-
Notifications
You must be signed in to change notification settings - Fork 0
/
cloud_id.go
104 lines (88 loc) · 2.98 KB
/
cloud_id.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
package azure
import (
"context"
"encoding/base64"
"encoding/json"
"fmt"
"github.com/Azure/azure-sdk-for-go/sdk/azcore/policy"
"github.com/Azure/azure-sdk-for-go/sdk/azidentity"
"io/ioutil"
"net/http"
"time"
)
const AzureADDefResource = "https://management.azure.com/"
const AzureADManagementScope = "https://management.azure.com/.default"
const AzureADDefApiVersion = "2018-02-01"
func GetCloudId(objectId string) (string, error) {
var errMsg string
for retry := 1; retry < 6; retry++ {
if objectId == "" {
token, err := getCloudId(nil)
if err != nil {
return "", err
}
return base64.StdEncoding.EncodeToString([]byte(token)), nil
}
req, err := http.NewRequest("GET", "http://169.254.169.254/metadata/identity/oauth2/token", nil)
if err != nil {
return "", err
}
q := req.URL.Query()
q.Add("api-version", AzureADDefApiVersion)
q.Add("resource", AzureADDefResource)
if objectId != "" {
q.Add("object_id", objectId)
}
req.URL.RawQuery = q.Encode()
req.Header.Set("Metadata", "true")
req.Header.Set("User-Agent", "AKEYLESS")
httpClient := &http.Client{}
resp, err := httpClient.Do(req)
if err != nil {
return "", fmt.Errorf("failed to fetch azure-ad identity metadata. Error: %v", err.Error())
}
if resp == nil {
return "", fmt.Errorf("failed to fetch azure-ad identity metadata. Error: empty response")
}
defer resp.Body.Close()
body, err := ioutil.ReadAll(resp.Body)
if err != nil {
return "", fmt.Errorf("failed to read azure-ad identity metadata response. Error: %v", err.Error())
}
if resp.StatusCode != http.StatusOK {
errMsg = fmt.Sprintf("failed to read azure-ad identity metadata response. "+
"Error: invalid status code - %v body: %v", resp.StatusCode, string(body))
//retry policy: https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/how-to-use-vm-token#error-handling
if resp.StatusCode == http.StatusNotFound || resp.StatusCode == http.StatusTooManyRequests || resp.StatusCode >= 500 {
time.Sleep(time.Duration(retry) * time.Second)
continue
} else {
return "", fmt.Errorf(errMsg)
}
}
var identity struct {
AccessToken string `json:"access_token"`
}
err = json.Unmarshal(body, &identity)
if err != nil {
return "", fmt.Errorf("failed to unmarshal azure-ad identity metadata response. Error: %v %v", err, string(body))
}
cloudId := base64.StdEncoding.EncodeToString([]byte(identity.AccessToken))
return cloudId, nil
}
return "", fmt.Errorf(errMsg)
}
func getCloudId(ctx context.Context) (string, error) {
if ctx == nil {
ctx = context.Background()
}
cred, err := azidentity.NewDefaultAzureCredential(nil)
if err != nil {
return "", fmt.Errorf("failed to get default Azure credential, Error: %v", err)
}
accessToken, err := cred.GetToken(ctx, policy.TokenRequestOptions{Scopes: []string{AzureADManagementScope}})
if err != nil {
return "", fmt.Errorf("failed to get Azure token, Error: %v", err)
}
return accessToken.Token, nil
}