-
Notifications
You must be signed in to change notification settings - Fork 39
Expand file tree
/
Copy pathcreate.go
More file actions
203 lines (173 loc) · 7.25 KB
/
create.go
File metadata and controls
203 lines (173 loc) · 7.25 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
package create
import (
"context"
"encoding/json"
"fmt"
"github.com/stackitcloud/stackit-cli/internal/pkg/types"
"github.com/goccy/go-yaml"
"github.com/spf13/cobra"
"github.com/stackitcloud/stackit-cli/internal/pkg/args"
cliErr "github.com/stackitcloud/stackit-cli/internal/pkg/errors"
"github.com/stackitcloud/stackit-cli/internal/pkg/services/kms/client"
"github.com/stackitcloud/stackit-cli/internal/pkg/spinner"
"github.com/stackitcloud/stackit-cli/internal/pkg/examples"
"github.com/stackitcloud/stackit-cli/internal/pkg/flags"
"github.com/stackitcloud/stackit-cli/internal/pkg/globalflags"
"github.com/stackitcloud/stackit-cli/internal/pkg/print"
"github.com/stackitcloud/stackit-cli/internal/pkg/utils"
"github.com/stackitcloud/stackit-sdk-go/services/kms"
"github.com/stackitcloud/stackit-sdk-go/services/kms/wait"
)
const (
keyRingIdFlag = "keyring-id"
algorithmFlag = "algorithm"
descriptionFlag = "description"
displayNameFlag = "name"
purposeFlag = "purpose"
protectionFlag = "protection"
)
type inputModel struct {
*globalflags.GlobalFlagModel
KeyRingId string
Algorithm *string
Description *string
Name *string
Purpose *string
Protection *string
}
func NewCmd(params *types.CmdParams) *cobra.Command {
cmd := &cobra.Command{
Use: "create",
Short: "Creates a KMS wrapping key",
Long: "Creates a KMS wrapping key.",
Args: args.NoArgs,
Example: examples.Build(
examples.NewExample(
`Create a symmetric (RSA + AES) KMS wrapping key with name "my-wrapping-key-name" in key ring with ID "my-keyring-id"`,
`$ stackit beta kms wrapping-key create --keyring-id "my-keyring-id" --algorithm "rsa_2048_oaep_sha256_aes_256_key_wrap" --name "my-wrapping-key-name" --purpose "wrap_symmetric_key" --protection "software"`),
examples.NewExample(
`Create an asymmetric (RSA) KMS wrapping key with name "my-wrapping-key-name" in key ring with ID "my-keyring-id"`,
`$ stackit beta kms wrapping-key create --keyring-id "my-keyring-id" --algorithm "rsa_3072_oaep_sha256" --name "my-wrapping-key-name" --purpose "wrap_asymmetric_key" --protection "software"`),
),
RunE: func(cmd *cobra.Command, _ []string) error {
ctx := context.Background()
model, err := parseInput(params.Printer, cmd)
if err != nil {
return err
}
// Configure API client
apiClient, err := client.ConfigureClient(params.Printer, params.CliVersion)
if err != nil {
return err
}
err = params.Printer.PromptForConfirmation("Are you sure you want to create a KMS wrapping key?")
if err != nil {
return err
}
// Call API
req, _ := buildRequest(ctx, model, apiClient)
wrappingKey, err := req.Execute()
if err != nil {
return fmt.Errorf("create KMS wrapping key: %w", err)
}
// Wait for async operation, if async mode not enabled
if !model.Async {
s := spinner.New(params.Printer)
s.Start("Creating wrapping key")
_, err = wait.CreateWrappingKeyWaitHandler(ctx, apiClient, model.ProjectId, model.Region, *wrappingKey.KeyRingId, *wrappingKey.Id).WaitWithContext(ctx)
if err != nil {
return fmt.Errorf("wait for KMS wrapping key creation: %w", err)
}
s.Stop()
}
return outputResult(params.Printer, model, wrappingKey)
},
}
configureFlags(cmd)
return cmd
}
func parseInput(p *print.Printer, cmd *cobra.Command) (*inputModel, error) {
globalFlags := globalflags.Parse(p, cmd)
if globalFlags.ProjectId == "" {
return nil, &cliErr.ProjectIdError{}
}
// All values are mandatory strings. No additional type check required.
