@@ -159,7 +159,7 @@ func (f *File) TLSConfig() (*tls.Config, error) {
159
159
// Config returns a new KES configuration as specified by
160
160
// the File. It connects to the KeyStore using the given
161
161
// context.
162
- func (f * File ) Config (ctx context.Context , verbose bool ) (* kes.Config , error ) {
162
+ func (f * File ) Config (ctx context.Context ) (* kes.Config , error ) {
163
163
conf := & kes.Config {
164
164
Admin : f .Admin ,
165
165
}
@@ -211,7 +211,7 @@ func (f *File) Config(ctx context.Context, verbose bool) (*kes.Config, error) {
211
211
}
212
212
213
213
if f .KeyStore != nil {
214
- keystore , err := f .KeyStore .Connect (ctx , verbose )
214
+ keystore , err := f .KeyStore .Connect (ctx )
215
215
if err != nil {
216
216
return nil , err
217
217
}
@@ -298,6 +298,9 @@ type LogConfig struct {
298
298
// Audit determines whether the KES server logs audit events to STDOUT.
299
299
// It does not en/disable audit logging in general.
300
300
AuditLevel slog.Level
301
+
302
+ // Log level for which to report KES diagnostic messages.
303
+ LogLevel slog.Level
301
304
}
302
305
303
306
// APIConfig is a structure that holds the API configuration
@@ -365,7 +368,7 @@ type Key struct {
365
368
type KeyStore interface {
366
369
// Connect establishes and returns a new connection
367
370
// to the keystore.
368
- Connect (ctx context.Context , verbose bool ) (kes.KeyStore , error )
371
+ Connect (ctx context.Context ) (kes.KeyStore , error )
369
372
}
370
373
371
374
// FSKeyStore is a structure containing the configuration
@@ -382,7 +385,7 @@ type FSKeyStore struct {
382
385
}
383
386
384
387
// Connect returns a kv.Store that stores key-value pairs in a path on the filesystem.
385
- func (s * FSKeyStore ) Connect (context.Context , bool ) (kes.KeyStore , error ) {
388
+ func (s * FSKeyStore ) Connect (context.Context ) (kes.KeyStore , error ) {
386
389
return fs .NewStore (s .Path )
387
390
}
388
391
@@ -528,7 +531,7 @@ type VaultTransit struct {
528
531
}
529
532
530
533
// Connect returns a kv.Store that stores key-value pairs on a Hashicorp Vault server.
531
- func (s * VaultKeyStore ) Connect (ctx context.Context , verbose bool ) (kes.KeyStore , error ) {
534
+ func (s * VaultKeyStore ) Connect (ctx context.Context ) (kes.KeyStore , error ) {
532
535
if s .AppRole == nil && s .Kubernetes == nil {
533
536
return nil , errors .New ("edge: failed to connect to hashicorp vault: no authentication method specified" )
534
537
}
@@ -568,7 +571,7 @@ func (s *VaultKeyStore) Connect(ctx context.Context, verbose bool) (kes.KeyStore
568
571
KeyName : s .Transit .KeyName ,
569
572
}
570
573
}
571
- return vault .Connect (ctx , c , verbose )
574
+ return vault .Connect (ctx , c )
572
575
}
573
576
574
577
// FortanixKeyStore is a structure containing the
@@ -594,7 +597,7 @@ type FortanixKeyStore struct {
594
597
}
595
598
596
599
// Connect returns a kv.Store that stores key-value pairs on a Fortanix SDKMS server.
597
- func (s * FortanixKeyStore ) Connect (ctx context.Context , _ bool ) (kes.KeyStore , error ) {
600
+ func (s * FortanixKeyStore ) Connect (ctx context.Context ) (kes.KeyStore , error ) {
598
601
return fortanix .Connect (ctx , & fortanix.Config {
599
602
Endpoint : s .Endpoint ,
600
603
GroupID : s .GroupID ,
@@ -629,7 +632,7 @@ type KeySecureKeyStore struct {
629
632
}
630
633
631
634
// Connect returns a kv.Store that stores key-value pairs on a Gemalto KeySecure instance.
632
- func (s * KeySecureKeyStore ) Connect (ctx context.Context , _ bool ) (kes.KeyStore , error ) {
635
+ func (s * KeySecureKeyStore ) Connect (ctx context.Context ) (kes.KeyStore , error ) {
633
636
return gemalto .Connect (ctx , & gemalto.Config {
634
637
Endpoint : s .Endpoint ,
635
638
CAPath : s .CAPath ,
@@ -678,7 +681,7 @@ type GCPSecretManagerKeyStore struct {
678
681
}
679
682
680
683
// Connect returns a kv.Store that stores key-value pairs on GCP SecretManager.
681
- func (s * GCPSecretManagerKeyStore ) Connect (ctx context.Context , _ bool ) (kes.KeyStore , error ) {
684
+ func (s * GCPSecretManagerKeyStore ) Connect (ctx context.Context ) (kes.KeyStore , error ) {
682
685
return gcp .Connect (ctx , & gcp.Config {
683
686
Endpoint : s .Endpoint ,
684
687
ProjectID : s .ProjectID ,
@@ -722,7 +725,7 @@ type AWSSecretsManagerKeyStore struct {
722
725
}
723
726
724
727
// Connect returns a kv.Store that stores key-value pairs on AWS SecretsManager.
725
- func (s * AWSSecretsManagerKeyStore ) Connect (ctx context.Context , _ bool ) (kes.KeyStore , error ) {
728
+ func (s * AWSSecretsManagerKeyStore ) Connect (ctx context.Context ) (kes.KeyStore , error ) {
726
729
return aws .Connect (ctx , & aws.Config {
727
730
Addr : s .Endpoint ,
728
731
Region : s .Region ,
@@ -758,7 +761,7 @@ type AzureKeyVaultKeyStore struct {
758
761
}
759
762
760
763
// Connect returns a kv.Store that stores key-value pairs on Azure KeyVault.
761
- func (s * AzureKeyVaultKeyStore ) Connect (_ context.Context , verbose bool ) (kes.KeyStore , error ) {
764
+ func (s * AzureKeyVaultKeyStore ) Connect (_ context.Context ) (kes.KeyStore , error ) {
762
765
if (s .TenantID != "" || s .ClientID != "" || s .ClientSecret != "" ) && s .ManagedIdentityClientID != "" {
763
766
return nil , errors .New ("edge: failed to connect to Azure KeyVault: more than one authentication method specified" )
764
767
}
@@ -808,7 +811,7 @@ type EntrustKeyControlKeyStore struct {
808
811
}
809
812
810
813
// Connect returns a kv.Store that stores key-value pairs on Entrust KeyControl.
811
- func (s * EntrustKeyControlKeyStore ) Connect (ctx context.Context , _ bool ) (kes.KeyStore , error ) {
814
+ func (s * EntrustKeyControlKeyStore ) Connect (ctx context.Context ) (kes.KeyStore , error ) {
812
815
var rootCAs * x509.CertPool
813
816
if s .CAPath != "" {
814
817
ca , err := https .CertPoolFromFile (s .CAPath )
0 commit comments