Skip to content
Merged
Show file tree
Hide file tree
Changes from 5 commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
47 changes: 40 additions & 7 deletions azureappconfiguration.go
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,11 @@ package azureappconfiguration
import (
"context"
"encoding/json"
"fmt"
"log"
"regexp"
"strings"
"sync"

"github.com/Azure/azure-sdk-for-go/sdk/azcore"
"golang.org/x/sync/errgroup"
Expand All @@ -21,6 +23,7 @@ type AzureAppConfiguration struct {
trimPrefixes []string

clientManager *configurationClientManager
resolver *keyVaultReferenceResolver
}

func Load(ctx context.Context, authentication AuthenticationOptions, options *Options) (*AzureAppConfiguration, error) {
Expand All @@ -43,6 +46,11 @@ func Load(ctx context.Context, authentication AuthenticationOptions, options *Op
azappcfg.kvSelectors = deduplicateSelectors(options.Selectors)
azappcfg.trimPrefixes = options.TrimKeyPrefixes
azappcfg.clientManager = clientManager
azappcfg.resolver = &keyVaultReferenceResolver{
clients: sync.Map{},
secretResolver: options.KeyVaultOptions.SecretResolver,
credential: options.KeyVaultOptions.Credential,
}

if err := azappcfg.load(ctx); err != nil {
return nil, err
Expand All @@ -57,12 +65,7 @@ func (azappcfg *AzureAppConfiguration) load(ctx context.Context) error {
client: azappcfg.clientManager.staticClient.client,
}

eg, egCtx := errgroup.WithContext(ctx)
eg.Go(func() error {
return azappcfg.loadKeyValues(egCtx, keyValuesClient)
})

return eg.Wait()
return azappcfg.loadKeyValues(ctx, keyValuesClient)
}

func (azappcfg *AzureAppConfiguration) loadKeyValues(ctx context.Context, settingsClient settingsClient) error {
Expand All @@ -72,6 +75,7 @@ func (azappcfg *AzureAppConfiguration) loadKeyValues(ctx context.Context, settin
}

kvSettings := make(map[string]any, len(settingsResponse.settings))
keyVaultRefs := make(map[string]string)
for _, setting := range settingsResponse.settings {
if setting.Key == nil {
continue
Expand All @@ -91,7 +95,7 @@ func (azappcfg *AzureAppConfiguration) loadKeyValues(ctx context.Context, settin
case featureFlagContentType:
continue // ignore feature flag while getting key value settings
case secretReferenceContentType:
continue // Todo - implement secret reference
keyVaultRefs[trimmedKey] = *setting.Value
default:
if isJsonContentType(setting.ContentType) {
var v any
Expand All @@ -106,6 +110,35 @@ func (azappcfg *AzureAppConfiguration) loadKeyValues(ctx context.Context, settin
}
}

var eg errgroup.Group
resolvedSecrets := sync.Map{}
if len(keyVaultRefs) > 0 {
if azappcfg.resolver.credential == nil && azappcfg.resolver.secretResolver == nil {
return fmt.Errorf("no Key Vault credential or SecretResolver configured")
}

for key, kvRef := range keyVaultRefs {
key, kvRef := key, kvRef
eg.Go(func() error {
resolvedSecret, err := azappcfg.resolver.resolveSecret(ctx, kvRef)
if err != nil {
return fmt.Errorf("fail to resolve the Key Vault reference '%s': %s", key, err.Error())
}
resolvedSecrets.Store(key, resolvedSecret)
return nil
})
}

if err := eg.Wait(); err != nil {
return err
}
}

resolvedSecrets.Range(func(key, value interface{}) bool {
kvSettings[key.(string)] = value.(string)
return true
})

azappcfg.keyValueETags = settingsResponse.eTags
azappcfg.keyValues = kvSettings

Expand Down
41 changes: 41 additions & 0 deletions azureappconfiguration_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ package azureappconfiguration

import (
"context"
"net/url"
"sync"
"testing"

