Merge pull request #10007 from hashicorp/fix_10000
[WIP] builder/amazon: Update logic for session credentials
This commit is contained in:
commit
2f4490fd73
|
@ -52,6 +52,7 @@ type FlatConfig struct {
|
|||
RawRegion *string `mapstructure:"region" required:"true" cty:"region" hcl:"region"`
|
||||
SecretKey *string `mapstructure:"secret_key" required:"true" cty:"secret_key" hcl:"secret_key"`
|
||||
SkipMetadataApiCheck *bool `mapstructure:"skip_metadata_api_check" cty:"skip_metadata_api_check" hcl:"skip_metadata_api_check"`
|
||||
SkipCredsValidation *bool `mapstructure:"skip_credential_validation" cty:"skip_credential_validation" hcl:"skip_credential_validation"`
|
||||
Token *string `mapstructure:"token" required:"false" cty:"token" hcl:"token"`
|
||||
VaultAWSEngine *common.FlatVaultAWSEngineOptions `mapstructure:"vault_aws_engine" required:"false" cty:"vault_aws_engine" hcl:"vault_aws_engine"`
|
||||
PollingConfig *common.FlatAWSPollingConfig `mapstructure:"aws_polling" required:"false" cty:"aws_polling" hcl:"aws_polling"`
|
||||
|
@ -130,6 +131,7 @@ func (*FlatConfig) HCL2Spec() map[string]hcldec.Spec {
|
|||
"region": &hcldec.AttrSpec{Name: "region", Type: cty.String, Required: false},
|
||||
"secret_key": &hcldec.AttrSpec{Name: "secret_key", Type: cty.String, Required: false},
|
||||
"skip_metadata_api_check": &hcldec.AttrSpec{Name: "skip_metadata_api_check", Type: cty.Bool, Required: false},
|
||||
"skip_credential_validation": &hcldec.AttrSpec{Name: "skip_credential_validation", Type: cty.Bool, Required: false},
|
||||
"token": &hcldec.AttrSpec{Name: "token", Type: cty.String, Required: false},
|
||||
"vault_aws_engine": &hcldec.BlockSpec{TypeName: "vault_aws_engine", Nested: hcldec.ObjectSpec((*common.FlatVaultAWSEngineOptions)(nil).HCL2Spec())},
|
||||
"aws_polling": &hcldec.BlockSpec{TypeName: "aws_polling", Nested: hcldec.ObjectSpec((*common.FlatAWSPollingConfig)(nil).HCL2Spec())},
|
||||
|
|
|
@ -9,19 +9,16 @@ import (
|
|||
"log"
|
||||
"net/http"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/aws/aws-sdk-go/aws"
|
||||
awsCredentials "github.com/aws/aws-sdk-go/aws/credentials"
|
||||
"github.com/aws/aws-sdk-go/aws/credentials/stscreds"
|
||||
"github.com/aws/aws-sdk-go/aws/session"
|
||||
"github.com/aws/aws-sdk-go/service/ec2"
|
||||
"github.com/aws/aws-sdk-go/service/ec2/ec2iface"
|
||||
"github.com/aws/aws-sdk-go/service/sts"
|
||||
awsbase "github.com/hashicorp/aws-sdk-go-base"
|
||||
cleanhttp "github.com/hashicorp/go-cleanhttp"
|
||||
"github.com/hashicorp/packer/template/interpolate"
|
||||
vaultapi "github.com/hashicorp/vault/api"
|
||||
homedir "github.com/mitchellh/go-homedir"
|
||||
)
|
||||
|
||||
// AssumeRoleConfig lets users set configuration options for assuming a special
|
||||
|
@ -148,6 +145,8 @@ type AccessConfig struct {
|
|||
// validation of the ami_regions configuration option. Default false.
|
||||
SkipValidation bool `mapstructure:"skip_region_validation" required:"false"`
|
||||
SkipMetadataApiCheck bool `mapstructure:"skip_metadata_api_check"`
|
||||
// Set to true if you want to skip validating AWS credentials before runtime.
|
||||
SkipCredsValidation bool `mapstructure:"skip_credential_validation"`
|
||||
// The access token to use. This is different from the
|
||||
// access key and secret key. If you're not sure what this is, then you
|
||||
// probably don't need it. This will also be read from the AWS_SESSION_TOKEN
|
||||
|
@ -309,169 +308,35 @@ func (c *AccessConfig) IsChinaCloud() bool {
|
|||
// endpoints. GetCredentials also validates the credentials and the ability to
|
||||
// assume a role or will return an error if unsuccessful.
