",
Data: map[string][]byte{
"access_key_id": []byte(accessKeyID),
"secret_access_key": []byte(secretAccessKey),
"role": []byte(role),
secrets.AWSAccessKeyID: []byte(accessKeyID),
secrets.AWSSecretAccessKey: []byte(secretAccessKey),
secrets.ConfigRole: []byte(role),
},
},
},
Expand Down

0 comments on commit 88a527d

Please sign in to comment.