mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-27 00:19:36 -05:00
237 lines
7.0 KiB
Go
237 lines
7.0 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
package cloudcmd
|
|
|
|
import (
|
|
"context"
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"path"
|
|
"strings"
|
|
|
|
"github.com/edgelesssys/constellation/v2/cli/internal/iamid"
|
|
"github.com/edgelesssys/constellation/v2/cli/internal/terraform"
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/cloudprovider"
|
|
"github.com/edgelesssys/constellation/v2/internal/cloud/gcpshared"
|
|
"github.com/edgelesssys/constellation/v2/internal/constants"
|
|
)
|
|
|
|
// IAMDestroyer destroys an IAM configuration.
|
|
type IAMDestroyer struct {
|
|
client terraformClient
|
|
}
|
|
|
|
// NewIAMDestroyer creates a new IAM Destroyer.
|
|
func NewIAMDestroyer(ctx context.Context) (*IAMDestroyer, error) {
|
|
cl, err := terraform.New(ctx, constants.TerraformIAMWorkingDir)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &IAMDestroyer{client: cl}, nil
|
|
}
|
|
|
|
// GetTfstateServiceAccountKey returns the sa_key output from the terraform state.
|
|
func (d *IAMDestroyer) GetTfstateServiceAccountKey(ctx context.Context) (gcpshared.ServiceAccountKey, error) {
|
|
tfState, err := d.client.Show(ctx)
|
|
if err != nil {
|
|
return gcpshared.ServiceAccountKey{}, err
|
|
}
|
|
|
|
if tfState.Values == nil {
|
|
return gcpshared.ServiceAccountKey{}, errors.New("no Values field in terraform state")
|
|
}
|
|
|
|
saKeyJSON := tfState.Values.Outputs["sa_key"]
|
|
if saKeyJSON == nil {
|
|
return gcpshared.ServiceAccountKey{}, errors.New("no sa_key in outputs of the terraform state")
|
|
}
|
|
|
|
saKeyString, ok := saKeyJSON.Value.(string)
|
|
if !ok {
|
|
return gcpshared.ServiceAccountKey{}, errors.New("sa_key field in terraform state is not a string")
|
|
}
|
|
saKey, err := base64.StdEncoding.DecodeString(saKeyString)
|
|
if err != nil {
|
|
return gcpshared.ServiceAccountKey{}, err
|
|
}
|
|
|
|
var tfSaKey gcpshared.ServiceAccountKey
|
|
if err := json.Unmarshal(saKey, &tfSaKey); err != nil {
|
|
return gcpshared.ServiceAccountKey{}, err
|
|
}
|
|
|
|
return tfSaKey, nil
|
|
}
|
|
|
|
// DestroyIAMConfiguration destroys the previously created IAM configuration and deletes the local IAM terraform files.
|
|
func (d *IAMDestroyer) DestroyIAMConfiguration(ctx context.Context, logLevel terraform.LogLevel) error {
|
|
if err := d.client.Destroy(ctx, logLevel); err != nil {
|
|
return err
|
|
}
|
|
return d.client.CleanUpWorkspace()
|
|
}
|
|
|
|
// IAMCreator creates the IAM configuration on the cloud provider.
|
|
type IAMCreator struct {
|
|
out io.Writer
|
|
newTerraformClient func(ctx context.Context) (terraformClient, error)
|
|
}
|
|
|
|
// IAMConfigOptions holds the necessary values for IAM configuration.
|
|
type IAMConfigOptions struct {
|
|
GCP GCPIAMConfig
|
|
Azure AzureIAMConfig
|
|
AWS AWSIAMConfig
|
|
TFLogLevel terraform.LogLevel
|
|
}
|
|
|
|
// GCPIAMConfig holds the necessary values for GCP IAM configuration.
|
|
type GCPIAMConfig struct {
|
|
Region string
|
|
Zone string
|
|
ProjectID string
|
|
ServiceAccountID string
|
|
}
|
|
|
|
// AzureIAMConfig holds the necessary values for Azure IAM configuration.
|
|
type AzureIAMConfig struct {
|
|
Region string
|
|
ServicePrincipal string
|
|
ResourceGroup string
|
|
}
|
|
|
|
// AWSIAMConfig holds the necessary values for AWS IAM configuration.
|
|
type AWSIAMConfig struct {
|
|
Region string
|
|
Prefix string
|
|
}
|
|
|
|
// NewIAMCreator creates a new IAM creator.
|
|
func NewIAMCreator(out io.Writer) *IAMCreator {
|
|
return &IAMCreator{
|
|
out: out,
|
|
newTerraformClient: func(ctx context.Context) (terraformClient, error) {
|
|
return terraform.New(ctx, constants.TerraformIAMWorkingDir)
|
|
},
|
|
}
|
|
}
|
|
|
|
// Create prepares and hands over the corresponding providers IAM creator.
