-
Notifications
You must be signed in to change notification settings - Fork 194
/
oidc_role_arn_provider.go
135 lines (118 loc) · 4.02 KB
/
oidc_role_arn_provider.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
package common
import (
"encoding/json"
"errors"
"io/ioutil"
"os"
"strconv"
"time"
tcerr "github.com/tencentcloud/tencentcloud-sdk-go/tencentcloud/common/errors"
tchttp "github.com/tencentcloud/tencentcloud-sdk-go/tencentcloud/common/http"
"github.com/tencentcloud/tencentcloud-sdk-go/tencentcloud/common/profile"
)
type OIDCRoleArnProvider struct {
region string
providerId string
webIdentityToken string
roleArn string
roleSessionName string
durationSeconds int64
}
type oidcStsRsp struct {
Response struct {
Credentials struct {
Token string `json:"Token"`
TmpSecretId string `json:"TmpSecretId"`
TmpSecretKey string `json:"TmpSecretKey"`
} `json:"Credentials"`
ExpiredTime int `json:"ExpiredTime"`
Expiration time.Time `json:"Expiration"`
RequestId string `json:"RequestId"`
} `json:"Response"`
}
func NewOIDCRoleArnProvider(region, providerId, webIdentityToken, roleArn, roleSessionName string, durationSeconds int64) *OIDCRoleArnProvider {
return &OIDCRoleArnProvider{
region: region,
providerId: providerId,
webIdentityToken: webIdentityToken,
roleArn: roleArn,
roleSessionName: roleSessionName,
durationSeconds: durationSeconds,
}
}
// DefaultTkeOIDCRoleArnProvider returns a OIDCRoleArnProvider with some default options:
// 1. providerId will be environment var TKE_PROVIDER_ID
// 2. webIdentityToken will be the content of file specified by env TKE_IDENTITY_TOKEN_FILE
// 3. roleArn will be env TKE_ROLE_ARN
// 4. roleSessionName will be "tencentcloud-go-sdk-" + timestamp
// 5. durationSeconds will be 7200s
func DefaultTkeOIDCRoleArnProvider() (*OIDCRoleArnProvider, error) {
reg := os.Getenv("TKE_REGION")
if reg == "" {
return nil, errors.New("env TKE_REGION not exist")
}
providerId := os.Getenv("TKE_PROVIDER_ID")
if providerId == "" {
return nil, errors.New("env TKE_PROVIDER_ID not exist")
}
tokenFile := os.Getenv("TKE_IDENTITY_TOKEN_FILE")
if tokenFile == "" {
return nil, errors.New("env TKE_IDENTITY_TOKEN_FILE not exist")
}
tokenBytes, err := ioutil.ReadFile(tokenFile)
if err != nil {
return nil, err
}
roleArn := os.Getenv("TKE_ROLE_ARN")
if roleArn == "" {
return nil, errors.New("env TKE_ROLE_ARN not exist")
}
sessionName := defaultSessionName + strconv.FormatInt(time.Now().UnixNano()/1000, 10)
return NewOIDCRoleArnProvider(reg, providerId, string(tokenBytes), roleArn, sessionName, defaultDurationSeconds), nil
}
func (r *OIDCRoleArnProvider) GetCredential() (CredentialIface, error) {
const (
service = "sts"
version = "2018-08-13"
action = "AssumeRoleWithWebIdentity"
)
if r.durationSeconds > 43200 || r.durationSeconds <= 0 {
return nil, tcerr.NewTencentCloudSDKError(creErr, "AssumeRoleWithWebIdentity durationSeconds should be in the range of 0~43200s", "")
}
cpf := profile.NewClientProfile()
cpf.HttpProfile.Endpoint = endpoint
cpf.HttpProfile.ReqMethod = "POST"
client := NewCommonClient(nil, r.region, cpf)
request := tchttp.NewCommonRequest(service, version, action)
request.SetSkipSign(true)
params := map[string]interface{}{
"ProviderId": r.providerId,
"WebIdentityToken": r.webIdentityToken,
"RoleArn": r.roleArn,
"RoleSessionName": r.roleSessionName,
"DurationSeconds": r.durationSeconds,
}
err := request.SetActionParameters(params)
if err != nil {
return nil, err
}
response := tchttp.NewCommonResponse()
err = client.Send(request, response)
if err != nil {
return nil, err
}
rspSt := new(oidcStsRsp)
if err = json.Unmarshal(response.GetBody(), rspSt); err != nil {
return nil, tcerr.NewTencentCloudSDKError(creErr, err.Error(), "")
}
return &RoleArnCredential{
roleArn: r.roleArn,
roleSessionName: r.roleSessionName,
durationSeconds: r.durationSeconds,
expiredTime: int64(rspSt.Response.ExpiredTime),
token: rspSt.Response.Credentials.Token,
tmpSecretId: rspSt.Response.Credentials.TmpSecretId,
tmpSecretKey: rspSt.Response.Credentials.TmpSecretKey,
source: r,
}, nil
}