go fmt and authheader type (#8)

pull/2012/head
saumanbiswas 9 years ago committed by Tamal Saha
parent aff90fe6d4
commit 1b858b33ce

@ -17,11 +17,11 @@ limitations under the License.
package main package main
import ( import (
"fmt"
"io" "io"
"testing" "testing"
"github.com/spf13/cobra" "github.com/spf13/cobra"
"fmt"
) )
func TestGetCmd(t *testing.T) { func TestGetCmd(t *testing.T) {

@ -18,11 +18,11 @@ package main
import ( import (
"bytes" "bytes"
"fmt"
"regexp" "regexp"
"testing" "testing"
rpb "k8s.io/helm/pkg/proto/hapi/release" rpb "k8s.io/helm/pkg/proto/hapi/release"
"fmt"
) )
func TestHistoryCmd(t *testing.T) { func TestHistoryCmd(t *testing.T) {

@ -18,11 +18,11 @@ package main
import ( import (
"bytes" "bytes"
"fmt"
"regexp" "regexp"
"testing" "testing"
"k8s.io/helm/pkg/proto/hapi/release" "k8s.io/helm/pkg/proto/hapi/release"
"fmt"
) )
func TestListCmd(t *testing.T) { func TestListCmd(t *testing.T) {

@ -414,38 +414,38 @@ func extractKubeConfig() map[string]string {
// Kube APIServer URL // Kube APIServer URL
if len(c.Host) != 0 { if len(c.Host) != 0 {
configData[K8sServer] = c.Host configData[string(K8sServer)] = c.Host
} }
if c.AuthProvider != nil { if c.AuthProvider != nil {
switch c.AuthProvider.Name { switch c.AuthProvider.Name {
case "gcp": case "gcp":
configData[Authorization] = "Bearer " + c.AuthProvider.Config["access_token"] configData[string(Authorization)] = "Bearer " + c.AuthProvider.Config["access_token"]
case "oidc": case "oidc":
configData[Authorization] = "Bearer " + c.AuthProvider.Config["id-token"] configData[string(Authorization)] = "Bearer " + c.AuthProvider.Config["id-token"]
default: default:
panic("Unknown auth provider: " + c.AuthProvider.Name) panic("Unknown auth provider: " + c.AuthProvider.Name)
} }
} }
if len(c.BearerToken) != 0 { if len(c.BearerToken) != 0 {
configData[Authorization] = "Bearer " + c.BearerToken configData[string(Authorization)] = "Bearer " + c.BearerToken
} }
if len(c.Username) != 0 && len(c.Password) != 0 { if len(c.Username) != 0 && len(c.Password) != 0 {
configData[Authorization] = "Basic " + base64.StdEncoding.EncodeToString([]byte(c.Username+":"+c.Password)) configData[string(Authorization)] = "Basic " + base64.StdEncoding.EncodeToString([]byte(c.Username+":"+c.Password))
} }
if len(string(c.CAData)) != 0 { if len(string(c.CAData)) != 0 {
configData[K8sCertificateAuthority] = base64.StdEncoding.EncodeToString(bytes.TrimSpace(c.CAData)) configData[string(K8sCertificateAuthority)] = base64.StdEncoding.EncodeToString(bytes.TrimSpace(c.CAData))
} }
if len(string(c.TLSClientConfig.KeyData)) != 0 { if len(string(c.TLSClientConfig.KeyData)) != 0 {
configData[K8sClientKey] = base64.StdEncoding.EncodeToString(c.TLSClientConfig.KeyData) configData[string(K8sClientKey)] = base64.StdEncoding.EncodeToString(c.TLSClientConfig.KeyData)
} }
if len(string(c.TLSClientConfig.CertData)) != 0 { if len(string(c.TLSClientConfig.CertData)) != 0 {
configData[K8sClientCertificate] = base64.StdEncoding.EncodeToString(c.TLSClientConfig.CertData) configData[string(K8sClientCertificate)] = base64.StdEncoding.EncodeToString(c.TLSClientConfig.CertData)
} }
if len(c.TLSClientConfig.CAFile) != 0 { if len(c.TLSClientConfig.CAFile) != 0 {
@ -453,7 +453,7 @@ func extractKubeConfig() map[string]string {
if err != nil { if err != nil {
log.Println(err) log.Println(err)
} else { } else {
configData[K8sCertificateAuthority] = base64.StdEncoding.EncodeToString(b) configData[string(K8sCertificateAuthority)] = base64.StdEncoding.EncodeToString(b)
} }
} }
@ -462,7 +462,7 @@ func extractKubeConfig() map[string]string {
if err != nil { if err != nil {
log.Println(err) log.Println(err)
} else { } else {
configData[K8sClientCertificate] = base64.StdEncoding.EncodeToString(b) configData[string(K8sClientCertificate)] = base64.StdEncoding.EncodeToString(b)
} }
} }
@ -472,7 +472,7 @@ func extractKubeConfig() map[string]string {
if err != nil { if err != nil {
log.Println(err) log.Println(err)
} else { } else {
configData[K8sClientKey] = base64.StdEncoding.EncodeToString(b) configData[string(K8sClientKey)] = base64.StdEncoding.EncodeToString(b)
} }
} }
} }

