mirror of https://github.com/kubernetes/kops.git
Remove dead code
This commit is contained in:
parent
5423e18b56
commit
366210d189
|
@ -112,7 +112,3 @@ func (k fakeCAStore) FindCert(name string) (*pki.Certificate, error) {
|
|||
func (k fakeCAStore) ListKeysets() (map[string]*fi.Keyset, error) {
|
||||
panic("fakeCAStore does not implement ListKeysets")
|
||||
}
|
||||
|
||||
func (k fakeCAStore) DeleteKeysetItem(item *kops.Keyset, id string) error {
|
||||
panic("fakeCAStore does not implement DeleteKeysetItem")
|
||||
}
|
||||
|
|
|
@ -9,7 +9,6 @@ go_library(
|
|||
importpath = "k8s.io/kops/pkg/configserver",
|
||||
visibility = ["//visibility:public"],
|
||||
deps = [
|
||||
"//pkg/apis/kops:go_default_library",
|
||||
"//pkg/apis/nodeup:go_default_library",
|
||||
"//pkg/pki:go_default_library",
|
||||
"//upup/pkg/fi:go_default_library",
|
||||
|
|
|
@ -20,7 +20,6 @@ import (
|
|||
"crypto/x509"
|
||||
"fmt"
|
||||
|
||||
"k8s.io/kops/pkg/apis/kops"
|
||||
"k8s.io/kops/pkg/apis/nodeup"
|
||||
"k8s.io/kops/pkg/pki"
|
||||
"k8s.io/kops/upup/pkg/fi"
|
||||
|
@ -88,8 +87,3 @@ func (s *configserverKeyStore) FindCert(name string) (*pki.Certificate, error) {
|
|||
func (s *configserverKeyStore) ListKeysets() (map[string]*fi.Keyset, error) {
|
||||
return nil, fmt.Errorf("ListKeysets not supported by configserverKeyStore")
|
||||
}
|
||||
|
||||
// DeleteKeysetItem implements fi.CAStore
|
||||
func (s *configserverKeyStore) DeleteKeysetItem(item *kops.Keyset, id string) error {
|
||||
return fmt.Errorf("DeleteKeysetItem not supported by configserverKeyStore")
|
||||
}
|
||||
|
|
|
@ -93,9 +93,6 @@ type CAStore interface {
|
|||
|
||||
// ListKeysets will return all the KeySets.
|
||||
ListKeysets() (map[string]*Keyset, error)
|
||||
|
||||
// DeleteKeysetItem will delete the specified item from the Keyset
|
||||
DeleteKeysetItem(item *kops.Keyset, id string) error
|
||||
}
|
||||
|
||||
// SSHCredentialStore holds SSHCredential objects
|
||||
|
|
|
@ -307,47 +307,6 @@ func (c *ClientsetCAStore) storeKeyset(ctx context.Context, name string, keyset
|
|||
return nil
|
||||
}
|
||||
|
||||
// deleteKeysetItem deletes the specified key from the registry; deleting the whole Keyset if it was the last one.
