internal/resources/providers/azurelib/auth/credentials.go (69 lines of code) (raw):

// Licensed to Elasticsearch B.V. under one or more contributor // license agreements. See the NOTICE file distributed with // this work for additional information regarding copyright // ownership. Elasticsearch B.V. licenses this file to you under // the Apache License, Version 2.0 (the "License"); you may // not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. package auth import ( "errors" "fmt" "github.com/Azure/azure-sdk-for-go/sdk/azcore" "github.com/elastic/cloudbeat/internal/config" ) type AzureFactoryConfig struct { Credentials azcore.TokenCredential } type ConfigProviderAPI interface { GetAzureClientConfig(cfg config.AzureConfig) (*AzureFactoryConfig, error) } type ConfigProvider struct { AuthProvider AzureAuthProviderAPI } func (p *ConfigProvider) GetAzureClientConfig(cfg config.AzureConfig) (*AzureFactoryConfig, error) { switch cfg.Credentials.ClientCredentialsType { case config.AzureClientCredentialsTypeSecret: return p.getSecretCredentialsConfig(cfg) case config.AzureClientCredentialsTypeCertificate: return p.getCertificateCredentialsConfig(cfg) case "", config.AzureClientCredentialsTypeManagedIdentity, config.AzureClientCredentialsTypeARMTemplate, config.AzureClientCredentialsTypeManual: return p.getDefaultCredentialsConfig() } return nil, ErrWrongCredentialsType } func (p *ConfigProvider) getDefaultCredentialsConfig() (*AzureFactoryConfig, error) { creds, err := p.AuthProvider.FindDefaultCredentials(nil) if err != nil { return nil, fmt.Errorf("failed to get default credentials: %w", err) } return &AzureFactoryConfig{ Credentials: creds, }, nil } func (p *ConfigProvider) getSecretCredentialsConfig(cfg config.AzureConfig) (*AzureFactoryConfig, error) { creds, err := p.AuthProvider.FindClientSecretCredentials( cfg.Credentials.TenantID, cfg.Credentials.ClientID, cfg.Credentials.ClientSecret, nil, ) if err != nil { return nil, fmt.Errorf("failed to get secret credentials: %w", err) } return &AzureFactoryConfig{ Credentials: creds, }, nil } func (p *ConfigProvider) getCertificateCredentialsConfig(cfg config.AzureConfig) (*AzureFactoryConfig, error) { creds, err := p.AuthProvider.FindCertificateCredential( cfg.Credentials.TenantID, cfg.Credentials.ClientID, cfg.Credentials.ClientCertificatePath, cfg.Credentials.ClientCertificatePassword, nil, ) if err != nil { return nil, fmt.Errorf("failed to get secret credentials: %w", err) } return &AzureFactoryConfig{ Credentials: creds, }, nil } var ( ErrWrongCredentialsType = errors.New("wrong credentials type") ErrIncompleteUsernamePassword = errors.New("incomplete username and password credentials") )