|
|
func (c *IAMCreator) Create(ctx context.Context, provider cloudprovider.Provider, opts *IAMConfigOptions) (iamid.File, error) {
|
|
switch provider {
|
|
case cloudprovider.GCP:
|
|
cl, err := c.newTerraformClient(ctx)
|
|
if err != nil {
|
|
return iamid.File{}, err
|
|
}
|
|
defer cl.RemoveInstaller()
|
|
return c.createGCP(ctx, cl, opts)
|
|
case cloudprovider.Azure:
|
|
cl, err := c.newTerraformClient(ctx)
|
|
if err != nil {
|
|
return iamid.File{}, err
|
|
}
|
|
defer cl.RemoveInstaller()
|
|
return c.createAzure(ctx, cl, opts)
|
|
case cloudprovider.AWS:
|
|
cl, err := c.newTerraformClient(ctx)
|
|
if err != nil {
|
|
return iamid.File{}, err
|
|
}
|
|
defer cl.RemoveInstaller()
|
|
return c.createAWS(ctx, cl, opts)
|
|
default:
|
|
return iamid.File{}, fmt.Errorf("unsupported cloud provider: %s", provider)
|
|
}
|
|
}
|
|
|
|
// createGCP creates the IAM configuration on GCP.
|
|
func (c *IAMCreator) createGCP(ctx context.Context, cl terraformClient, opts *IAMConfigOptions) (retFile iamid.File, retErr error) {
|
|
defer rollbackOnError(c.out, &retErr, &rollbackerTerraform{client: cl}, opts.TFLogLevel)
|
|
|
|
vars := terraform.GCPIAMVariables{
|
|
ServiceAccountID: opts.GCP.ServiceAccountID,
|
|
Project: opts.GCP.ProjectID,
|
|
Region: opts.GCP.Region,
|
|
Zone: opts.GCP.Zone,
|
|
}
|
|
|
|
if err := cl.PrepareWorkspace(path.Join("terraform", "iam", strings.ToLower(cloudprovider.GCP.String())), &vars); err != nil {
|
|
return iamid.File{}, err
|
|
}
|
|
|
|
iamOutput, err := cl.CreateIAMConfig(ctx, cloudprovider.GCP, opts.TFLogLevel)
|
|
if err != nil {
|
|
return iamid.File{}, err
|
|
}
|
|
|
|
return iamid.File{
|
|
CloudProvider: cloudprovider.GCP,
|
|
GCPOutput: iamid.GCPFile{
|
|
ServiceAccountKey: iamOutput.GCP.SaKey,
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
// createAzure creates the IAM configuration on Azure.
|
|
func (c *IAMCreator) createAzure(ctx context.Context, cl terraformClient, opts *IAMConfigOptions) (retFile iamid.File, retErr error) {
|
|
defer rollbackOnError(c.out, &retErr, &rollbackerTerraform{client: cl}, opts.TFLogLevel)
|
|
|
|
vars := terraform.AzureIAMVariables{
|
|
Region: opts.Azure.Region,
|
|
ResourceGroup: opts.Azure.ResourceGroup,
|
|
ServicePrincipal: opts.Azure.ServicePrincipal,
|
|
}
|
|
|
|
if err := cl.PrepareWorkspace(path.Join("terraform", "iam", strings.ToLower(cloudprovider.Azure.String())), &vars); err != nil {
|
|
return iamid.File{}, err
|
|
}
|
|
|
|
iamOutput, err := cl.CreateIAMConfig(ctx, cloudprovider.Azure, opts.TFLogLevel)
|
|
if err != nil {
|
|
return iamid.File{}, err
|
|
}
|
|
|
|
return iamid.File{
|
|
CloudProvider: cloudprovider.Azure,
|
|
AzureOutput: iamid.AzureFile{
|
|
SubscriptionID: iamOutput.Azure.SubscriptionID,
|
|
TenantID: iamOutput.Azure.TenantID,
|
|
UAMIID: iamOutput.Azure.UAMIID,
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
// createAWS creates the IAM configuration on AWS.
|
|
func (c *IAMCreator) createAWS(ctx context.Context, cl terraformClient, opts *IAMConfigOptions) (retFile iamid.File, retErr error) {
|
|
defer rollbackOnError(c.out, &retErr, &rollbackerTerraform{client: cl}, opts.TFLogLevel)
|
|
|
|
vars := terraform.AWSIAMVariables{
|
|
Region: opts.AWS.Region,
|
|
Prefix: opts.AWS.Prefix,
|
|
}
|
|
|
|
if err := cl.PrepareWorkspace(path.Join("terraform", "iam", strings.ToLower(cloudprovider.AWS.String())), &vars); err != nil {
|
|
return iamid.File{}, err
|
|
}
|
|
|
|
iamOutput, err := cl.CreateIAMConfig(ctx, cloudprovider.AWS, opts.TFLogLevel)
|
|
if err != nil {
|
|
return iamid.File{}, err
|
|
}
|
|
|
|
return iamid.File{
|
|
CloudProvider: cloudprovider.AWS,
|
|
AWSOutput: iamid.AWSFile{
|
|
WorkerNodeInstanceProfile: iamOutput.AWS.WorkerNodeInstanceProfile,
|
|
ControlPlaneInstanceProfile: iamOutput.AWS.ControlPlaneInstanceProfile,
|
|
},
|
|
}, nil
|
|
}
|