@ -1,13 +1,15 @@
package helm package helm
type AuthHeader string
const ( const (
Authorization = "authorization" Authorization AuthHeader = "authorization"
K8sServer = "k8s-server" K8sServer AuthHeader = "k8s-server"
K8sClientCertificate = "k8s-client-certificate" K8sClientCertificate AuthHeader = "k8s-client-certificate"
K8sCertificateAuthority = "k8s-certificate-authority" K8sCertificateAuthority AuthHeader = "k8s-certificate-authority"
K8sClientKey = "k8s-client-key" K8sClientKey AuthHeader = "k8s-client-key"
// Generated from input keys above // Generated from input keys above
K8sUser = "k8s-user" K8sUser AuthHeader = "k8s-user"
K8sConfig = "k8s-client-config" K8sConfig AuthHeader = "k8s-client-config"
) )

@ -28,8 +28,8 @@ import (
"github.com/technosophos/moniker" "github.com/technosophos/moniker"
ctx "golang.org/x/net/context" ctx "golang.org/x/net/context"
"k8s.io/helm/pkg/chartutil" "k8s.io/helm/pkg/chartutil"
"k8s.io/helm/pkg/hooks"
"k8s.io/helm/pkg/helm" "k8s.io/helm/pkg/helm"
"k8s.io/helm/pkg/hooks"
"k8s.io/helm/pkg/kube" "k8s.io/helm/pkg/kube"
"k8s.io/helm/pkg/proto/hapi/chart" "k8s.io/helm/pkg/proto/hapi/chart"
"k8s.io/helm/pkg/proto/hapi/release" "k8s.io/helm/pkg/proto/hapi/release"

@ -62,7 +62,7 @@ func authenticate(ctx context.Context) (context.Context, error) {
var user *authenticationapi.UserInfo var user *authenticationapi.UserInfo
var kubeConfig *rest.Config var kubeConfig *rest.Config
var err error var err error
authHeader, ok := md[helm.Authorization] authHeader, ok := md[string(helm.Authorization)]
if !ok || authHeader[0] == "" { if !ok || authHeader[0] == "" {
user, kubeConfig, err = checkClientCert(ctx) user, kubeConfig, err = checkClientCert(ctx)
} else { } else {
@ -170,7 +170,7 @@ func checkClientVersion(ctx context.Context) error {
func checkBearerAuth(ctx context.Context) (*authenticationapi.UserInfo, *rest.Config, error) { func checkBearerAuth(ctx context.Context) (*authenticationapi.UserInfo, *rest.Config, error) {
md, _ := metadata.FromContext(ctx) md, _ := metadata.FromContext(ctx)
token := md[helm.Authorization][0][len("Bearer "):] token := md[string(helm.Authorization)][0][len("Bearer "):]
apiServer, err := getServerURL(md) apiServer, err := getServerURL(md)
if err != nil { if err != nil {
@ -236,7 +236,7 @@ func checkBearerAuth(ctx context.Context) (*authenticationapi.UserInfo, *rest.Co
func checkBasicAuth(ctx context.Context) (*authenticationapi.UserInfo, *rest.Config, error) { func checkBasicAuth(ctx context.Context) (*authenticationapi.UserInfo, *rest.Config, error) {
md, _ := metadata.FromContext(ctx) md, _ := metadata.FromContext(ctx)
authz := md[helm.Authorization][0] authz := md[string(helm.Authorization)][0]
apiServer, err := getServerURL(md) apiServer, err := getServerURL(md)
if err != nil { if err != nil {
@ -335,7 +335,7 @@ func checkClientCert(ctx context.Context) (*authenticationapi.UserInfo, *rest.Co
} }
func getClientCert(md metadata.MD) ([]byte, error) { func getClientCert(md metadata.MD) ([]byte, error) {
cert, ok := md[helm.K8sClientCertificate] cert, ok := md[string(helm.K8sClientCertificate)]
if !ok { if !ok {
return nil, errors.New("Client certificate not found") return nil, errors.New("Client certificate not found")
} }
@ -347,7 +347,7 @@ func getClientCert(md metadata.MD) ([]byte, error) {
} }
func getClientKey(md metadata.MD) ([]byte, error) { func getClientKey(md metadata.MD) ([]byte, error) {
key, ok := md[helm.K8sClientKey] key, ok := md[string(helm.K8sClientKey)]
if !ok { if !ok {
return nil, errors.New("Client key not found") return nil, errors.New("Client key not found")
} }
@ -359,7 +359,7 @@ func getClientKey(md metadata.MD) ([]byte, error) {
} }
func getCertificateAuthority(md metadata.MD) ([]byte, error) { func getCertificateAuthority(md metadata.MD) ([]byte, error) {
caData, ok := md[helm.K8sCertificateAuthority] caData, ok := md[string(helm.K8sCertificateAuthority)]
if !ok { if !ok {
return nil, errors.New("CAcert not found") return nil, errors.New("CAcert not found")
} }
@ -371,7 +371,7 @@ func getCertificateAuthority(md metadata.MD) ([]byte, error) {
} }
func getServerURL(md metadata.MD) (string, error) { func getServerURL(md metadata.MD) (string, error) {
apiserver, ok := md[helm.K8sServer] apiserver, ok := md[string(helm.K8sServer)]
if !ok { if !ok {
return "", errors.New("API server url not found") return "", errors.New("API server url not found")
} }

Loading…
Cancel
Save