Skip to content

Commit

Permalink
rename Kilnfile key to "role_arn" from "aws_role_arn"
Browse files Browse the repository at this point in the history
we don't specify the iaas implementation in other config keys
so we decided to remove the prefix here too

we also changed the control flow in NewS3ReleaseSourceFromConfig
to miror the implementation in leftovers more closely: pivotal/leftovers@34fcf99

Co-authored-by: Ramkumar Vengadakrishnan <ramkumarv@vmware.com>
  • Loading branch information
crhntr and ram-pivot committed Jul 11, 2023
1 parent 0c7a55c commit f53965e
Show file tree
Hide file tree
Showing 3 changed files with 29 additions and 18 deletions.
41 changes: 26 additions & 15 deletions internal/component/s3_release_source.go
Original file line number Diff line number Diff line change
Expand Up @@ -68,25 +68,23 @@ func NewS3ReleaseSource(c cargo.ReleaseSourceConfig, client S3Client, downloader
func NewS3ReleaseSourceFromConfig(config cargo.ReleaseSourceConfig, logger *log.Logger) S3ReleaseSource {
validateConfig(config)

// https://docs.aws.amazon.com/sdk-for-go/api/service/s3/
awsConfig := &aws.Config{
Region: aws.String(config.Region),
Credentials: credentials.NewStaticCredentials(config.AccessKeyId, config.SecretAccessKey, ""),
}

var assumedRoleAwsConfig aws.Config
if config.AwsRoleARN != "" {
stsSession := session.Must(session.NewSession(awsConfig))
roleCredentials := stscreds.NewCredentials(stsSession, config.AwsRoleARN)
assumedRoleAwsConfig.Credentials = roleCredentials
awsConfig := awsRegionAndEndpointConfiguration(config).WithCredentials(credentials.NewStaticCredentials(config.AccessKeyId, config.SecretAccessKey, ""))
sess, err := session.NewSession(awsConfig)
if err != nil {
// TODO: add test coverage for this block
panic(err)
}

if config.Endpoint != "" { // for acceptance testing
awsConfig = awsConfig.WithEndpoint(config.Endpoint)
awsConfig = awsConfig.WithS3ForcePathStyle(true)
if config.RoleARN != "" {
// TODO: add test coverage for this block
awsConfigWithARN := awsRegionAndEndpointConfiguration(config).WithCredentials(stscreds.NewCredentials(sess, config.RoleARN))
sess, err = session.NewSession(awsConfigWithARN)
if err != nil {
// TODO: add test coverage for this block
panic(err)
}
}

sess := session.Must(session.NewSession(awsConfig, &assumedRoleAwsConfig))
client := s3.New(sess)

return NewS3ReleaseSource(
Expand All @@ -98,6 +96,19 @@ func NewS3ReleaseSourceFromConfig(config cargo.ReleaseSourceConfig, logger *log.
)
}

func awsRegionAndEndpointConfiguration(config cargo.ReleaseSourceConfig) *aws.Config {
awsConfig := &aws.Config{
Region: aws.String(config.Region),
}

if config.Endpoint != "" { // for acceptance testing
awsConfig = awsConfig.WithEndpoint(config.Endpoint)
awsConfig = awsConfig.WithS3ForcePathStyle(true)
}

return awsConfig
}

func validateConfig(config cargo.ReleaseSourceConfig) {
if config.PathTemplate == "" {
panic(`Missing required field "path_template" in release source config. Is your Kilnfile out of date?`)
Expand Down
4 changes: 2 additions & 2 deletions pkg/cargo/files_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ release_sources:
region: $( variable "region" )
access_key_id: $( variable "access_key" )
secret_access_key: $( variable "secret_key" )
aws_role_arn: $( variable "role_arn" )
role_arn: $( variable "role_arn" )
path_template: $( variable "path_template" )
`

Expand All @@ -91,7 +91,7 @@ release_sources:
Bucket: "my-bucket",
Region: "middle-earth",
AccessKeyId: "id",
AwsRoleARN: "role-arn",
RoleARN: "role-arn",
SecretAccessKey: "key",
PathTemplate: "not-used",
},
Expand Down
2 changes: 1 addition & 1 deletion pkg/cargo/kilnfile.go
Original file line number Diff line number Diff line change
Expand Up @@ -109,7 +109,7 @@ type ReleaseSourceConfig struct {
Region string `yaml:"region,omitempty"`
AccessKeyId string `yaml:"access_key_id,omitempty"`
SecretAccessKey string `yaml:"secret_access_key,omitempty"`
AwsRoleARN string `yaml:"aws_role_arn,omitempty"`
RoleARN string `yaml:"role_arn,omitempty"`
PathTemplate string `yaml:"path_template,omitempty"`
Endpoint string `yaml:"endpoint,omitempty"`
Org string `yaml:"org,omitempty"`
Expand Down

0 comments on commit f53965e

Please sign in to comment.