Skip to content

Commit f935e9e

Browse files
Merge pull request #1186 from bryan-cox/CNTRLPLANE-112
CNTRLPLANE-112: Remove ARO HCP MIv2 Authentication
2 parents e23f7e6 + f39f0bd commit f935e9e

File tree

4 files changed

+1
-138
lines changed

4 files changed

+1
-138
lines changed

go.mod

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,6 @@ require (
2323
github.com/IBM/platform-services-go-sdk v0.55.0
2424
github.com/aws/aws-sdk-go v1.50.35
2525
github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc
26-
github.com/fsnotify/fsnotify v1.8.0
2726
github.com/ghodss/yaml v1.0.0
2827
github.com/golang-jwt/jwt v3.2.2+incompatible
2928
github.com/google/go-cmp v0.6.0
@@ -82,6 +81,7 @@ require (
8281
github.com/evanphx/json-patch v4.12.0+incompatible // indirect
8382
github.com/felixge/fgprof v0.9.4 // indirect
8483
github.com/felixge/httpsnoop v1.0.4 // indirect
84+
github.com/fsnotify/fsnotify v1.8.0 // indirect
8585
github.com/fxamacker/cbor/v2 v2.7.0 // indirect
8686
github.com/go-logr/logr v1.4.2 // indirect
8787
github.com/go-logr/stdr v1.2.2 // indirect

pkg/filewatcher/filewatcher.go

Lines changed: 0 additions & 67 deletions
This file was deleted.

pkg/storage/azure/azure.go

Lines changed: 0 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,6 @@ import (
3939
regopclient "github.com/openshift/cluster-image-registry-operator/pkg/client"
4040
"github.com/openshift/cluster-image-registry-operator/pkg/defaults"
4141
"github.com/openshift/cluster-image-registry-operator/pkg/envvar"
42-
"github.com/openshift/cluster-image-registry-operator/pkg/filewatcher"
4342
"github.com/openshift/cluster-image-registry-operator/pkg/storage/azure/azureclient"
4443
"github.com/openshift/cluster-image-registry-operator/pkg/storage/util"
4544
)
@@ -372,7 +371,6 @@ func (d *driver) storageAccountsClient(cfg *Azure, environment autorestazure.Env
372371
cred azcore.TokenCredential
373372
err error
374373
)
375-
managedIdentityClientID := os.Getenv("ARO_HCP_MI_CLIENT_ID")
376374
userAssignedIdentityCredentialsFilePath := os.Getenv("MANAGED_AZURE_HCP_CREDENTIALS_FILE_PATH")
377375
if userAssignedIdentityCredentialsFilePath != "" {
378376
// UserAssignedIdentityCredentials for managed Azure HCP
@@ -384,39 +382,6 @@ func (d *driver) storageAccountsClient(cfg *Azure, environment autorestazure.Env
384382
if err != nil {
385383
return storage.AccountsClient{}, err
386384
}
387-
} else if managedIdentityClientID != "" {
388-
// Managed Identity Override for ARO HCP
389-
klog.V(2).Info("Using client certification Azure authentication for ARO HCP")
390-
options := &azidentity.ClientCertificateCredentialOptions{
391-
ClientOptions: azcore.ClientOptions{
392-
Cloud: cloudConfig,
393-
},
394-
SendCertificateChain: true,
395-
}
396-
397-
tenantID := os.Getenv("ARO_HCP_TENANT_ID")
398-
certPath := os.Getenv("ARO_HCP_CLIENT_CERTIFICATE_PATH")
399-
400-
certData, err := os.ReadFile(certPath)
401-
if err != nil {
402-
return storage.AccountsClient{}, fmt.Errorf(`failed to read certificate file "%s": %v`, certPath, err)
403-
}
404-
405-
certs, key, err := azidentity.ParseCertificates(certData, []byte{})
406-
if err != nil {
407-
return storage.AccountsClient{}, fmt.Errorf(`failed to parse certificate data "%s": %v`, certPath, err)
408-
}
409-
410-
// Watch the certificate for changes; if the certificate changes, the pod will be restarted
411-
err = filewatcher.WatchFileForChanges(certPath)
412-
if err != nil {
413-
return storage.AccountsClient{}, err
414-
}
415-
416-
cred, err = azidentity.NewClientCertificateCredential(tenantID, managedIdentityClientID, certs, key, options)
417-
if err != nil {
418-
return storage.AccountsClient{}, err
419-
}
420385
} else if strings.TrimSpace(cfg.ClientSecret) == "" {
421386
options := azidentity.WorkloadIdentityCredentialOptions{
422387
ClientOptions: azcore.ClientOptions{

pkg/storage/azure/azureclient/azureclient.go

Lines changed: 0 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,6 @@ import (
2222
autorestazure "github.com/Azure/go-autorest/autorest/azure"
2323
"github.com/Azure/go-autorest/autorest/to"
2424
"github.com/Azure/msi-dataplane/pkg/dataplane"
25-
"github.com/openshift/cluster-image-registry-operator/pkg/filewatcher"
2625
"k8s.io/klog/v2"
2726
)
2827

@@ -104,7 +103,6 @@ func (c *Client) getCreds(ctx context.Context) (azcore.TokenCredential, error) {
104103
err error
105104
creds azcore.TokenCredential
106105
)
107-
managedIdentityClientID := os.Getenv("ARO_HCP_MI_CLIENT_ID")
108106
userAssignedIdentityCredentialsFilePath := os.Getenv("MANAGED_AZURE_HCP_CREDENTIALS_FILE_PATH")
109107
if userAssignedIdentityCredentialsFilePath != "" {
110108
// UserAssignedIdentityCredentials for managed Azure HCP
@@ -116,39 +114,6 @@ func (c *Client) getCreds(ctx context.Context) (azcore.TokenCredential, error) {
116114
if err != nil {
117115
return nil, err
118116
}
119-
} else if managedIdentityClientID != "" {
120-
// Managed Identity Override for ARO HCP
121-
klog.V(2).Info("Using client certification Azure authentication for ARO HCP")
122-
options := &azidentity.ClientCertificateCredentialOptions{
123-
ClientOptions: azcore.ClientOptions{
124-
Cloud: c.clientOpts.Cloud,
125-
},
126-
SendCertificateChain: true,
127-
}
128-
129-
tenantID := os.Getenv("ARO_HCP_TENANT_ID")
130-
certPath := os.Getenv("ARO_HCP_CLIENT_CERTIFICATE_PATH")
131-
132-
certData, err := os.ReadFile(certPath)
133-
if err != nil {
134-
return nil, fmt.Errorf(`failed to read certificate file "%s": %v`, certPath, err)
135-
}
136-
137-
certs, key, err := azidentity.ParseCertificates(certData, []byte{})
138-
if err != nil {
139-
return nil, fmt.Errorf(`failed to parse certificate data "%s": %v`, certPath, err)
140-
}
141-
142-
// Watch the certificate for changes; if the certificate changes, the pod will be restarted
143-
err = filewatcher.WatchFileForChanges(certPath)
144-
if err != nil {
145-
return nil, err
146-
}
147-
148-
creds, err = azidentity.NewClientCertificateCredential(tenantID, managedIdentityClientID, certs, key, options)
149-
if err != nil {
150-
return nil, err
151-
}
152117
} else if strings.TrimSpace(c.opts.ClientSecret) == "" {
153118
options := azidentity.WorkloadIdentityCredentialOptions{
154119
ClientOptions: *c.clientOpts,

0 commit comments

Comments
 (0)