From 96fcc580955d12f594da6f7bc59d551de4b0785b Mon Sep 17 00:00:00 2001 From: Niels de Vos Date: Mon, 29 Mar 2021 14:19:19 +0200 Subject: [PATCH] util: use transformed Vault Tokens for initialization After translating options from the ConfigMap into the common Vault parameters, the generated configuration is not used. Instead, the untranslated version of the configuration is passed on to the vaultConnection initialization function, which then can detects missing options. By passing the right configuration to the initializatino function, things work as intended. Signed-off-by: Niels de Vos --- internal/util/vault_tokens.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/internal/util/vault_tokens.go b/internal/util/vault_tokens.go index cb9e4481c..1f098cfc0 100644 --- a/internal/util/vault_tokens.go +++ b/internal/util/vault_tokens.go @@ -199,7 +199,7 @@ func initVaultTokensKMS(args KMSInitializerArgs) (EncryptionKMS, error) { } kms := &VaultTokensKMS{} - err = kms.initConnection(args.Config) + err = kms.initConnection(config) if err != nil { return nil, fmt.Errorf("failed to initialize Vault connection: %w", err) }