|
||||
func (c *AccessConfig) GetCredentials(config *aws.Config) (*awsCredentials.Credentials, error) {
|
||||
|
||||
sharedCredentialsFilename, err := homedir.Expand(c.CredsFilename)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("error expanding shared credentials filename: %w", err)
|
||||
// Reload values into the config used by the Packer-Terraform shared SDK
|
||||
awsbaseConfig := &awsbase.Config{
|
||||
AccessKey: c.AccessKey,
|
||||
AssumeRoleARN: c.AssumeRole.AssumeRoleARN,
|
||||
AssumeRoleDurationSeconds: c.AssumeRole.AssumeRoleDurationSeconds,
|
||||
AssumeRoleExternalID: c.AssumeRole.AssumeRoleExternalID,
|
||||
AssumeRolePolicy: c.AssumeRole.AssumeRolePolicy,
|
||||
AssumeRolePolicyARNs: c.AssumeRole.AssumeRolePolicyARNs,
|
||||
AssumeRoleSessionName: c.AssumeRole.AssumeRoleSessionName,
|
||||
AssumeRoleTags: c.AssumeRole.AssumeRoleTags,
|
||||
AssumeRoleTransitiveTagKeys: c.AssumeRole.AssumeRoleTransitiveTagKeys,
|
||||
CredsFilename: c.CredsFilename,
|
||||
DebugLogging: false,
|
||||
// TODO: implement for Packer
|
||||
// IamEndpoint: c.Endpoints["iam"],
|
||||
Insecure: c.InsecureSkipTLSVerify,
|
||||
MaxRetries: c.MaxRetries,
|
||||
Profile: c.ProfileName,
|
||||
Region: c.RawRegion,
|
||||
SecretKey: c.SecretKey,
|
||||
SkipCredsValidation: c.SkipCredsValidation,
|
||||
SkipMetadataApiCheck: c.SkipMetadataApiCheck,
|
||||
// TODO: implement for Packer
|
||||
// SkipRequestingAccountId: c.SkipRequestingAccountId,
|
||||
// StsEndpoint: c.Endpoints["sts"],
|
||||
Token: c.Token,
|
||||
}
|
||||
|
||||
// Create a credentials chain that tries to load credentials from various
|
||||
// common sources: config vars, then local profiles.
|
||||
// Rather than using the default credentials chain, build a chain provider,
|
||||
// lazy-evaluated by aws-sdk
|
||||
providers := []awsCredentials.Provider{
|
||||
// Tries to set new credentials object using the given
|
||||
// access_key/secret_key/token. If they are not set, this will fail
|
||||
// over to the other credentials providers
|
||||
&awsCredentials.StaticProvider{Value: awsCredentials.Value{
|
||||
AccessKeyID: c.AccessKey,
|
||||
SecretAccessKey: c.SecretKey,
|
||||
SessionToken: c.Token,
|
||||
}},
|
||||
// Tries to load credentials from environment.
|
||||
&awsCredentials.EnvProvider{},
|
||||
// Tries to load credentials from local file.
|
||||
// If sharedCredentialsFilename is empty, the AWS sdk will use the
|
||||
// environment var AWS_SHARED_CREDENTIALS_FILE to determine the file
|
||||
// location, and if that's not set, AWS will use the default locations
|
||||
// of:
|
||||
// - Linux/Unix: $HOME/.aws/credentials
|
||||
// - Windows: %USERPROFILE%\.aws\credentials
|
||||
&awsCredentials.SharedCredentialsProvider{
|
||||
Filename: sharedCredentialsFilename,
|
||||
Profile: c.ProfileName,
|
||||
},
|
||||
}
|
||||
|
||||
// Validate the credentials before returning them
|
||||
creds := awsCredentials.NewChainCredentials(providers)
|
||||
cp, err := creds.Get()
|
||||
if err != nil {
|
||||
if IsAWSErr(err, "NoCredentialProviders", "") {
|
||||
creds, err = c.GetCredentialsFromSession()
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
return nil, fmt.Errorf("Error loading credentials for AWS Provider: %w", err)
|
||||
}
|
||||
|
||||
log.Printf("[INFO] AWS Auth provider used: %q", cp.ProviderName)
|
||||
|
||||
// In the "normal" flow (i.e. not assuming a role), we return here.
