forked from TrueCloudLab/certificates
parent
dae802482a
commit
70196b2331
2 changed files with 104 additions and 1 deletions
101
authority/provisioner/azure.go
Normal file
101
authority/provisioner/azure.go
Normal file
|
@ -0,0 +1,101 @@
|
||||||
|
package provisioner
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/x509"
|
||||||
|
|
||||||
|
"github.com/pkg/errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
// azureAttestedDocumentURL is the URL for the attested document.
|
||||||
|
const azureAttestedDocumentURL = "http://169.254.169.254/metadata/attested/document?api-version=2018-10-01"
|
||||||
|
|
||||||
|
type azureConfig struct {
|
||||||
|
attestedDocumentURL string
|
||||||
|
}
|
||||||
|
|
||||||
|
func newAzureConfig() *azureConfig {
|
||||||
|
return &azureConfig{
|
||||||
|
attestedDocumentURL: azureAttestedDocumentURL,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Azure is the provisioner that supports identity tokens created from the
|
||||||
|
// Microsoft Azure Instance Metadata service.
|
||||||
|
//
|
||||||
|
// If DisableCustomSANs is true, only the internal DNS and IP will be added as a
|
||||||
|
// SAN. By default it will accept any SAN in the CSR.
|
||||||
|
//
|
||||||
|
// If DisableTrustOnFirstUse is true, multiple sign request for this provisioner
|
||||||
|
// with the same instance will be accepted. By default only the first request
|
||||||
|
// will be accepted.
|
||||||
|
type Azure struct {
|
||||||
|
Type string `json:"type"`
|
||||||
|
Name string `json:"name"`
|
||||||
|
DisableCustomSANs bool `json:"disableCustomSANs"`
|
||||||
|
DisableTrustOnFirstUse bool `json:"disableTrustOnFirstUse"`
|
||||||
|
Claims *Claims `json:"claims,omitempty"`
|
||||||
|
claimer *Claimer
|
||||||
|
config *azureConfig
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetID returns the provisioner unique identifier.
|
||||||
|
func (p *Azure) GetID() string {
|
||||||
|
return "azure:" + p.Name
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetTokenID returns the identifier of the token.
|
||||||
|
func (p *Azure) GetTokenID(token string) (string, error) {
|
||||||
|
return "", errors.New("TODO")
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetName returns the name of the provisioner.
|
||||||
|
func (p *Azure) GetName() string {
|
||||||
|
return p.Name
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetType returns the type of provisioner.
|
||||||
|
func (p *Azure) GetType() Type {
|
||||||
|
return TypeAzure
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetEncryptedKey is not available in an Azure provisioner.
|
||||||
|
func (p *Azure) GetEncryptedKey() (kid string, key string, ok bool) {
|
||||||
|
return "", "", false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Init validates and initializes the Azure provisioner.
|
||||||
|
func (p *Azure) Init(config Config) (err error) {
|
||||||
|
switch {
|
||||||
|
case p.Type == "":
|
||||||
|
return errors.New("provisioner type cannot be empty")
|
||||||
|
case p.Name == "":
|
||||||
|
return errors.New("provisioner name cannot be empty")
|
||||||
|
}
|
||||||
|
// Update claims with global ones
|
||||||
|
if p.claimer, err = NewClaimer(p.Claims, config.Claims); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
// Initialize configuration
|
||||||
|
p.config = newAzureConfig()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// AuthorizeSign validates the given token and returns the sign options that
|
||||||
|
// will be used on certificate creation.
|
||||||
|
func (p *Azure) AuthorizeSign(token string) ([]SignOption, error) {
|
||||||
|
return nil, errors.New("TODO")
|
||||||
|
}
|
||||||
|
|
||||||
|
// AuthorizeRenewal returns an error if the renewal is disabled.
|
||||||
|
func (p *Azure) AuthorizeRenewal(cert *x509.Certificate) error {
|
||||||
|
if p.claimer.IsDisableRenewal() {
|
||||||
|
return errors.Errorf("renew is disabled for provisioner %s", p.GetID())
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// AuthorizeRevoke returns an error because revoke is not supported on Azure
|
||||||
|
// provisioners.
|
||||||
|
func (p *Azure) AuthorizeRevoke(token string) error {
|
||||||
|
return errors.New("revoke is not supported on a Azure provisioner")
|
||||||
|
}
|
|
@ -46,7 +46,7 @@ const (
|
||||||
// TypeAWS is used to indicate the AWS provisioners.
|
// TypeAWS is used to indicate the AWS provisioners.
|
||||||
TypeAWS Type = 4
|
TypeAWS Type = 4
|
||||||
// TypeAzure is used to indicate the Azure provisioners.
|
// TypeAzure is used to indicate the Azure provisioners.
|
||||||
TypeAzure Type = 4
|
TypeAzure Type = 5
|
||||||
|
|
||||||
// RevokeAudienceKey is the key for the 'revoke' audiences in the audiences map.
|
// RevokeAudienceKey is the key for the 'revoke' audiences in the audiences map.
|
||||||
RevokeAudienceKey = "revoke"
|
RevokeAudienceKey = "revoke"
|
||||||
|
@ -94,6 +94,8 @@ func (l *List) UnmarshalJSON(data []byte) error {
|
||||||
p = &GCP{}
|
p = &GCP{}
|
||||||
case "aws":
|
case "aws":
|
||||||
p = &AWS{}
|
p = &AWS{}
|
||||||
|
case "azure":
|
||||||
|
p = &Azure{}
|
||||||
default:
|
default:
|
||||||
return errors.Errorf("provisioner type %s not supported", typ.Type)
|
return errors.Errorf("provisioner type %s not supported", typ.Type)
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue