in vault-api-helper/main.go [356:395]
func getSecrets() {
log.Infoln("read jwt-ns", server.SecretsConfig.k8sNamespace)
k8sJWT, err := ioutil.ReadFile(server.SecretsConfig.k8sTokenPath)
if err != nil {
panic(err)
}
log.Infoln("client")
client, err := api.NewClient(&api.Config{
Address: server.SecretsConfig.vaultAddr,
})
if err != nil {
panic(err)
}
//Auth with K8s vault
vaultK8sInfo := map[string]interface{}{"jwt": string(k8sJWT), "role": server.SecretsConfig.k8sRole}
secret, err := client.Logical().Write(fmt.Sprintf("auth/%s/login",
server.SecretsConfig.k8sPath), vaultK8sInfo)
if err != nil {
panic(err)
}
client.SetToken(string(secret.Auth.ClientToken))
log.Infoln("getGCPKey")
data, err := getGCPKey(client, server.SecretsConfig.gcpRolesetKeyPath)
if err != nil {
panic(err)
}
err = updateGCPKey(server.SecretsConfig.credentialPath, data)
if err != nil {
panic(err)
}
}