auth.go 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package volcengine
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "github.com/volcengine/volcengine-go-sdk/volcengine"
  19. "github.com/volcengine/volcengine-go-sdk/volcengine/credentials"
  20. "github.com/volcengine/volcengine-go-sdk/volcengine/session"
  21. v1 "k8s.io/api/core/v1"
  22. "k8s.io/apimachinery/pkg/types"
  23. "sigs.k8s.io/controller-runtime/pkg/client"
  24. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  25. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  26. )
  27. // NewSession creates a new Volcengine session based on the provider configuration.
  28. // It follows the credential chain:
  29. // 1. Static credentials from a Kubernetes secret (if specified in auth.secretRef).
  30. // 2. IRSA (IAM Role for Service Account) via environment variables (if auth.secretRef is not specified).
  31. func NewSession(ctx context.Context, provider *esv1.VolcengineProvider, kube client.Client, namespace string) (*session.Session, error) {
  32. if provider == nil {
  33. return nil, errors.New("volcengine provider can not be nil")
  34. }
  35. if provider.Region == "" {
  36. return nil, errors.New("region must be specified")
  37. }
  38. var creds *credentials.Credentials
  39. if provider.Auth != nil && provider.Auth.SecretRef != nil {
  40. // If SecretRef is provided, use static credentials.
  41. accessKeyID, err := getSecretValue(ctx, kube, namespace, provider.Auth.SecretRef.AccessKeyID)
  42. if err != nil {
  43. return nil, fmt.Errorf("failed to get accessKeyID: %w", err)
  44. }
  45. secretAccessKey, err := getSecretValue(ctx, kube, namespace, provider.Auth.SecretRef.SecretAccessKey)
  46. if err != nil {
  47. return nil, fmt.Errorf("failed to get secretAccessKey: %w", err)
  48. }
  49. token := []byte{}
  50. if provider.Auth.SecretRef.Token != nil {
  51. token, err = getSecretValue(ctx, kube, namespace, *provider.Auth.SecretRef.Token)
  52. if err != nil {
  53. return nil, fmt.Errorf("failed to get token: %w", err)
  54. }
  55. }
  56. creds = credentials.NewStaticCredentials(string(accessKeyID), string(secretAccessKey), string(token))
  57. } else {
  58. // If SecretRef is not provided, automatically use the default credential chain,
  59. // which includes environment variables and IRSA.
  60. creds = credentials.NewCredentials(credentials.NewOIDCCredentialsProviderFromEnv())
  61. }
  62. config := volcengine.NewConfig().
  63. WithCredentials(creds).
  64. WithRegion(provider.Region)
  65. sess, err := session.NewSession(config)
  66. if err != nil {
  67. return nil, fmt.Errorf("failed to create new Volcengine session: %w", err)
  68. }
  69. return sess, nil
  70. }
  71. // getSecretValue retrieves a value from a Kubernetes secret.
  72. func getSecretValue(ctx context.Context, kube client.Client, namespace string, secretSelector esmeta.SecretKeySelector) ([]byte, error) {
  73. secret := &v1.Secret{}
  74. ref := types.NamespacedName{
  75. Namespace: namespace,
  76. Name: secretSelector.Name,
  77. }
  78. if err := kube.Get(ctx, ref, secret); err != nil {
  79. return nil, fmt.Errorf("failed to get secret %s in namespace %s: %w", ref.Name, ref.Namespace, err)
  80. }
  81. value, ok := secret.Data[secretSelector.Key]
  82. if !ok {
  83. return nil, fmt.Errorf("key %q not found in secret %s in namespace %s", secretSelector.Key, ref.Name, ref.Namespace)
  84. }
  85. return value, nil
  86. }