1
|
|
|
package providers |
2
|
|
|
|
3
|
|
|
import ( |
4
|
|
|
"fmt" |
5
|
|
|
"os" |
6
|
|
|
"strings" |
7
|
|
|
) |
8
|
|
|
|
9
|
|
|
type DefaultCredentialsProvider struct { |
10
|
|
|
providerChain []CredentialsProvider |
11
|
|
|
lastUsedProvider CredentialsProvider |
12
|
|
|
} |
13
|
|
|
|
14
|
|
|
func NewDefaultCredentialsProvider() (provider *DefaultCredentialsProvider) { |
15
|
|
|
providers := []CredentialsProvider{} |
16
|
|
|
|
17
|
|
|
// Add static ak or sts credentials provider |
18
|
|
|
envProvider, err := NewEnvironmentVariableCredentialsProviderBuilder().Build() |
19
|
|
|
if err == nil { |
20
|
|
|
providers = append(providers, envProvider) |
21
|
|
|
} |
22
|
|
|
|
23
|
|
|
// oidc check |
24
|
|
|
oidcProvider, err := NewOIDCCredentialsProviderBuilder().Build() |
25
|
|
|
if err == nil { |
26
|
|
|
providers = append(providers, oidcProvider) |
27
|
|
|
} |
28
|
|
|
|
29
|
|
|
// cli credentials provider |
30
|
|
|
cliProfileProvider, err := NewCLIProfileCredentialsProviderBuilder().Build() |
31
|
|
|
if err == nil { |
32
|
|
|
providers = append(providers, cliProfileProvider) |
33
|
|
|
} |
34
|
|
|
|
35
|
|
|
// profile credentials provider |
36
|
|
|
profileProvider, err := NewProfileCredentialsProviderBuilder().Build() |
37
|
|
|
if err == nil { |
38
|
|
|
providers = append(providers, profileProvider) |
39
|
|
|
} |
40
|
|
|
|
41
|
|
|
// Add IMDS |
42
|
|
|
if os.Getenv("ALIBABA_CLOUD_ECS_METADATA") != "" { |
43
|
|
|
ecsRamRoleProvider, err := NewECSRAMRoleCredentialsProviderBuilder().WithRoleName(os.Getenv("ALIBABA_CLOUD_ECS_METADATA")).Build() |
44
|
|
|
if err == nil { |
45
|
|
|
providers = append(providers, ecsRamRoleProvider) |
46
|
|
|
} |
47
|
|
|
} |
48
|
|
|
|
49
|
|
|
// TODO: ALIBABA_CLOUD_CREDENTIALS_URI check |
50
|
|
|
|
51
|
|
|
return &DefaultCredentialsProvider{ |
52
|
|
|
providerChain: providers, |
53
|
|
|
} |
54
|
|
|
} |
55
|
|
|
|
56
|
|
|
func (provider *DefaultCredentialsProvider) GetCredentials() (cc *Credentials, err error) { |
57
|
|
|
if provider.lastUsedProvider != nil { |
58
|
|
|
inner, err1 := provider.lastUsedProvider.GetCredentials() |
59
|
|
|
if err1 != nil { |
60
|
|
|
return |
61
|
|
|
} |
62
|
|
|
|
63
|
|
|
cc = &Credentials{ |
64
|
|
|
AccessKeyId: inner.AccessKeyId, |
65
|
|
|
AccessKeySecret: inner.AccessKeySecret, |
66
|
|
|
SecurityToken: inner.SecurityToken, |
67
|
|
|
ProviderName: fmt.Sprintf("%s/%s", provider.GetProviderName(), provider.lastUsedProvider.GetProviderName()), |
68
|
|
|
} |
69
|
|
|
return |
70
|
|
|
} |
71
|
|
|
|
72
|
|
|
errors := []string{} |
73
|
|
|
for _, p := range provider.providerChain { |
74
|
|
|
provider.lastUsedProvider = p |
75
|
|
|
inner, errInLoop := p.GetCredentials() |
76
|
|
|
if errInLoop != nil { |
77
|
|
|
errors = append(errors, errInLoop.Error()) |
78
|
|
|
// 如果有错误,进入下一个获取过程 |
79
|
|
|
continue |
80
|
|
|
} |
81
|
|
|
|
82
|
|
|
if inner != nil { |
83
|
|
|
cc = &Credentials{ |
84
|
|
|
AccessKeyId: inner.AccessKeyId, |
85
|
|
|
AccessKeySecret: inner.AccessKeySecret, |
86
|
|
|
SecurityToken: inner.SecurityToken, |
87
|
|
|
ProviderName: fmt.Sprintf("%s/%s", provider.GetProviderName(), p.GetProviderName()), |
88
|
|
|
} |
89
|
|
|
return |
90
|
|
|
} |
91
|
|
|
} |
92
|
|
|
|
93
|
|
|
err = fmt.Errorf("unable to get credentials from any of the providers in the chain: %s", strings.Join(errors, ", ")) |
94
|
|
|
return |
95
|
|
|
} |
96
|
|
|
|
97
|
|
|
func (provider *DefaultCredentialsProvider) GetProviderName() string { |
98
|
|
|
return "default" |
99
|
|
|
} |
100
|
|
|
|