mirror of
https://github.com/opentofu/opentofu.git
synced 2024-12-28 18:01:01 -06:00
507efcb180
Also fixed tests failing auth caused by getStorageAccountAccessKey returning the key name rather than the value TF_ACC= go test ./state/remote -v -run=TestAz -timeout=10m -parallel=4 === RUN TestAzureClient_impl --- PASS: TestAzureClient_impl (0.00s) === RUN TestAzureClient 2016/11/18 13:57:34 [DEBUG] New state was assigned lineage "96037426-f95e-45c3-9183-6c39b49f590b" 2016/11/18 13:57:34 [TRACE] Preserving existing state lineage "96037426-f95e-45c3-9183-6c39b49f590b" --- PASS: TestAzureClient (130.60s) === RUN TestAzureClientEmptyLease 2016/11/18 13:59:44 [DEBUG] New state was assigned lineage "d9997445-1ebf-4b2c-b4df-15ae152f6417" 2016/11/18 13:59:44 [TRACE] Preserving existing state lineage "d9997445-1ebf-4b2c-b4df-15ae152f6417" --- PASS: TestAzureClientEmptyLease (128.15s) === RUN TestAzureClientLease 2016/11/18 14:01:55 [DEBUG] New state was assigned lineage "85912a12-2e0e-464c-9886-8add39ea3a87" 2016/11/18 14:01:55 [TRACE] Preserving existing state lineage "85912a12-2e0e-464c-9886-8add39ea3a87" --- PASS: TestAzureClientLease (138.09s) PASS ok github.com/hashicorp/terraform/state/remote 397.111s
194 lines
4.9 KiB
Go
194 lines
4.9 KiB
Go
package remote
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
|
|
"github.com/Azure/azure-sdk-for-go/arm/storage"
|
|
mainStorage "github.com/Azure/azure-sdk-for-go/storage"
|
|
"github.com/Azure/go-autorest/autorest/azure"
|
|
riviera "github.com/jen20/riviera/azure"
|
|
)
|
|
|
|
func azureFactory(conf map[string]string) (Client, error) {
|
|
storageAccountName, ok := conf["storage_account_name"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("missing 'storage_account_name' configuration")
|
|
}
|
|
containerName, ok := conf["container_name"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("missing 'container_name' configuration")
|
|
}
|
|
keyName, ok := conf["key"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("missing 'key' configuration")
|
|
}
|
|
|
|
accessKey, ok := confOrEnv(conf, "access_key", "ARM_ACCESS_KEY")
|
|
if !ok {
|
|
resourceGroupName, ok := conf["resource_group_name"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("missing 'resource_group' configuration")
|
|
}
|
|
|
|
var err error
|
|
accessKey, err = getStorageAccountAccessKey(conf, resourceGroupName, storageAccountName)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Couldn't read access key from storage account: %s.", err)
|
|
}
|
|
}
|
|
|
|
storageClient, err := mainStorage.NewBasicClient(storageAccountName, accessKey)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Error creating storage client for storage account %q: %s", storageAccountName, err)
|
|
}
|
|
|
|
blobClient := storageClient.GetBlobService()
|
|
leaseID, _ := confOrEnv(conf, "lease_id", "ARM_LEASE_ID")
|
|
|
|
return &AzureClient{
|
|
blobClient: &blobClient,
|
|
containerName: containerName,
|
|
keyName: keyName,
|
|
leaseID: leaseID,
|
|
}, nil
|
|
}
|
|
|
|
func getStorageAccountAccessKey(conf map[string]string, resourceGroupName, storageAccountName string) (string, error) {
|
|
creds, err := getCredentialsFromConf(conf)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
oauthConfig, err := azure.PublicCloud.OAuthConfigForTenant(creds.TenantID)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
if oauthConfig == nil {
