@@ -359,7 +359,9 @@ func (r *FabricPeerReconciler) Reconcile(ctx context.Context, req ctrl.Request)
359359 return r .updateCRStatusOrFailReconcile (ctx , r .Log , fabricPeer )
360360 }
361361 }
362-
362+ if fabricPeer .Spec .CredentialStore == "" {
363+ fabricPeer .Spec .CredentialStore = "kubernetes"
364+ }
363365 cmdStatus := action .NewStatus (cfg )
364366 exists := true
365367 helmStatus , err := cmdStatus .Run (releaseName )
@@ -921,17 +923,7 @@ func getEnrollRequestForVaultTLS(tls *hlfv1alpha1.TLSComponent, conf *hlfv1alpha
921923}
922924
923925func CreateTLSCryptoMaterial (client * kubernetes.Clientset , conf * hlfv1alpha1.FabricPeer , enrollment * hlfv1alpha1.TLSComponent ) (* x509.Certificate , * ecdsa.PrivateKey , * x509.Certificate , error ) {
924- if conf .Spec .CredentialStore == hlfv1alpha1 .CredentialStoreKubernetes {
925- enrollRequest , err := getEnrollRequestForFabricCATLS (client , enrollment , conf , "tls" )
926- if err != nil {
927- return nil , nil , nil , err
928- }
929- tlsCert , tlsKey , tlsRootCert , err := certs .EnrollUser (enrollRequest )
930- if err != nil {
931- return nil , nil , nil , err
932- }
933- return tlsCert , tlsKey , tlsRootCert , nil
934- } else if conf .Spec .CredentialStore == hlfv1alpha1 .CredentialStoreVault {
926+ if conf .Spec .CredentialStore == hlfv1alpha1 .CredentialStoreVault {
935927 enrollRequest , err := getEnrollRequestForVaultTLS (enrollment , conf , "tls" )
936928 if err != nil {
937929 return nil , nil , nil , err
@@ -947,12 +939,6 @@ func CreateTLSCryptoMaterial(client *kubernetes.Clientset, conf *hlfv1alpha1.Fab
947939 }
948940 return tlsCert , tlsKey , tlsRootCert , nil
949941 } else {
950- return nil , nil , nil , errors .New ("not implemented" )
951- }
952- }
953-
954- func CreateTLSOPSCryptoMaterial (client * kubernetes.Clientset , conf * hlfv1alpha1.FabricPeer , enrollment * hlfv1alpha1.TLSComponent ) (* x509.Certificate , * ecdsa.PrivateKey , * x509.Certificate , error ) {
955- if conf .Spec .CredentialStore == hlfv1alpha1 .CredentialStoreKubernetes {
956942 enrollRequest , err := getEnrollRequestForFabricCATLS (client , enrollment , conf , "tls" )
957943 if err != nil {
958944 return nil , nil , nil , err
@@ -962,7 +948,11 @@ func CreateTLSOPSCryptoMaterial(client *kubernetes.Clientset, conf *hlfv1alpha1.
962948 return nil , nil , nil , err
963949 }
964950 return tlsCert , tlsKey , tlsRootCert , nil
965- } else if conf .Spec .CredentialStore == hlfv1alpha1 .CredentialStoreVault {
951+ }
952+ }
953+
954+ func CreateTLSOPSCryptoMaterial (client * kubernetes.Clientset , conf * hlfv1alpha1.FabricPeer , enrollment * hlfv1alpha1.TLSComponent ) (* x509.Certificate , * ecdsa.PrivateKey , * x509.Certificate , error ) {
955+ if conf .Spec .CredentialStore == hlfv1alpha1 .CredentialStoreVault {
966956 enrollRequest , err := getEnrollRequestForVaultTLS (enrollment , conf , "tls" )
967957 if err != nil {
968958 return nil , nil , nil , err
@@ -978,14 +968,7 @@ func CreateTLSOPSCryptoMaterial(client *kubernetes.Clientset, conf *hlfv1alpha1.
