This repository was archived by the owner on May 4, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 7
/
Copy pathkeyvaultclient.go
130 lines (107 loc) · 3.56 KB
/
keyvaultclient.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at https://mozilla.org/MPL/2.0/.
package vault_akv_plugin
import (
"encoding/json"
"fmt"
"github.com/hashicorp/go-hclog"
"os/exec"
"strings"
)
const (
AzCmd = "az"
KeyvaultSubcommand = "keyvault"
)
type keyvaultClient struct {
logger *hclog.Logger
}
func InitKeyvaultClient(logger *hclog.Logger) (*keyvaultClient, error) {
var kvClient keyvaultClient
kvClient.logger = logger
_, err := exec.LookPath(AzCmd)
if err != nil {
(*logger).Error("Can't find Azure CLI tools")
return nil, err
}
return &kvClient, nil
}
func (kvClient *keyvaultClient) ListSecrets(vaultName string) ([]string, error) {
parsedJson, err := runCmdAndParseJsonArrOutput(*kvClient.logger,
"secret", "list", "--vault-name", vaultName)
if err != nil {
return nil, err
}
secrets := make([]string, 0)
for _, entry := range parsedJson {
secrets = append(secrets, entry["name"].(string))
}
return secrets, nil
}
func (kvClient *keyvaultClient) GetSecret(vaultName string, name string) (string, error) {
parsedJson, err := runCmdAndParseJsonOutput(*kvClient.logger,
"secret", "show", "--name", name, "--vault-name", vaultName)
if err != nil {
return "", err
}
// To be compatible with Vault's internal implementation of the KV secret engine, we
// return an empty result and no errors when a secret is not found
if parsedJson == nil {
return "", nil
}
return parsedJson["value"].(string), nil
}
func (kvClient *keyvaultClient) SetSecret(vaultName string, name string, value string) error {
_, err := runCmdAndParseJsonOutput(*kvClient.logger,
"secret", "set", "--name", name, "--value", value, "--vault-name", vaultName)
return err
}
func (kvClient *keyvaultClient) DeleteSecret(vaultName string, name string) error {
_, err := runCmdAndParseJsonOutput(*kvClient.logger,
"secret", "delete", "--name", name, "--vault-name", vaultName)
if err != nil {
return err
}
return kvClient.PurgeSecret(vaultName, name)
}
func (kvClient *keyvaultClient) PurgeSecret(vaultName string, name string) error {
args := []string{"secret", "purge", "--name", name, "--vault-name", vaultName}
output, err := runAzKeyvaultCommand(args)
if err != nil {
(*kvClient.logger).Trace(fmt.Sprintf("%s: %s", output, err.Error()))
}
return nil
}
func runCmdAndParseJsonArrOutput(logger hclog.Logger, args ...string) ([]map[string]interface{}, error) {
output, err := runAzKeyvaultCommand(args)
if err != nil {
logger.Error("Failed running command")
return nil, err
}
logger.Trace(fmt.Sprintf("%s", output))
var parsedJson []map[string]interface{}
json.Unmarshal(output, &parsedJson)
return parsedJson, nil
}
func runCmdAndParseJsonOutput(logger hclog.Logger, args ...string) (map[string]interface{}, error) {
output, err := runAzKeyvaultCommand(args)
if err != nil {
// Unlike Vault, AKV returns an error (SecretNotFound) when the secret isn't found
// Returning nil, nil similar to Vault's implementation instead of an error
if strings.Contains(string(output), "SecretNotFound") {
return nil, nil
}
logger.Error("Failed running command")
return nil, err
}
logger.Trace(fmt.Sprintf("%s", output))
var parsedJson map[string]interface{}
json.Unmarshal(output, &parsedJson)
return parsedJson, nil
}
func runAzKeyvaultCommand(args []string) ([]byte, error) {
azArgs := append([]string{KeyvaultSubcommand}, args...)
cmdAz := exec.Command(AzCmd, azArgs...)
output, err := cmdAz.CombinedOutput()
return output, err
}