model := inputModel{
GlobalFlagModel: globalFlags,
KeyRingId: flags.FlagToStringValue(p, cmd, keyRingIdFlag),
Algorithm: flags.FlagToStringPointer(p, cmd, algorithmFlag),
Name: flags.FlagToStringPointer(p, cmd, displayNameFlag),
Description: flags.FlagToStringPointer(p, cmd, descriptionFlag),
Purpose: flags.FlagToStringPointer(p, cmd, purposeFlag),
Protection: flags.FlagToStringPointer(p, cmd, protectionFlag),
}
p.DebugInputModel(model)
return &model, nil
}
type kmsWrappingKeyClient interface {
CreateWrappingKey(ctx context.Context, projectId string, regionId string, keyRingId string) kms.ApiCreateWrappingKeyRequest
}
func buildRequest(ctx context.Context, model *inputModel, apiClient kmsWrappingKeyClient) (kms.ApiCreateWrappingKeyRequest, error) {
req := apiClient.CreateWrappingKey(ctx, model.ProjectId, model.Region, model.KeyRingId)
req = req.CreateWrappingKeyPayload(kms.CreateWrappingKeyPayload{
DisplayName: model.Name,
Description: model.Description,
Algorithm: kms.CreateWrappingKeyPayloadGetAlgorithmAttributeType(model.Algorithm),
Purpose: kms.CreateWrappingKeyPayloadGetPurposeAttributeType(model.Purpose),
Protection: kms.CreateWrappingKeyPayloadGetProtectionAttributeType(model.Protection),
})
return req, nil
}
func outputResult(p *print.Printer, model *inputModel, resp *kms.WrappingKey) error {
if resp == nil {
return fmt.Errorf("response is nil")
}
switch model.OutputFormat {
case print.JSONOutputFormat:
details, err := json.MarshalIndent(resp, "", " ")
if err != nil {
return fmt.Errorf("marshal KMS wrapping key: %w", err)
}
p.Outputln(string(details))
case print.YAMLOutputFormat:
details, err := yaml.MarshalWithOptions(resp, yaml.IndentSequence(true), yaml.UseJSONMarshaler())
if err != nil {
return fmt.Errorf("marshal KMS wrapping key: %w", err)
}
p.Outputln(string(details))
default:
operationState := "Created"
if model.Async {
operationState = "Triggered creation of"
}
p.Outputf("%s wrapping key. Wrapping key ID: %s\n", operationState, utils.PtrString(resp.Id))
}
return nil
}
func configureFlags(cmd *cobra.Command) {
// Algorithm
var algorithmFlagOptions []string
for _, val := range kms.AllowedWrappingAlgorithmEnumValues {
algorithmFlagOptions = append(algorithmFlagOptions, string(val))
}
cmd.Flags().Var(flags.EnumFlag(false, "", algorithmFlagOptions...), algorithmFlag, fmt.Sprintf("En-/Decryption / signing algorithm. Possible values: %q", algorithmFlagOptions))
// Purpose
var purposeFlagOptions []string
for _, val := range kms.AllowedWrappingPurposeEnumValues {
purposeFlagOptions = append(purposeFlagOptions, string(val))
}
cmd.Flags().Var(flags.EnumFlag(false, "", purposeFlagOptions...), purposeFlag, fmt.Sprintf("Purpose of the wrapping key. Possible values: %q", purposeFlagOptions))
// Protection
// backend was deprectaed in /v1beta, but protection is a required attribute with value "software"
var protectionFlagOptions []string
for _, val := range kms.AllowedProtectionEnumValues {
protectionFlagOptions = append(protectionFlagOptions, string(val))
}
cmd.Flags().Var(flags.EnumFlag(false, "", protectionFlagOptions...), protectionFlag, fmt.Sprintf("The underlying system that is responsible for protecting the wrapping key material. Possible values: %q", purposeFlagOptions))
// All further non Enum Flags
cmd.Flags().Var(flags.UUIDFlag(), keyRingIdFlag, "ID of the KMS key ring")
cmd.Flags().String(displayNameFlag, "", "The display name to distinguish multiple wrapping keys")
cmd.Flags().String(descriptionFlag, "", "Optional description of the wrapping key")
err := flags.MarkFlagsRequired(cmd, keyRingIdFlag, algorithmFlag, purposeFlag, displayNameFlag, protectionFlag)
cobra.CheckErr(err)
}