04cacabc16
Signed-off-by: Matt Moyer <moyerm@vmware.com>
88 lines
2.4 KiB
Go
88 lines
2.4 KiB
Go
/*
|
|
Copyright 2020 VMware, Inc.
|
|
SPDX-License-Identifier: Apache-2.0
|
|
*/
|
|
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"os"
|
|
"time"
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
clientauthenticationv1beta1 "k8s.io/client-go/pkg/apis/clientauthentication/v1beta1"
|
|
|
|
"github.com/suzerain-io/placeholder-name/internal/constable"
|
|
"github.com/suzerain-io/placeholder-name/pkg/client"
|
|
)
|
|
|
|
func main() {
|
|
err := run(os.LookupEnv, client.ExchangeToken, os.Stdout, 30*time.Second)
|
|
if err != nil {
|
|
_, _ = fmt.Fprintf(os.Stderr, "%s\n", err.Error())
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
type envGetter func(string) (string, bool)
|
|
type tokenExchanger func(ctx context.Context, token, caBundle, apiEndpoint string) (*client.Credential, error)
|
|
|
|
const ErrMissingEnvVar = constable.Error("failed to login: environment variable not set")
|
|
|
|
func run(envGetter envGetter, tokenExchanger tokenExchanger, outputWriter io.Writer, timeout time.Duration) error {
|
|
ctx, cancel := context.WithTimeout(context.Background(), timeout)
|
|
defer cancel()
|
|
|
|
token, varExists := envGetter("PLACEHOLDER_NAME_TOKEN")
|
|
if !varExists {
|
|
return envVarNotSetError("PLACEHOLDER_NAME_TOKEN")
|
|
}
|
|
|
|
caBundle, varExists := envGetter("PLACEHOLDER_NAME_CA_BUNDLE")
|
|
if !varExists {
|
|
return envVarNotSetError("PLACEHOLDER_NAME_CA_BUNDLE")
|
|
}
|
|
|
|
apiEndpoint, varExists := envGetter("PLACEHOLDER_NAME_K8S_API_ENDPOINT")
|
|
if !varExists {
|
|
return envVarNotSetError("PLACEHOLDER_NAME_K8S_API_ENDPOINT")
|
|
}
|
|
|
|
cred, err := tokenExchanger(ctx, token, caBundle, apiEndpoint)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to login: %w", err)
|
|
}
|
|
|
|
var expiration *metav1.Time
|
|
if cred.ExpirationTimestamp != nil {
|
|
t := metav1.NewTime(*cred.ExpirationTimestamp)
|
|
expiration = &t
|
|
}
|
|
execCredential := clientauthenticationv1beta1.ExecCredential{
|
|
TypeMeta: metav1.TypeMeta{
|
|
Kind: "ExecCredential",
|
|
APIVersion: "client.authentication.k8s.io/v1beta1",
|
|
},
|
|
Status: &clientauthenticationv1beta1.ExecCredentialStatus{
|
|
ExpirationTimestamp: expiration,
|
|
Token: cred.Token,
|
|
ClientCertificateData: cred.ClientCertificateData,
|
|
ClientKeyData: cred.ClientKeyData,
|
|
},
|
|
}
|
|
err = json.NewEncoder(outputWriter).Encode(execCredential)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to marshal response to stdout: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func envVarNotSetError(varName string) error {
|
|
return fmt.Errorf("%w: %s", ErrMissingEnvVar, varName)
|
|
}
|