|
||||
func deleteKeysetItem(client kopsinternalversion.KeysetInterface, name string, keysetType kops.KeysetType, id string) error {
|
||||
ctx := context.TODO()
|
||||
|
||||
keyset, err := client.Get(ctx, name, metav1.GetOptions{})
|
||||
if err != nil {
|
||||
if errors.IsNotFound(err) {
|
||||
return nil
|
||||
}
|
||||
return fmt.Errorf("error reading Keyset %q: %v", name, err)
|
||||
}
|
||||
|
||||
if keyset.Spec.Type != keysetType {
|
||||
return fmt.Errorf("mismatch on Keyset type on %q", name)
|
||||
}
|
||||
|
||||
var newKeys []kops.KeysetItem
|
||||
found := false
|
||||
for _, ki := range keyset.Spec.Keys {
|
||||
if ki.Id == id {
|
||||
found = true
|
||||
} else {
|
||||
newKeys = append(newKeys, ki)
|
||||
}
|
||||
}
|
||||
if !found {
|
||||
return fmt.Errorf("KeysetItem %q not found in Keyset %q", id, name)
|
||||
}
|
||||
if len(newKeys) == 0 {
|
||||
if err := client.Delete(ctx, name, metav1.DeleteOptions{}); err != nil {
|
||||
return fmt.Errorf("error deleting Keyset %q: %v", name, err)
|
||||
}
|
||||
} else {
|
||||
keyset.Spec.Keys = newKeys
|
||||
if _, err := client.Update(ctx, keyset, metav1.UpdateOptions{}); err != nil {
|
||||
return fmt.Errorf("error updating Keyset %q: %v", name, err)
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// addSSHCredential saves the specified SSH Credential to the registry, doing an update or insert
|
||||
func (c *ClientsetCAStore) addSSHCredential(ctx context.Context, name string, publicKey string) error {
|
||||
create := false
|
||||
|
@ -425,18 +384,6 @@ func (c *ClientsetCAStore) FindSSHPublicKeys(name string) ([]*kops.SSHCredential
|
|||
return items, nil
|
||||
}
|
||||
|
||||
// DeleteKeysetItem implements CAStore::DeleteKeysetItem
|
||||
func (c *ClientsetCAStore) DeleteKeysetItem(item *kops.Keyset, id string) error {
|
||||
switch item.Spec.Type {
|
||||
case kops.SecretTypeKeypair:
|
||||
client := c.clientset.Keysets(c.namespace)
|
||||
return deleteKeysetItem(client, item.Name, kops.SecretTypeKeypair, id)
|
||||
default:
|
||||
// Primarily because we need to make sure users can recreate them!
|
||||
return fmt.Errorf("deletion of keystore items of type %v not (yet) supported", item.Spec.Type)
|
||||
}
|
||||
}
|
||||
|
||||
// DeleteSSHCredential implements SSHCredentialStore::DeleteSSHCredential
|
||||
func (c *ClientsetCAStore) DeleteSSHCredential(item *kops.SSHCredential) error {
|
||||
ctx := context.TODO()
|
||||
|
|
|
@ -19,7 +19,6 @@ package fi
|
|||
import (
|
||||
"bytes"
|
||||
"fmt"
|
||||
"math/big"
|
||||
"os"
|
||||
"sort"
|
||||
"strings"
|
||||
|
@ -75,18 +74,10 @@ func (c *VFSCAStore) buildCertificatePoolPath(name string) vfs.Path {
|
|||
return c.basedir.Join("issued", name)
|
||||
}
|
||||
|
||||
func (c *VFSCAStore) buildCertificatePath(name string, id string) vfs.Path {
|
||||
return c.basedir.Join("issued", name, id+".crt")
|
||||
}
|
||||
|
||||
func (c *VFSCAStore) buildPrivateKeyPoolPath(name string) vfs.Path {
|
||||
return c.basedir.Join("private", name)
|
||||
}
|
||||
|
||||
func (c *VFSCAStore) buildPrivateKeyPath(name string, id string) vfs.Path {
|
||||
return c.basedir.Join("private", name, id+".key")
|
||||
}
|
||||
|
||||
func (c *VFSCAStore) parseKeysetYaml(data []byte) (*kops.Keyset, bool, error) {
|
||||
defaultReadVersion := v1alpha2.SchemeGroupVersion.WithKind("Keyset")
|
||||
|
||||
|
@ -495,73 +486,6 @@ func (c *VFSCAStore) FindPrivateKey(id string) (*pki.PrivateKey, error) {