"github.com/Azure/azure-sdk-for-go/sdk/azcore"
Expand Down Expand Up @@ -51,6 +53,45 @@ func TestLoadKeyValues_Success(t *testing.T) {
assert.Equal(t, map[string]interface{}{"jsonKey": "jsonValue"}, azappcfg.keyValues["key2"])
}

func TestLoadKeyValues_WithKeyVaultReferences(t *testing.T) {
ctx := context.Background()
mockSettingsClient := new(mockSettingsClient)
mockSecretResolver := new(mockSecretResolver)

kvReference := `{"uri":"https://myvault.vault.azure.net/secrets/mysecret"}`
mockResponse := &settingsResponse{
settings: []azappconfig.Setting{
{Key: toPtr("key1"), Value: toPtr("value1"), ContentType: toPtr("")},
{Key: toPtr("secret1"), Value: toPtr(kvReference), ContentType: toPtr(secretReferenceContentType)},
},
eTags: map[Selector][]*azcore.ETag{},
}

mockSettingsClient.On("getSettings", ctx).Return(mockResponse, nil)
expectedURL, _ := url.Parse("https://myvault.vault.azure.net/secrets/mysecret")
mockSecretResolver.On("ResolveSecret", ctx, *expectedURL).Return("resolved-secret", nil)

azappcfg := &AzureAppConfiguration{
clientManager: &configurationClientManager{
staticClient: &configurationClientWrapper{client: nil},
},
kvSelectors: deduplicateSelectors([]Selector{}),
keyValues: make(map[string]any),
resolver: &keyVaultReferenceResolver{
clients: sync.Map{},
secretResolver: mockSecretResolver,
},
}

err := azappcfg.loadKeyValues(ctx, mockSettingsClient)

assert.NoError(t, err)
assert.Equal(t, "value1", *azappcfg.keyValues["key1"].(*string))
assert.Equal(t, "resolved-secret", azappcfg.keyValues["secret1"])
mockSettingsClient.AssertExpectations(t)
mockSecretResolver.AssertExpectations(t)
}

func TestLoadKeyValues_WithTrimPrefix(t *testing.T) {
ctx := context.Background()
mockClient := new(mockSettingsClient)
Expand Down
3 changes: 2 additions & 1 deletion go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ go 1.23.2
require github.com/Azure/azure-sdk-for-go/sdk/data/azappconfig v1.2.0-beta.1

require (
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.8.2 // indirect
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.1.1 // indirect
github.com/davecgh/go-spew v1.1.1 // indirect
github.com/pmezard/go-difflib v1.0.0 // indirect
github.com/stretchr/objx v0.5.2 // indirect
Expand All @@ -15,6 +15,7 @@ require (
require (
github.com/Azure/azure-sdk-for-go/sdk/azcore v1.17.0
github.com/Azure/azure-sdk-for-go/sdk/internal v1.10.0 // indirect
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets v1.3.1
github.com/stretchr/testify v1.10.0
golang.org/x/net v0.35.0 // indirect
golang.org/x/sync v0.11.0
Expand Down
4 changes: 4 additions & 0 deletions go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,10 @@ github.com/Azure/azure-sdk-for-go/sdk/data/azappconfig v1.2.0-beta.1 h1:wSwUNd/T
github.com/Azure/azure-sdk-for-go/sdk/data/azappconfig v1.2.0-beta.1/go.mod h1:0uyyPvSFLlPiPzoTTLXN6wR9sFFqL6iPVd4FAugCooo=
github.com/Azure/azure-sdk-for-go/sdk/internal v1.10.0 h1:ywEEhmNahHBihViHepv3xPBn1663uRv2t2q/ESv9seY=
github.com/Azure/azure-sdk-for-go/sdk/internal v1.10.0/go.mod h1:iZDifYGJTIgIIkYRNWPENUnqx6bJ2xnSDFI2tjwZNuY=
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets v1.3.1 h1:mrkDCdkMsD4l9wjFGhofFHFrV43Y3c53RSLKOCJ5+Ow=
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets v1.3.1/go.mod h1:hPv41DbqMmnxcGralanA/kVlfdH5jv3T4LxGku2E1BY=
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.1.1 h1:bFWuoEKg+gImo7pvkiQEFAc8ocibADgXeiLAxWhWmkI=
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.1.1/go.mod h1:Vih/3yc6yac2JzU4hzpaDupBJP0Flaia9rXXrU8xyww=
github.com/AzureAD/microsoft-authentication-library-for-go v1.3.3 h1:H5xDQaE3XowWfhZRUpnfC+rGZMEVoSiji+b+/HFAPU4=
github.com/AzureAD/microsoft-authentication-library-for-go v1.3.3/go.mod h1:wP83P5OoQ5p6ip3ScPr0BAq0BvuPAvacpEuSzyouqAI=
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
Expand Down
142 changes: 142 additions & 0 deletions keyvault.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,142 @@
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT License.

