pulumi/pkg/secrets/service/manager.go
CyrusNajmabadi 66bd3f4aa8
Breaking changes due to Feature 2.0 work
* Make `async:true` the default for `invoke` calls (#3750)

* Switch away from native grpc impl. (#3728)

* Remove usage of the 'deasync' library from @pulumi/pulumi. (#3752)

* Only retry as long as we get unavailable back.  Anything else continues. (#3769)

* Handle all errors for now. (#3781)


* Do not assume --yes was present when using pulumi in non-interactive mode (#3793)

* Upgrade all paths for sdk and pkg to v2

* Backport C# invoke classes and other recent gen changes (#4288)

Adjust C# generation

* Replace IDeployment with a sealed class (#4318)

Replace IDeployment with a sealed class

* .NET: default to args subtype rather than Args.Empty (#4320)

* Adding system namespace for Dotnet code gen

This is required for using Obsolute attributes for deprecations

```
Iam/InstanceProfile.cs(142,10): error CS0246: The type or namespace name 'ObsoleteAttribute' could not be found (are you missing a using directive or an assembly reference?) [/Users/stack72/code/go/src/github.com/pulumi/pulumi-aws/sdk/dotnet/Pulumi.Aws.csproj]
Iam/InstanceProfile.cs(142,10): error CS0246: The type or namespace name 'Obsolete' could not be found (are you missing a using directive or an assembly reference?) [/Users/stack72/code/go/src/github.com/pulumi/pulumi-aws/sdk/dotnet/Pulumi.Aws.csproj]
```

* Fix the nullability of config type properties in C# codegen (#4379)
2020-04-14 09:30:25 +01:00

125 lines
3.3 KiB
Go

package service
import (
"context"
"encoding/base64"
"encoding/json"
"io/ioutil"
"github.com/pkg/errors"
"github.com/pulumi/pulumi/pkg/v2/backend/httpstate/client"
"github.com/pulumi/pulumi/pkg/v2/secrets"
"github.com/pulumi/pulumi/sdk/v2/go/common/diag"
"github.com/pulumi/pulumi/sdk/v2/go/common/resource/config"
"github.com/pulumi/pulumi/sdk/v2/go/common/util/contract"
"github.com/pulumi/pulumi/sdk/v2/go/common/workspace"
)
const Type = "service"
// serviceCrypter is an encrypter/decrypter that uses the Pulumi servce to encrypt/decrypt a stack's secrets.
type serviceCrypter struct {
client *client.Client
stack client.StackIdentifier
}
func newServiceCrypter(client *client.Client, stack client.StackIdentifier) config.Crypter {
return &serviceCrypter{client: client, stack: stack}
}
func (c *serviceCrypter) EncryptValue(plaintext string) (string, error) {
ciphertext, err := c.client.EncryptValue(context.Background(), c.stack, []byte(plaintext))
if err != nil {
return "", err
}
return base64.StdEncoding.EncodeToString(ciphertext), nil
}
func (c *serviceCrypter) DecryptValue(cipherstring string) (string, error) {
ciphertext, err := base64.StdEncoding.DecodeString(cipherstring)
if err != nil {
return "", err
}
plaintext, err := c.client.DecryptValue(context.Background(), c.stack, ciphertext)
if err != nil {
return "", err
}
return string(plaintext), nil
}
type serviceSecretsManagerState struct {
URL string `json:"url,omitempty"`
Owner string `json:"owner"`
Project string `json:"project"`
Stack string `json:"stack"`
}
var _ secrets.Manager = &serviceSecretsManager{}
type serviceSecretsManager struct {
state serviceSecretsManagerState
crypter config.Crypter
}
func (sm *serviceSecretsManager) Type() string {
return Type
}
func (sm *serviceSecretsManager) State() interface{} {
return sm.state
}
func (sm *serviceSecretsManager) Decrypter() (config.Decrypter, error) {
contract.Assert(sm.crypter != nil)
return sm.crypter, nil
}
func (sm *serviceSecretsManager) Encrypter() (config.Encrypter, error) {
contract.Assert(sm.crypter != nil)
return sm.crypter, nil
}
func NewServiceSecretsManager(c *client.Client, id client.StackIdentifier) (secrets.Manager, error) {
return &serviceSecretsManager{
state: serviceSecretsManagerState{
URL: c.URL(),
Owner: id.Owner,
Project: id.Project,
Stack: id.Stack,
},
crypter: newServiceCrypter(c, id),
}, nil
}
// NewServiceSecretsManagerFromState returns a Pulumi service-based secrets manager based on the
// existing state.
func NewServiceSecretsManagerFromState(state json.RawMessage) (secrets.Manager, error) {
var s serviceSecretsManagerState
if err := json.Unmarshal(state, &s); err != nil {
return nil, errors.Wrap(err, "unmarshalling state")
}
account, err := workspace.GetAccount(s.URL)
if err != nil {
return nil, errors.Wrap(err, "getting access token")
}
token := account.AccessToken
if token == "" {
return nil, errors.Errorf("could not find access token for %s, have you logged in?", s.URL)
}
id := client.StackIdentifier{
Owner: s.Owner,
Project: s.Project,
Stack: s.Stack,
}
c := client.NewClient(s.URL, token, diag.DefaultSink(ioutil.Discard, ioutil.Discard, diag.FormatOptions{}))
return &serviceSecretsManager{
state: s,
crypter: newServiceCrypter(c, id),
}, nil
}