|
| 1 | +package cloudprovider |
| 2 | + |
| 3 | +import ( |
| 4 | + "context" |
| 5 | + "fmt" |
| 6 | + "github.com/Azure/azure-sdk-for-go/services/keyvault/2016-10-01/keyvault" |
| 7 | + "github.com/Azure/go-autorest/autorest" |
| 8 | + "github.com/Azure/go-autorest/autorest/azure" |
| 9 | + "github.com/Azure/go-autorest/autorest/azure/auth" |
| 10 | + log "github.com/sirupsen/logrus" |
| 11 | + "github.com/webdevops/kube-bootstrap-token-manager/bootstraptoken" |
| 12 | + "github.com/webdevops/kube-bootstrap-token-manager/config" |
| 13 | +) |
| 14 | + |
| 15 | +type ( |
| 16 | + CloudProviderAzure struct { |
| 17 | + CloudProvider |
| 18 | + |
| 19 | + opts config.Opts |
| 20 | + ctx context.Context |
| 21 | + |
| 22 | + log *log.Entry |
| 23 | + environment azure.Environment |
| 24 | + authorizer autorest.Authorizer |
| 25 | + |
| 26 | + keyvaultClient *keyvault.BaseClient |
| 27 | + } |
| 28 | +) |
| 29 | + |
| 30 | +func (m *CloudProviderAzure) Init(ctx context.Context, opts config.Opts) { |
| 31 | + var err error |
| 32 | + m.ctx = ctx |
| 33 | + m.opts = opts |
| 34 | + m.log = log.WithField("cloudprovider", "azure") |
| 35 | + |
| 36 | + // environment |
| 37 | + if m.opts.CloudProvider.Config != nil { |
| 38 | + m.environment, err = azure.EnvironmentFromFile(*m.opts.CloudProvider.Config) |
| 39 | + } else if m.opts.CloudProvider.Azure.Environment != nil { |
| 40 | + m.environment, err = azure.EnvironmentFromName(*m.opts.CloudProvider.Azure.Environment) |
| 41 | + } else { |
| 42 | + m.environment, err = azure.EnvironmentFromName("AZUREPUBLICCLOUD") |
| 43 | + } |
| 44 | + if err != nil { |
| 45 | + m.log.Panic(err) |
| 46 | + } |
| 47 | + |
| 48 | + // auth |
| 49 | + if m.opts.CloudProvider.Config != nil { |
| 50 | + m.authorizer, err = auth.NewAuthorizerFromFile(m.environment.ResourceIdentifiers.KeyVault) |
| 51 | + } else { |
| 52 | + m.authorizer, err = auth.NewAuthorizerFromEnvironmentWithResource(m.environment.ResourceIdentifiers.KeyVault) |
| 53 | + } |
| 54 | + if err != nil { |
| 55 | + m.log.Panic(err) |
| 56 | + } |
| 57 | +} |
| 58 | + |
| 59 | +func (m *CloudProviderAzure) FetchToken() (token *bootstraptoken.BootstrapToken) { |
| 60 | + if m.opts.CloudProvider.Azure.KeyVaultName != nil && m.opts.CloudProvider.Azure.KeyVaultSecretName != nil { |
| 61 | + vaultName := *m.opts.CloudProvider.Azure.KeyVaultName |
| 62 | + secretName := *m.opts.CloudProvider.Azure.KeyVaultSecretName |
| 63 | + vaultUrl := fmt.Sprintf( |
| 64 | + "https://%s.%s", |
| 65 | + vaultName, |
| 66 | + m.environment.KeyVaultDNSSuffix, |
| 67 | + ) |
| 68 | + |
| 69 | + log.Infof("fetching newest token from Azure KeyVault \"%s\" secret \"%s\"", vaultName, secretName) |
| 70 | + secret, err := m.azureKeyvaultClient().GetSecret(m.ctx, vaultUrl, secretName, "") |
| 71 | + if !secret.IsHTTPStatus(404) && err != nil { |
