package main import ( "encoding/base64" helper "gitea.siteworxpro.com/Siteworxpro/aws-iam-anywhere-refresher/aws_signing_helper" "gitea.siteworxpro.com/Siteworxpro/aws-iam-anywhere-refresher/cmd" appConfig "gitea.siteworxpro.com/Siteworxpro/aws-iam-anywhere-refresher/config" "gitea.siteworxpro.com/Siteworxpro/aws-iam-anywhere-refresher/kube_client" "github.com/charmbracelet/log" "os" "time" ) func main() { l := log.NewWithOptions(os.Stderr, log.Options{ Level: log.DebugLevel, ReportTimestamp: true, TimeFormat: time.RFC3339, }) l.Info("Starting credentials refresh") client, err := kube_client.NewKubeClient() if err != nil { l.Error("Failed to create kubernetes client", "error", err) os.Exit(1) } c := appConfig.NewConfig() err = c.Valid() if err != nil { l.Error("Invalid configuration", "error", err) os.Exit(1) } privateKey, err := base64.StdEncoding.DecodeString(c.PrivateKey()) if err != nil { l.Error("Failed to decode private key", "error", err) os.Exit(1) } certificate, err := base64.StdEncoding.DecodeString(c.Certificate()) if err != nil { l.Error("Failed to decode certificate", "error", err) os.Exit(1) } credentials, err := cmd.Run(&helper.CredentialsOpts{ PrivateKeyId: string(privateKey), CertificateId: string(certificate), CertIdentifier: helper.CertIdentifier{ SystemStoreName: "MY", }, RoleArn: c.RoleArn(), ProfileArnStr: c.ProfileArn(), TrustAnchorArnStr: c.TrustedAnchor(), SessionDuration: int(c.SessionDuration()), }) if err != nil { l.Error("Failed to refresh credentials", "error", err) os.Exit(3) } l.Info("Credentials refreshed") _, err = client.GetSecret(c.Namespace(), c.Secret()) if err != nil { l.Error("Failed to get secret", "error", err) l.Info("secret doesn't exist, trying to create") create, err := client.CreateSecret(c.Namespace(), credentials.ToSecret(c.Secret())) if err != nil { l.Error("Failed to create secret", "error", err) os.Exit(1) } l.Info("Created secret", "created-time-stamp", create.CreationTimestamp.String()) } else { update, err := client.UpdateSecret(c.Namespace(), credentials.ToSecret(c.Secret())) if err != nil { l.Error("Failed to update secret", "error", err) os.Exit(1) } l.Info("Updated secret", "updated-time-stamp", update.CreationTimestamp.String()) } if c.RestartDeployments() { l.Info("Restarting deployments") deployments, err := client.ListDeployments(c.Namespace()) if err != nil { l.Error("Failed to list deployments", "error", err) os.Exit(1) } err = client.RestartDeployments(c.Namespace(), deployments) if err != nil { l.Error("Failed to restart deployments", "error", err) os.Exit(1) } } l.Info("Done!") os.Exit(0) }