package azureappconfiguration

import (
"context"
"encoding/json"
"fmt"
"net/url"
"strings"
"sync"

"github.com/Azure/azure-sdk-for-go/sdk/azcore"
"github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets"
)

// keyVaultReferenceResolver resolves Key Vault references to their actual secret values
type keyVaultReferenceResolver struct {
clients sync.Map // map[string]secretClient
secretResolver SecretResolver
credential azcore.TokenCredential
}

// secretMetadata contains parsed information about a Key Vault secret reference
type secretMetadata struct {
host string
name string
version string
}

// keyVaultReference represents the JSON structure of a Key Vault reference
type keyVaultReference struct {
URI string `json:"uri"`
}

type secretClient interface {
GetSecret(ctx context.Context, name string, version string, options *azsecrets.GetSecretOptions) (azsecrets.GetSecretResponse, error)
}

// resolveSecret resolves a Key Vault reference to its actual secret value
func (r *keyVaultReferenceResolver) resolveSecret(ctx context.Context, keyVaultReference string) (string, error) {
// vaultUri: "https://{keyVaultName}.vault.azure.net/secrets/{secretName}/{secretVersion}"
uri, err := r.extractKeyVaultURI(keyVaultReference)
if err != nil {
return "", fmt.Errorf("failed to parse Key Vault reference: %w", err)
}

// Parse the URI to get metadata (host, secret name, version)
secretMeta, err := parse(uri)
if err != nil {
return "", fmt.Errorf("invalid Key Vault reference: %w", err)
}

if r.secretResolver != nil {
vaultUri, err := url.Parse(uri)
if err != nil {
return "", fmt.Errorf("invalid Key Vault reference: %w", err)
}

return r.secretResolver.ResolveSecret(ctx, *vaultUri)
}

vaultURL := fmt.Sprintf("https://%s", secretMeta.host)
client, err := r.getSecretClient(vaultURL)
if err != nil {
return "", fmt.Errorf("failed to get Key Vault client: %w", err)
}

response, err := client.GetSecret(ctx, secretMeta.name, secretMeta.version, nil)
if err != nil {
return "", fmt.Errorf("failed to retrieve secret '%s' from Key Vault: %w", secretMeta.name, err)
}

if response.Value == nil {
return "", nil
}

return *response.Value, nil
}

// extractKeyVaultURI tries to parse a Key Vault reference in various formats
func (r *keyVaultReferenceResolver) extractKeyVaultURI(reference string) (string, error) {
// Valid Key Vault Reference setting value to parse
// {
// "uri":"https://{keyVaultName}.vault.azure.net/secrets/{secretName}/{secretVersion}"
// }
var kvRef keyVaultReference
if err := json.Unmarshal([]byte(reference), &kvRef); err == nil && kvRef.URI != "" {
return kvRef.URI, nil
}

return "", fmt.Errorf("invalid Key Vault reference format: %s", reference)
}

// getSecretClient gets or creates a client for the specified vault URL
func (r *keyVaultReferenceResolver) getSecretClient(vaultURL string) (secretClient, error) {
if client, ok := r.clients.Load(vaultURL); ok {
return client.(secretClient), nil
}

client, err := azsecrets.NewClient(vaultURL, r.credential, nil)
if err != nil {
return nil, fmt.Errorf("failed to create Key Vault client: %w", err)
}

// Store the client - if concurrent call already stored a client, use the existing one
storedClient, loaded := r.clients.LoadOrStore(vaultURL, client)
if loaded {
// Another goroutine already created and stored a client
return storedClient.(secretClient), nil
}

return client, nil
}

// parse extracts metadata from a Key Vault secret reference URI
func parse(reference string) (*secretMetadata, error) {
secretURL, err := url.Parse(reference)
if err != nil {
return nil, fmt.Errorf("invalid URL format: %w", err)
}

trimmedPath := strings.TrimPrefix(secretURL.Path, "/")
segments := strings.Split(trimmedPath, "/")

if len(segments) < 2 || strings.ToLower(segments[0]) != "secrets" || segments[1] == "" {
return nil, fmt.Errorf("invalid Key Vault URL format: %s", reference)
}

secretName := segments[1]
var secretVersion string
if len(segments) > 2 {
secretVersion = segments[2]
}

return &secretMetadata{
host: strings.ToLower(secretURL.Host),
name: secretName,
version: secretVersion,
}, nil
}
Loading