| 72 | + log.Panic(err) |
| 73 | + } |
| 74 | + |
| 75 | + if secret.Value != nil { |
| 76 | + token = bootstraptoken.ParseFromString(*secret.Value) |
| 77 | + if token != nil { |
| 78 | + if secret.Attributes.Created != nil { |
| 79 | + token.SetCreationUnixTime(*secret.Attributes.Created) |
| 80 | + } |
| 81 | + |
| 82 | + if secret.Attributes.Expires != nil { |
| 83 | + token.SetExpirationUnixTime(*secret.Attributes.Expires) |
| 84 | + } |
| 85 | + } |
| 86 | + } |
| 87 | + } |
| 88 | + |
| 89 | + if token != nil { |
| 90 | + contextLogger := log.WithFields(log.Fields{"token": token.Id()}) |
| 91 | + contextLogger.Infof("found cloud token with id \"%s\" and expiration %s", token.Id(), token.ExpirationString()) |
| 92 | + } |
| 93 | + |
| 94 | + return |
| 95 | +} |
| 96 | + |
| 97 | +func (m *CloudProviderAzure) StoreToken(token *bootstraptoken.BootstrapToken) { |
| 98 | + contextLogger := m.log.WithFields(log.Fields{"token": token.Id()}) |
| 99 | + if m.opts.CloudProvider.Azure.KeyVaultName != nil && m.opts.CloudProvider.Azure.KeyVaultSecretName != nil { |
| 100 | + vaultName := *m.opts.CloudProvider.Azure.KeyVaultName |
| 101 | + secretName := *m.opts.CloudProvider.Azure.KeyVaultSecretName |
| 102 | + vaultUrl := fmt.Sprintf( |
| 103 | + "https://%s.%s", |
| 104 | + vaultName, |
| 105 | + m.environment.KeyVaultDNSSuffix, |
| 106 | + ) |
| 107 | + |
| 108 | + contextLogger.Infof("storing token to Azure KeyVault \"%s\" secret \"%s\" with expiration %s", vaultName, secretName, token.ExpirationString()) |
| 109 | + |
| 110 | + secretParameters := keyvault.SecretSetParameters{ |
| 111 | + Value: stringPtr(token.FullToken()), |
| 112 | + Tags: map[string]*string{ |
| 113 | + "managed-by": stringPtr("kube-bootstrap-token-manager"), |
| 114 | + "token": stringPtr(token.Id()), |
| 115 | + }, |
| 116 | + ContentType: stringPtr("kube-bootstrap-token"), |
| 117 | + SecretAttributes: &keyvault.SecretAttributes{ |
| 118 | + NotBefore: token.GetCreationUnixTime(), |
| 119 | + Expires: token.GetExpirationUnixTime(), |
| 120 | + }, |
| 121 | + } |
| 122 | + _, err := m.azureKeyvaultClient().SetSecret(m.ctx, vaultUrl, secretName, secretParameters) |
| 123 | + if err != nil { |
| 124 | + log.Panic(err) |
| 125 | + } |
| 126 | + } |
| 127 | +} |
| 128 | + |
| 129 | +func (m *CloudProviderAzure) azureKeyvaultClient() *keyvault.BaseClient { |
| 130 | + if m.keyvaultClient == nil { |
| 131 | + auth, err := auth.NewAuthorizerFromEnvironmentWithResource(m.environment.ResourceIdentifiers.KeyVault) |
| 132 | + if err != nil { |
| 133 | + log.Panic(err) |
| 134 | + } |
| 135 | + |
| 136 | + client := keyvault.New() |
| 137 | + client.Authorizer = auth |
| 138 | + m.keyvaultClient = &client |
| 139 | + } |
| 140 | + |
| 141 | + return m.keyvaultClient |
| 142 | +} |
0 commit comments