-
Notifications
You must be signed in to change notification settings - Fork 6
Expand file tree
/
Copy pathkeyVaultKeyValueAdapter.ts
More file actions
60 lines (52 loc) · 2.82 KB
/
keyVaultKeyValueAdapter.ts
File metadata and controls
60 lines (52 loc) · 2.82 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT license.
import { ConfigurationSetting, isSecretReference, parseSecretReference } from "@azure/app-configuration";
import { IKeyValueAdapter } from "../keyValueAdapter.js";
import { AzureKeyVaultSecretProvider } from "./keyVaultSecretProvider.js";
import { KeyVaultOptions } from "./keyVaultOptions.js";
import { RefreshTimer } from "../refresh/refreshTimer.js";
import { ArgumentError, KeyVaultReferenceError } from "../common/errors.js";
import { KeyVaultReferenceErrorMessages } from "../common/errorMessages.js";
import { KeyVaultSecretIdentifier, parseKeyVaultSecretIdentifier } from "@azure/keyvault-secrets";
import { isRestError } from "@azure/core-rest-pipeline";
import { AuthenticationError } from "@azure/identity";
export class AzureKeyVaultKeyValueAdapter implements IKeyValueAdapter {
#keyVaultOptions: KeyVaultOptions | undefined;
#keyVaultSecretProvider: AzureKeyVaultSecretProvider;
constructor(keyVaultOptions: KeyVaultOptions | undefined, refreshTimer?: RefreshTimer) {
this.#keyVaultOptions = keyVaultOptions;
this.#keyVaultSecretProvider = new AzureKeyVaultSecretProvider(keyVaultOptions, refreshTimer);
}
canProcess(setting: ConfigurationSetting): boolean {
return isSecretReference(setting);
}
async processKeyValue(setting: ConfigurationSetting): Promise<[string, unknown]> {
if (!this.#keyVaultOptions) {
throw new ArgumentError(KeyVaultReferenceErrorMessages.KEY_VAULT_OPTIONS_UNDEFINED);
}
let secretIdentifier: KeyVaultSecretIdentifier;
try {
secretIdentifier = parseKeyVaultSecretIdentifier(
parseSecretReference(setting).value.secretId
);
} catch (error) {
throw new KeyVaultReferenceError(buildKeyVaultReferenceErrorMessage("Invalid Key Vault reference.", setting), { cause: error });
}
try {
const secretValue = await this.#keyVaultSecretProvider.getSecretValue(secretIdentifier);
return [setting.key, secretValue];
} catch (error) {
if (isRestError(error) || error instanceof AuthenticationError) {
throw new KeyVaultReferenceError(buildKeyVaultReferenceErrorMessage("Failed to resolve Key Vault reference.", setting, secretIdentifier.sourceId), { cause: error });
}
throw error;
}
}
async onChangeDetected(): Promise<void> {
this.#keyVaultSecretProvider.clearCache();
return;
}
}
function buildKeyVaultReferenceErrorMessage(message: string, setting: ConfigurationSetting, secretIdentifier?: string ): string {
return `${message} Key: '${setting.key}' Label: '${setting.label ?? ""}' ETag: '${setting.etag ?? ""}' ${secretIdentifier ? ` SecretIdentifier: '${secretIdentifier}'` : ""}`;
}