func getSecrets()

in vault-api-helper/main.go [356:395]


func getSecrets() {

  log.Infoln("read jwt-ns", server.SecretsConfig.k8sNamespace)

  k8sJWT, err := ioutil.ReadFile(server.SecretsConfig.k8sTokenPath)
  if err != nil {
    panic(err)
  }


  log.Infoln("client")
  client, err := api.NewClient(&api.Config{
    Address: server.SecretsConfig.vaultAddr,
  })
  if err != nil {
    panic(err)
  }

  //Auth with K8s vault
  vaultK8sInfo := map[string]interface{}{"jwt": string(k8sJWT), "role": server.SecretsConfig.k8sRole}
  secret, err := client.Logical().Write(fmt.Sprintf("auth/%s/login",
    server.SecretsConfig.k8sPath), vaultK8sInfo)
  if err != nil {
    panic(err)
  }

  client.SetToken(string(secret.Auth.ClientToken))

  log.Infoln("getGCPKey")

  data, err := getGCPKey(client, server.SecretsConfig.gcpRolesetKeyPath)
  if err != nil {
    panic(err)
  }

  err = updateGCPKey(server.SecretsConfig.credentialPath, data)
  if err != nil {
    panic(err)
  }
}