mirror of
https://github.com/kopia/kopia.git
synced 2025-12-23 22:57:50 -05:00
Add authentication support for Azure Federated Identity (AFI) Authored-by: @alisonb-veeam Authored-by: Alison Burgess <a.burgess@veeam.com>
61 lines
3.0 KiB
Go
61 lines
3.0 KiB
Go
package cli
|
|
|
|
import (
|
|
"context"
|
|
"time"
|
|
|
|
"github.com/alecthomas/kingpin/v2"
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/kopia/kopia/repo/blob"
|
|
"github.com/kopia/kopia/repo/blob/azure"
|
|
)
|
|
|
|
type storageAzureFlags struct {
|
|
azOptions azure.Options
|
|
}
|
|
|
|
func (c *storageAzureFlags) Setup(svc StorageProviderServices, cmd *kingpin.CmdClause) {
|
|
cmd.Flag("container", "Name of the Azure blob container").Required().StringVar(&c.azOptions.Container)
|
|
cmd.Flag("storage-account", "Azure storage account name (overrides AZURE_STORAGE_ACCOUNT environment variable)").Required().Envar(svc.EnvName("AZURE_STORAGE_ACCOUNT")).StringVar(&c.azOptions.StorageAccount)
|
|
cmd.Flag("storage-key", "Azure storage account key (overrides AZURE_STORAGE_KEY environment variable)").Envar(svc.EnvName("AZURE_STORAGE_KEY")).StringVar(&c.azOptions.StorageKey)
|
|
cmd.Flag("storage-domain", "Azure storage domain").Envar(svc.EnvName("AZURE_STORAGE_DOMAIN")).StringVar(&c.azOptions.StorageDomain)
|
|
cmd.Flag("sas-token", "Azure SAS Token").Envar(svc.EnvName("AZURE_STORAGE_SAS_TOKEN")).StringVar(&c.azOptions.SASToken)
|
|
cmd.Flag("prefix", "Prefix to use for objects in the bucket").StringVar(&c.azOptions.Prefix)
|
|
cmd.Flag("tenant-id", "Azure service principle tenant ID (overrides AZURE_TENANT_ID environment variable)").Envar(svc.EnvName("AZURE_TENANT_ID")).StringVar(&c.azOptions.TenantID)
|
|
cmd.Flag("client-id", "Azure service principle client ID (overrides AZURE_CLIENT_ID environment variable)").Envar(svc.EnvName("AZURE_CLIENT_ID")).StringVar(&c.azOptions.ClientID)
|
|
cmd.Flag("client-secret", "Azure service principle client secret (overrides AZURE_CLIENT_SECRET environment variable)").Envar(svc.EnvName("AZURE_CLIENT_SECRET")).StringVar(&c.azOptions.ClientSecret)
|
|
cmd.Flag("client-cert", "Azure client certificate (overrides AZURE_CLIENT_CERTIFICATE environment variable)").Envar(svc.EnvName("AZURE_CLIENT_CERTIFICATE")).StringVar(&c.azOptions.ClientCertificate)
|
|
cmd.Flag("azure-federated-token-file", "Path to a file containing an Azure Federated Token (overrides AZURE_FEDERATED_TOKEN_FILE environment variable)").Envar(svc.EnvName("AZURE_FEDERATED_TOKEN_FILE")).StringVar(&c.azOptions.AzureFederatedTokenFile)
|
|
|
|
commonThrottlingFlags(cmd, &c.azOptions.Limits)
|
|
|
|
var pointInTimeStr string
|
|
|
|
pitPreAction := func(_ *kingpin.ParseContext) error {
|
|
if pointInTimeStr != "" {
|
|
t, err := time.Parse(time.RFC3339, pointInTimeStr)
|
|
if err != nil {
|
|
return errors.Wrap(err, "invalid point-in-time argument")
|
|
}
|
|
|
|
c.azOptions.PointInTime = &t
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
cmd.Flag("point-in-time", "Use a point-in-time view of the storage repository when supported").PlaceHolder(time.RFC3339).PreAction(pitPreAction).StringVar(&pointInTimeStr)
|
|
}
|
|
|
|
func (c *storageAzureFlags) Connect(ctx context.Context, isCreate bool, formatVersion int) (blob.Storage, error) {
|
|
_ = formatVersion
|
|
|
|
if isCreate && c.azOptions.PointInTime != nil && !c.azOptions.PointInTime.IsZero() {
|
|
return nil, errors.New("Cannot specify a 'point-in-time' option when creating a repository")
|
|
}
|
|
|
|
//nolint:wrapcheck
|
|
return azure.New(ctx, &c.azOptions, isCreate)
|
|
}
|