|
|||
return key, nil
|
||||
}
|
||||
|
||||
func (c *VFSCAStore) deletePrivateKey(name string, id string) (bool, error) {
|
||||
// Delete the file itself
|
||||
{
|
||||
|
||||
p := c.buildPrivateKeyPath(name, id)
|
||||
if err := p.Remove(); err != nil && !os.IsNotExist(err) {
|
||||
return false, err
|
||||
}
|
||||
}
|
||||
|
||||
// Update the bundle
|
||||
{
|
||||
p := c.buildPrivateKeyPoolPath(name)
|
||||
ks, err := c.loadKeyset(p)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
||||
if ks == nil || ks.Items[id] == nil {
|
||||
return false, nil
|
||||
}
|
||||
delete(ks.Items, id)
|
||||
if ks.Primary != nil && ks.Primary.Id == id {
|
||||
ks.Primary = nil
|
||||
}
|
||||
|
||||
if err := writeKeysetBundle(c.cluster, p, name, ks, true); err != nil {
|
||||
return false, fmt.Errorf("error writing bundle: %v", err)
|
||||
}
|
||||
}
|
||||
|
||||
return true, nil
|
||||
}
|
||||
|
||||
func (c *VFSCAStore) deleteCertificate(name string, id string) (bool, error) {
|
||||
// Delete the file itself
|
||||
{
|
||||
p := c.buildCertificatePath(name, id)
|
||||
if err := p.Remove(); err != nil && !os.IsNotExist(err) {
|
||||
return false, err
|
||||
}
|
||||
}
|
||||
|
||||
// Update the bundle
|
||||
{
|
||||
p := c.buildCertificatePoolPath(name)
|
||||
ks, err := c.loadKeyset(p)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
||||
if ks == nil || ks.Items[id] == nil {
|
||||
return false, nil
|
||||
}
|
||||
delete(ks.Items, id)
|
||||
if ks.Primary != nil && ks.Primary.Id == id {
|
||||
ks.Primary = nil
|
||||
}
|
||||
|
||||
if err := writeKeysetBundle(c.cluster, p, name, ks, false); err != nil {
|
||||
return false, fmt.Errorf("error writing bundle: %v", err)
|
||||
}
|
||||
}
|
||||
|
||||
return true, nil
|
||||
}
|
||||
|
||||
// AddSSHPublicKey stores an SSH public key
|
||||
func (c *VFSCAStore) AddSSHPublicKey(name string, pubkey []byte) error {
|
||||
id, err := sshcredentials.Fingerprint(string(pubkey))
|
||||
|
@ -617,36 +541,6 @@ func (c *VFSCAStore) FindSSHPublicKeys(name string) ([]*kops.SSHCredential, erro
|
|||
return items, nil
|
||||
}
|
||||
|
||||
// DeleteKeysetItem implements CAStore::DeleteKeysetItem
|
||||
func (c *VFSCAStore) DeleteKeysetItem(item *kops.Keyset, id string) error {
|
||||
switch item.Spec.Type {
|
||||
case kops.SecretTypeKeypair:
|
||||
_, ok := big.NewInt(0).SetString(id, 10)
|
||||
if !ok {
|
||||
return fmt.Errorf("keypair had non-integer version: %q", id)
|
||||
}
|
||||
removed, err := c.deleteCertificate(item.Name, id)
|
||||
if err != nil {
|
||||
return fmt.Errorf("error deleting certificate: %v", err)
|
||||
}
|
||||
if !removed {
|
||||
klog.Warningf("certificate %s:%s was not found", item.Name, id)
|
||||
}
|
||||
removed, err = c.deletePrivateKey(item.Name, id)
|
||||
if err != nil {
|
||||
return fmt.Errorf("error deleting private key: %v", err)
|
||||
}
|
||||
if !removed {
|
||||
klog.Warningf("private key %s:%s was not found", item.Name, id)
|
||||
}
|
||||
return nil
|
||||
|
||||
default:
|
||||
// Primarily because we need to make sure users can recreate them!
|
||||
return fmt.Errorf("deletion of keystore items of type %v not (yet) supported", item.Spec.Type)
|
||||
}
|
||||
}
|
||||
|
||||
func (c *VFSCAStore) DeleteSSHCredential(item *kops.SSHCredential) error {
|
||||
if item.Spec.PublicKey == "" {
|
||||
return fmt.Errorf("must specific public key to delete SSHCredential")
|
||||
|
|
Loading…
Reference in New Issue