Last active
July 25, 2021 03:22
-
-
Save garystafford/59fc105d3a5791cc266b20f9700ef809 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package main | |
import ( | |
"encoding/json" | |
"github.com/aws/aws-sdk-go/aws" | |
"github.com/aws/aws-sdk-go/aws/awserr" | |
"github.com/aws/aws-sdk-go/service/secretsmanager" | |
"github.com/segmentio/kafka-go" | |
"github.com/segmentio/kafka-go/sasl/scram" | |
"time" | |
) | |
var ( | |
secretId = "AmazonMSK_credentials" | |
versionStage = "AWSCURRENT" | |
) | |
type credentials struct { | |
username string | |
password string | |
} | |
func getCredentials() credentials { | |
svc := secretsmanager.New(sess) | |
input := &secretsmanager.GetSecretValueInput{ | |
SecretId: aws.String(secretId), | |
VersionStage: aws.String(versionStage), | |
} | |
result, err := svc.GetSecretValue(input) | |
if err != nil { | |
if aerr, ok := err.(awserr.Error); ok { | |
switch aerr.Code() { | |
case secretsmanager.ErrCodeResourceNotFoundException: | |
log.Error(secretsmanager.ErrCodeResourceNotFoundException, aerr.Error()) | |
case secretsmanager.ErrCodeInvalidParameterException: | |
log.Error(secretsmanager.ErrCodeInvalidParameterException, aerr.Error()) | |
case secretsmanager.ErrCodeInvalidRequestException: | |
log.Error(secretsmanager.ErrCodeInvalidRequestException, aerr.Error()) | |
case secretsmanager.ErrCodeDecryptionFailure: | |
log.Error(secretsmanager.ErrCodeDecryptionFailure, aerr.Error()) | |
case secretsmanager.ErrCodeInternalServiceError: | |
log.Error(secretsmanager.ErrCodeInternalServiceError, aerr.Error()) | |
default: | |
log.Error(aerr.Error()) | |
} | |
} else { | |
// Print the error, cast err to awserr.Error to get the Code and | |
// Message from an error. | |
log.Error(err.Error()) | |
} | |
} | |
kmsCredentials := map[string]string{} | |
if err := json.Unmarshal([]byte(*result.SecretString), &kmsCredentials); err != nil { | |
log.Panic(err.Error()) | |
} | |
return credentials{ | |
username: kmsCredentials["username"], | |
password: kmsCredentials["password"], | |
} | |
} | |
func saslScramDialer() *kafka.Dialer { | |
credentials := getCredentials() | |
mechanism, err := scram.Mechanism( | |
scram.SHA512, | |
credentials.username, | |
credentials.password, | |
) | |
if err != nil { | |
log.Fatal(err) | |
} | |
config := tlsConfig() | |
dialer := &kafka.Dialer{ | |
Timeout: 10 * time.Second, | |
DualStack: true, | |
TLS: config, | |
SASLMechanism: mechanism, | |
} | |
return dialer | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment