forked from kyma-project/control-plane
/
provider.go
98 lines (77 loc) · 3.22 KB
/
provider.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
package azure
import (
"github.com/Azure/azure-sdk-for-go/services/eventhub/mgmt/2017-04-01/eventhub"
"github.com/Azure/azure-sdk-for-go/services/resources/mgmt/2019-05-01/resources"
"github.com/Azure/go-autorest/autorest"
"github.com/Azure/go-autorest/autorest/adal"
"github.com/Azure/go-autorest/autorest/azure"
"github.com/pkg/errors"
"github.com/sirupsen/logrus"
)
type HyperscalerProvider interface {
GetClient(config *Config, logger logrus.FieldLogger) (Interface, error)
}
var _ HyperscalerProvider = (*azureProvider)(nil)
type azureProvider struct{}
func NewAzureProvider() HyperscalerProvider {
return &azureProvider{}
}
// GetClient gets a client for interacting with Azure
func (ac *azureProvider) GetClient(config *Config, logger logrus.FieldLogger) (Interface, error) {
environment, err := config.Environment()
if err != nil {
return nil, err
}
authorizer, err := ac.getResourceManagementAuthorizer(config, environment)
if err != nil {
return nil, errors.Wrap(err, "while initializing authorizer")
}
// create namespace client
nsClient, err := ac.getNamespaceClient(config, authorizer)
if err != nil {
return nil, errors.Wrap(err, "while creating namespace client")
}
// create resource group client
resourceGroupClient, err := ac.getGroupsClient(config, authorizer)
if err != nil {
return nil, errors.Wrap(err, "while creating resource group client")
}
// create azure client
return NewAzureClient(nsClient, resourceGroupClient, logger), nil
}
// getGroupsClient gets a client for handling of Azure Namespaces
func (ac *azureProvider) getNamespaceClient(config *Config, authorizer autorest.Authorizer) (eventhub.NamespacesClient, error) {
nsClient := eventhub.NewNamespacesClient(config.subscriptionID)
nsClient.Authorizer = authorizer
if err := nsClient.AddToUserAgent(config.userAgent); err != nil {
return eventhub.NamespacesClient{}, errors.Wrapf(err, "while adding user agent [%s]", config.userAgent)
}
return nsClient, nil
}
// getGroupsClient gets a client for handling of Azure ResourceGroups
func (ac *azureProvider) getGroupsClient(config *Config, authorizer autorest.Authorizer) (resources.GroupsClient, error) {
client := resources.NewGroupsClient(config.subscriptionID)
client.Authorizer = authorizer
if err := client.AddToUserAgent(config.userAgent); err != nil {
return resources.GroupsClient{}, errors.Wrapf(err, "while adding user agent [%s]", config.userAgent)
}
return client, nil
}
func (ac *azureProvider) getResourceManagementAuthorizer(config *Config, environment *azure.Environment) (autorest.Authorizer, error) {
armAuthorizer, err := ac.getAuthorizerForResource(config, environment)
if err != nil {
return nil, errors.Wrap(err, "while creating resource authorizer")
}
return armAuthorizer, err
}
func (ac *azureProvider) getAuthorizerForResource(config *Config, environment *azure.Environment) (autorest.Authorizer, error) {
oauthConfig, err := adal.NewOAuthConfig(environment.ActiveDirectoryEndpoint, config.tenantID)
if err != nil {
return nil, err
}
token, err := adal.NewServicePrincipalToken(*oauthConfig, config.clientID, config.clientSecret, environment.ResourceManagerEndpoint)
if err != nil {
return nil, err
}
return autorest.NewBearerAuthorizer(token), err
}