-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathseal.go
More file actions
90 lines (77 loc) · 2.14 KB
/
seal.go
File metadata and controls
90 lines (77 loc) · 2.14 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
package main
import (
"encoding/json"
"flag"
"fmt"
"os"
"github.com/superfly/tokenizer"
)
func wrapToken(token, sealKey, orgSlug, appSlug, targHost, targHdr string, debug bool) (string, error) {
inj := &tokenizer.InjectProcessorConfig{Token: token}
secret := tokenizer.Secret{
AuthConfig: tokenizer.NewFlySrcAuthConfig(
tokenizer.AllowlistFlySrcOrgs(orgSlug),
tokenizer.AllowlistFlySrcApps(appSlug),
),
ProcessorConfig: inj,
RequestValidators: []tokenizer.RequestValidator{
tokenizer.AllowHosts(targHost),
},
}
// If they request a specific header, fill it in verbatim.
// Otherwise the tokenizer will default to filling in "Authorization: Bearer <token>".
if targHdr != "" {
inj.Fmt = "%s"
inj.Dst = targHdr
}
if debug {
bs, err := json.Marshal(secret)
if err != nil {
return "", fmt.Errorf("json.Marshal: %w", err)
}
return string(bs), nil
}
return secret.Seal(sealKey)
}
func tryMain() error {
defSealKey := os.Getenv("SEAL_KEY")
sealKey := flag.String("sealkey", defSealKey, "tokenizer seal key, or from environment SEAL_KEY")
orgSlug := flag.String("org", "", "allowed org slug")
appSlug := flag.String("app", "", "allowed app slug")
targHost := flag.String("host", "", "target host")
targHdr := flag.String("header", "", "target header to fill. Defaults to the bearer authorization header")
debug := flag.Bool("debug", false, "show json of sealed secret")
prog := os.Args[0]
flag.Parse()
args := flag.Args()
if len(args) != 1 {
fmt.Printf("usage: %s [flags] token\n", prog)
flag.PrintDefaults()
return fmt.Errorf("token unspecified")
}
if *sealKey == "" {
return fmt.Errorf("sealkey unspecified")
}
if *orgSlug == "" {
return fmt.Errorf("org unspecified")
}
if *appSlug == "" {
return fmt.Errorf("app unspecified")
}
if *targHost == "" {
return fmt.Errorf("target host unspecified")
}
token := args[0]
wrapped, err := wrapToken(token, *sealKey, *orgSlug, *appSlug, *targHost, *targHdr, *debug)
if err != nil {
return fmt.Errorf("wrapToken: %w", err)
}
fmt.Printf("%s\n", wrapped)
return nil
}
func main() {
if err := tryMain(); err != nil {
fmt.Printf("%v\n", err)
os.Exit(1)
}
}