|
|
return "", fmt.Errorf("Unable to configure OAuthConfig for tenant %s", creds.TenantID)
|
|
}
|
|
|
|
spt, err := azure.NewServicePrincipalToken(*oauthConfig, creds.ClientID, creds.ClientSecret, azure.PublicCloud.ResourceManagerEndpoint)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
accountsClient := storage.NewAccountsClient(creds.SubscriptionID)
|
|
accountsClient.Authorizer = spt
|
|
|
|
keys, err := accountsClient.ListKeys(resourceGroupName, storageAccountName)
|
|
if err != nil {
|
|
return "", fmt.Errorf("Error retrieving keys for storage account %q: %s", storageAccountName, err)
|
|
}
|
|
|
|
if keys.Keys == nil {
|
|
return "", fmt.Errorf("Nil key returned for storage account %q", storageAccountName)
|
|
}
|
|
|
|
accessKeys := *keys.Keys
|
|
return *accessKeys[0].Value, nil
|
|
}
|
|
|
|
func getCredentialsFromConf(conf map[string]string) (*riviera.AzureResourceManagerCredentials, error) {
|
|
subscriptionID, ok := confOrEnv(conf, "arm_subscription_id", "ARM_SUBSCRIPTION_ID")
|
|
if !ok {
|
|
return nil, fmt.Errorf("missing 'arm_subscription_id' configuration")
|
|
}
|
|
clientID, ok := confOrEnv(conf, "arm_client_id", "ARM_CLIENT_ID")
|
|
if !ok {
|
|
return nil, fmt.Errorf("missing 'arm_client_id' configuration")
|
|
}
|
|
clientSecret, ok := confOrEnv(conf, "arm_client_secret", "ARM_CLIENT_SECRET")
|
|
if !ok {
|
|
return nil, fmt.Errorf("missing 'arm_client_secret' configuration")
|
|
}
|
|
tenantID, ok := confOrEnv(conf, "arm_tenant_id", "ARM_TENANT_ID")
|
|
if !ok {
|
|
return nil, fmt.Errorf("missing 'arm_tenant_id' configuration")
|
|
}
|
|
|
|
return &riviera.AzureResourceManagerCredentials{
|
|
SubscriptionID: subscriptionID,
|
|
ClientID: clientID,
|
|
ClientSecret: clientSecret,
|
|
TenantID: tenantID,
|
|
}, nil
|
|
}
|
|
|
|
func confOrEnv(conf map[string]string, confKey, envVar string) (string, bool) {
|
|
value, ok := conf[confKey]
|
|
if ok {
|
|
return value, true
|
|
}
|
|
|
|
value = os.Getenv(envVar)
|
|
|
|
return value, value != ""
|
|
}
|
|
|
|
type AzureClient struct {
|
|
blobClient *mainStorage.BlobStorageClient
|
|
containerName string
|
|
keyName string
|
|
leaseID string
|
|
}
|
|
|
|
func (c *AzureClient) Get() (*Payload, error) {
|
|
blob, err := c.blobClient.GetBlob(c.containerName, c.keyName)
|
|
if err != nil {
|
|
if storErr, ok := err.(mainStorage.AzureStorageServiceError); ok {
|
|
if storErr.Code == "BlobNotFound" {
|
|
return nil, nil
|
|
}
|
|
}
|
|
return nil, err
|
|
}
|
|
|
|
defer blob.Close()
|
|
|
|
data, err := ioutil.ReadAll(blob)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
payload := &Payload{
|
|
Data: data,
|
|
}
|
|
|
|
// If there was no data, then return nil
|
|
if len(payload.Data) == 0 {
|
|
return nil, nil
|
|
}
|
|
|
|
return payload, nil
|
|
}
|
|
|
|
func (c *AzureClient) Put(data []byte) error {
|
|
headers := map[string]string{
|
|
"Content-Type": "application/json",
|
|
}
|
|
|
|
if c.leaseID != "" {
|
|
headers["x-ms-lease-id"] = c.leaseID
|
|
}
|
|
|
|
return c.blobClient.CreateBlockBlobFromReader(
|
|
c.containerName,
|
|
c.keyName,
|
|
uint64(len(data)),
|
|
bytes.NewReader(data),
|
|
headers,
|
|
)
|
|
}
|
|
|
|
func (c *AzureClient) Delete() error {
|
|
headers := map[string]string{}
|
|
if c.leaseID != "" {
|
|
headers["x-ms-lease-id"] = c.leaseID
|
|
}
|
|
|
|
return c.blobClient.DeleteBlob(c.containerName, c.keyName, headers)
|
|
}
|