978968 }
979969 return tlsCert , tlsKey , tlsRootCert , nil
980970 } else {
981- return nil , nil , nil , errors .New (fmt .Sprintf ("not implemented for credential store %s" , conf .Spec .CredentialStore ))
982- }
983- }
984-
985- func CreateSignCryptoMaterial (client * kubernetes.Clientset , conf * hlfv1alpha1.FabricPeer , enrollment * hlfv1alpha1.Component ) (* x509.Certificate , * ecdsa.PrivateKey , * x509.Certificate , error ) {
986- switch conf .Spec .CredentialStore {
987- case hlfv1alpha1 .CredentialStoreKubernetes :
988- enrollRequest , err := getEnrollRequestForFabricCA (client , enrollment , conf , "tls" )
971+ enrollRequest , err := getEnrollRequestForFabricCATLS (client , enrollment , conf , "tls" )
989972 if err != nil {
990973 return nil , nil , nil , err
991974 }
@@ -994,6 +977,12 @@ func CreateSignCryptoMaterial(client *kubernetes.Clientset, conf *hlfv1alpha1.Fa
994977 return nil , nil , nil , err
995978 }
996979 return tlsCert , tlsKey , tlsRootCert , nil
980+ }
981+ }
982+
983+ func CreateSignCryptoMaterial (client * kubernetes.Clientset , conf * hlfv1alpha1.FabricPeer , enrollment * hlfv1alpha1.Component ) (* x509.Certificate , * ecdsa.PrivateKey , * x509.Certificate , error ) {
984+ switch conf .Spec .CredentialStore {
985+
997986 case hlfv1alpha1 .CredentialStoreVault :
998987 enrollRequest , err := getEnrollRequestForVault (enrollment , conf , "tls" )
999988 if err != nil {
@@ -1010,7 +999,15 @@ func CreateSignCryptoMaterial(client *kubernetes.Clientset, conf *hlfv1alpha1.Fa
1010999 }
10111000 return tlsCert , tlsKey , tlsRootCert , nil
10121001 default :
1013- return nil , nil , nil , errors .New (fmt .Sprintf ("not implemented for credential store %s" , conf .Spec .CredentialStore ))
1002+ enrollRequest , err := getEnrollRequestForFabricCA (client , enrollment , conf , "tls" )
1003+ if err != nil {
1004+ return nil , nil , nil , err
1005+ }
1006+ tlsCert , tlsKey , tlsRootCert , err := certs .EnrollUser (enrollRequest )
1007+ if err != nil {
1008+ return nil , nil , nil , err
1009+ }
1010+ return tlsCert , tlsKey , tlsRootCert , nil
10141011 }
10151012}
10161013
@@ -1100,7 +1097,7 @@ func ReenrollSignCryptoMaterial(
11001097 return nil , nil , nil , err
11011098 }
11021099 return signCert , privateKey , signRootCert , nil
1103- } else if conf . Spec . CredentialStore == hlfv1alpha1 . CredentialStoreKubernetes {
1100+ } else {
11041101 reenrollRequest , err := getReenrollRequestForFabricCA (client , enrollment , & conf .Spec , "tls" )
11051102 if err != nil {
11061103 return nil , nil , nil , err
@@ -1114,8 +1111,6 @@ func ReenrollSignCryptoMaterial(
11141111 return nil , nil , nil , err
11151112 }
11161113 return signCert , privateKey , signRootCert , nil
1117- } else {
1118- return nil , nil , nil , errors .New (fmt .Sprintf ("not implemented for credential store %s" , conf .Spec .CredentialStore ))
11191114 }
11201115}
11211116
@@ -1143,7 +1138,7 @@ func ReenrollTLSCryptoMaterial(
11431138 return nil , nil , nil , err
11441139 }
11451140 return tlsCert , tlsKey , tlsRootCert , nil
1146- } else if conf . Spec . CredentialStore == hlfv1alpha1 . CredentialStoreKubernetes {
1141+ } else {
11471142 reenrollRequest , err := getReenrollRequestForFabricCATLS (client , enrollment , & conf .Spec , "tls" )
11481143 if err != nil {
11491144 return nil , nil , nil , err
@@ -1157,8 +1152,6 @@ func ReenrollTLSCryptoMaterial(
11571152 return nil , nil , nil , err
11581153 }
11591154 return tlsCert , tlsKey , tlsRootCert , nil
1160- } else {
1161- return nil , nil , nil , errors .New (fmt .Sprintf ("not implemented for credential store %s" , conf .Spec .CredentialStore ))
11621155 }
11631156}
11641157
0 commit comments