我想在应用配置服务中检索 Azure Key Vault 引用的机密。在 dotnet 中它是小菜一碟,您只需添加 options.ConfigureKeyVault 并可以像这样检索秘密:
var credential = new DefaultAzureCredential();
var config = new ConfigurationBuilder().AddAzureAppConfiguration(options => {
options.Connect(
new Uri("https://app-cf.azconfig.io"), credential
).Select("*", "label");
options.ConfigureKeyVault(kv => {
kv.SetCredential(credential);
});
}).Build();
var test = config.GetValue<string>("secret_name");
但在 Python 中,我没有找到任何方法在 AzureAppConfigurationClient 中添加 KeyVault 处理,当您尝试检索 Key Vault 引用的机密时,您只需获取字符串:
'{"uri":"https://kv-name.vault.azure.net/secrets/SecretName"}'
.
我已经“解决”了这个写作功能:
import json
from pathlib import Path
from azure.appconfiguration import AzureAppConfigurationClient
from azure.identity import DefaultAzureCredential
from azure.keyvault.secrets import SecretClient
def get_appcf_label(base_url: str, label: str) -> dict:
"""Get app configurations for specified label."""
credential = DefaultAzureCredential()
client = AzureAppConfigurationClient(base_url, credential)
filtered_listed = client.list_configuration_settings(
key_filter="*", label_filter=label
)
config = dict()
for item in filtered_listed:
if (
item.content_type
== "application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8"
):
url_parts = Path(json.loads(item.value)["uri"]).parts
vault_url = "//".join(url_parts[:2])
kv_secret = url_parts[-1]
kv_client = SecretClient(vault_url, credential)
secret_val = kv_client.get_secret(kv_secret).value
config.update({item.key: secret_val})
else:
config.update({item.key: item.value})
return config
我不喜欢这个解决方案,尤其是字符串解析,即使它正在工作,但我想不出更好的方法来做到这一点。您有任何想法如何以更智能/更清洁的方式进行操作吗?