mirror of
https://github.com/status-im/consul.git
synced 2025-01-09 05:23:04 +00:00
78b170ad50
* Refactors the leafcert package to not have a dependency on agent/consul and agent/cache to avoid import cycles. This way the xds controller can just import the leafcert package to use the leafcert manager. The leaf cert logic in the controller: * Sets up watches for leaf certs that are referenced in the ProxyStateTemplate (which generates the leaf certs too). * Gets the leaf cert from the leaf cert cache * Stores the leaf cert in the ProxyState that's pushed to xds * For the cert watches, this PR also uses a bimapper + a thin wrapper to map leaf cert events to related ProxyStateTemplates Since bimapper uses a resource.Reference or resource.ID to map between two resource types, I've created an internal type for a leaf certificate to use for the resource.Reference, since it's not a v2 resource. The wrapper allows mapping events to resources (as opposed to mapping resources to resources) The controller tests: Unit: Ensure that we resolve leaf cert references Lifecycle: Ensure that when the CA is updated, the leaf cert is as well Also adds a new spiffe id type, and adds workload identity and workload identity URI to leaf certs. This is so certs are generated with the new workload identity based SPIFFE id. * Pulls out some leaf cert test helpers into a helpers file so it can be used in the xds controller tests. * Wires up leaf cert manager dependency * Support getting token from proxytracker * Add workload identity spiffe id type to the authorize and sign functions --------- Co-authored-by: John Murret <john.murret@hashicorp.com>
67 lines
1.8 KiB
Go
67 lines
1.8 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package connect
|
|
|
|
import (
|
|
"fmt"
|
|
"net/url"
|
|
|
|
"github.com/hashicorp/consul/acl"
|
|
"github.com/hashicorp/consul/proto-public/pbresource"
|
|
)
|
|
|
|
// SpiffeIDService is the structure to represent the SPIFFE ID for a service.
|
|
type SpiffeIDService struct {
|
|
Host string
|
|
Partition string
|
|
Namespace string
|
|
Datacenter string
|
|
Service string
|
|
}
|
|
|
|
func (id SpiffeIDService) NamespaceOrDefault() string {
|
|
return acl.NamespaceOrDefault(id.Namespace)
|
|
}
|
|
|
|
func (id SpiffeIDService) MatchesPartition(partition string) bool {
|
|
return id.PartitionOrDefault() == acl.PartitionOrDefault(partition)
|
|
}
|
|
|
|
// URI returns the *url.URL for this SPIFFE ID.
|
|
func (id SpiffeIDService) URI() *url.URL {
|
|
var result url.URL
|
|
result.Scheme = "spiffe"
|
|
result.Host = id.Host
|
|
result.Path = id.uriPath()
|
|
return &result
|
|
}
|
|
|
|
func (id SpiffeIDService) uriPath() string {
|
|
path := fmt.Sprintf("/ns/%s/dc/%s/svc/%s",
|
|
id.NamespaceOrDefault(),
|
|
id.Datacenter,
|
|
id.Service,
|
|
)
|
|
|
|
// Although CE has no support for partitions, it still needs to be able to
|
|
// handle exportedPartition from peered Consul Enterprise clusters in order
|
|
// to generate the correct SpiffeID.
|
|
// We intentionally avoid using pbpartition.DefaultName here to be CE friendly.
|
|
if ap := id.PartitionOrDefault(); ap != "" && ap != "default" {
|
|
return "/ap/" + ap + path
|
|
}
|
|
return path
|
|
}
|
|
|
|
// SpiffeIDFromIdentityRef creates the SPIFFE ID from a workload identity.
|
|
// TODO (ishustava): make sure ref type is workload identity.
|
|
func SpiffeIDFromIdentityRef(trustDomain string, ref *pbresource.Reference) string {
|
|
return SpiffeIDWorkloadIdentity{
|
|
TrustDomain: trustDomain,
|
|
Partition: ref.Tenancy.Partition,
|
|
Namespace: ref.Tenancy.Namespace,
|
|
WorkloadIdentity: ref.Name,
|
|
}.URI().String()
|
|
}
|