forked from openshift/origin
-
Notifications
You must be signed in to change notification settings - Fork 0
/
gettoken.go
140 lines (111 loc) · 3.88 KB
/
gettoken.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
package sa
import (
"errors"
"fmt"
"io"
"os"
"github.com/spf13/cobra"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
kapi "k8s.io/kubernetes/pkg/api"
kcoreclient "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/core/internalversion"
"k8s.io/kubernetes/pkg/kubectl/cmd/templates"
cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
"github.com/openshift/origin/pkg/cmd/util/term"
"github.com/openshift/origin/pkg/oc/cli/util/clientcmd"
"github.com/openshift/origin/pkg/serviceaccounts"
)
const (
GetServiceAccountTokenRecommendedName = "get-token"
getServiceAccountTokenShort = `Get a token assigned to a service account.`
getServiceAccountTokenUsage = `%s SA-NAME`
)
var (
getServiceAccountTokenLong = templates.LongDesc(`
Get a token assigned to a service account.
If the service account has multiple tokens, the first token found will be returned.
Service account API tokens are used by service accounts to authenticate to the API.
Client actions using a service account token will be executed as if the service account
itself were making the actions.`)
getServiceAccountTokenExamples = templates.Examples(`
# Get the service account token from service account 'default'
%[1]s 'default'`)
)
type GetServiceAccountTokenOptions struct {
SAName string
SAClient kcoreclient.ServiceAccountInterface
SecretsClient kcoreclient.SecretInterface
Out io.Writer
Err io.Writer
}
func NewCommandGetServiceAccountToken(name, fullname string, f *clientcmd.Factory, out io.Writer) *cobra.Command {
options := &GetServiceAccountTokenOptions{
Out: out,
Err: os.Stderr,
}
getServiceAccountTokenCommand := &cobra.Command{
Use: fmt.Sprintf(getServiceAccountTokenUsage, name),
Short: getServiceAccountTokenShort,
Long: getServiceAccountTokenLong,
Example: fmt.Sprintf(getServiceAccountTokenExamples, fullname),
Run: func(cmd *cobra.Command, args []string) {
cmdutil.CheckErr(options.Complete(args, f, cmd))
cmdutil.CheckErr(options.Validate())
cmdutil.CheckErr(options.Run())
},
}
return getServiceAccountTokenCommand
}
func (o *GetServiceAccountTokenOptions) Complete(args []string, f *clientcmd.Factory, cmd *cobra.Command) error {
if len(args) != 1 {
return cmdutil.UsageErrorf(cmd, fmt.Sprintf("expected one service account name as an argument, got %q", args))
}
o.SAName = args[0]
client, err := f.ClientSet()
if err != nil {
return err
}
namespace, _, err := f.DefaultNamespace()
if err != nil {
return err
}
o.SAClient = client.Core().ServiceAccounts(namespace)
o.SecretsClient = client.Core().Secrets(namespace)
return nil
}
func (o *GetServiceAccountTokenOptions) Validate() error {
if o.SAName == "" {
return errors.New("service account name cannot be empty")
}
if o.SAClient == nil || o.SecretsClient == nil {
return errors.New("API clients must not be nil in order to create a new service account token")
}
if o.Out == nil || o.Err == nil {
return errors.New("cannot proceed if output or error writers are nil")
}
return nil
}
func (o *GetServiceAccountTokenOptions) Run() error {
serviceAccount, err := o.SAClient.Get(o.SAName, metav1.GetOptions{})
if err != nil {
return err
}
for _, reference := range serviceAccount.Secrets {
secret, err := o.SecretsClient.Get(reference.Name, metav1.GetOptions{})
if err != nil {
continue
}
if serviceaccounts.IsValidServiceAccountToken(serviceAccount, secret) {
token, exists := secret.Data[kapi.ServiceAccountTokenKey]
if !exists {
return fmt.Errorf("service account token %q for service account %q did not contain token data", secret.Name, serviceAccount.Name)
}
fmt.Fprintf(o.Out, string(token))
if term.IsTerminalWriter(o.Out) {
// pretty-print for a TTY
fmt.Fprintf(o.Out, "\n")
}
return nil
}
}
return fmt.Errorf("could not find a service account token for service account %q", serviceAccount.Name)
}