|
||||
if c.AssumeRole.AssumeRoleARN == "" {
|
||||
return creds, nil
|
||||
}
|
||||
|
||||
// create a config for the assume role session based off the config we
|
||||
// created for our main sessions
|
||||
assumeRoleAWSConfig := config.Copy()
|
||||
assumeRoleAWSConfig.CredentialsChainVerboseErrors = aws.Bool(true)
|
||||
|
||||
assumeRoleSession, err := session.NewSession(assumeRoleAWSConfig)
|
||||
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("error creating assume role session: %w", err)
|
||||
}
|
||||
|
||||
stsclient := sts.New(assumeRoleSession)
|
||||
assumeRoleProvider := &stscreds.AssumeRoleProvider{
|
||||
Client: stsclient,
|
||||
RoleARN: c.AssumeRole.AssumeRoleARN,
|
||||
}
|
||||
|
||||
if c.AssumeRole.AssumeRoleDurationSeconds > 0 {
|
||||
assumeRoleProvider.Duration = time.Duration(c.AssumeRole.AssumeRoleDurationSeconds) * time.Second
|
||||
}
|
||||
|
||||
if c.AssumeRole.AssumeRoleExternalID != "" {
|
||||
assumeRoleProvider.ExternalID = aws.String(c.AssumeRole.AssumeRoleExternalID)
|
||||
}
|
||||
|
||||
if c.AssumeRole.AssumeRolePolicy != "" {
|
||||
assumeRoleProvider.Policy = aws.String(c.AssumeRole.AssumeRolePolicy)
|
||||
}
|
||||
|
||||
if len(c.AssumeRole.AssumeRolePolicyARNs) > 0 {
|
||||
var policyDescriptorTypes []*sts.PolicyDescriptorType
|
||||
|
||||
for _, policyARN := range c.AssumeRole.AssumeRolePolicyARNs {
|
||||
policyDescriptorType := &sts.PolicyDescriptorType{
|
||||
Arn: aws.String(policyARN),
|
||||
}
|
||||
policyDescriptorTypes = append(policyDescriptorTypes, policyDescriptorType)
|
||||
}
|
||||
|
||||
assumeRoleProvider.PolicyArns = policyDescriptorTypes
|
||||
}
|
||||
|
||||
if c.AssumeRole.AssumeRoleSessionName != "" {
|
||||
assumeRoleProvider.RoleSessionName = c.AssumeRole.AssumeRoleSessionName
|
||||
}
|
||||
|
||||
if len(c.AssumeRole.AssumeRoleTags) > 0 {
|
||||
var tags []*sts.Tag
|
||||
|
||||
for k, v := range c.AssumeRole.AssumeRoleTags {
|
||||
tag := &sts.Tag{
|
||||
Key: aws.String(k),
|
||||
Value: aws.String(v),
|
||||
}
|
||||
tags = append(tags, tag)
|
||||
}
|
||||
|
||||
assumeRoleProvider.Tags = tags
|
||||
}
|
||||
|
||||
if len(c.AssumeRole.AssumeRoleTransitiveTagKeys) > 0 {
|
||||
assumeRoleProvider.TransitiveTagKeys = aws.StringSlice(c.AssumeRole.AssumeRoleTransitiveTagKeys)
|
||||
}
|
||||
|
||||
providers = []awsCredentials.Provider{assumeRoleProvider}
|
||||
|
||||
assumeRoleCreds := awsCredentials.NewChainCredentials(providers)
|
||||
|
||||
_, err = assumeRoleCreds.Get()
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("Unable to assume role: %w", err)
|
||||
}
|
||||
|
||||
return assumeRoleCreds, nil
|
||||
}
|
||||
|
||||
// GetCredentialsFromSession returns credentials derived from a session. A
|
||||
// session uses the AWS SDK Go chain of providers so may use a provider (e.g.,
|
||||
// ProcessProvider) that is not part of the Terraform provider chain.
|
||||
func (c *AccessConfig) GetCredentialsFromSession() (*awsCredentials.Credentials, error) {
|
||||
log.Printf("[INFO] Attempting to use session-derived credentials")
|
||||
// Avoid setting HTTPClient here as it will prevent the ec2metadata
|
||||
// client from automatically lowering the timeout to 1 second.
|
||||
options := &session.Options{
|
||||
Config: aws.Config{
|
||||
MaxRetries: aws.Int(0),
|
||||
Region: aws.String(c.RawRegion),
|
||||
},
|
||||
Profile: c.ProfileName,
|
||||
SharedConfigState: session.SharedConfigEnable,
|
||||
}
|
||||
|
||||
sess, err := session.NewSessionWithOptions(*options)
|
||||
if err != nil {
|
||||
if IsAWSErr(err, "NoCredentialProviders", "") {
|
||||
return nil, c.NewNoValidCredentialSourcesError(err)
|
||||
}
|
||||
return nil, fmt.Errorf("Error creating AWS session: %w", err)
|
||||
}
|
||||
|
||||
creds := sess.Config.Credentials
|
||||
cp, err := sess.Config.Credentials.Get()
|
||||
if err != nil {
|
||||
return nil, c.NewNoValidCredentialSourcesError(err)
|
||||
}
|
||||
|
||||
log.Printf("[INFO] Successfully derived credentials from session")
|
||||
log.Printf("[INFO] AWS Auth provider used: %q", cp.ProviderName)
|
||||
return creds, nil
|
||||
return awsbase.GetCredentials(awsbaseConfig)
|
||||
}
|
||||
|
||||
func (c *AccessConfig) GetCredsFromVault() error {
|
||||
|
|
|
@ -31,6 +31,7 @@ type FlatConfig struct {
|
|||
SecretKey *string `mapstructure:"secret_key" required:"true" cty:"secret_key" hcl:"secret_key"`
|
||||
SkipValidation *bool `mapstructure:"skip_region_validation" required:"false" cty:"skip_region_validation" hcl:"skip_region_validation"`
|
||||
SkipMetadataApiCheck *bool `mapstructure:"skip_metadata_api_check" cty:"skip_metadata_api_check" hcl:"skip_metadata_api_check"`
|
||||
SkipCredsValidation *bool `mapstructure:"skip_credential_validation" cty:"skip_credential_validation" hcl:"skip_credential_validation"`
|
||||
Token *string `mapstructure:"token" required:"false" cty:"token" hcl:"token"`
|
||||
VaultAWSEngine *common.FlatVaultAWSEngineOptions `mapstructure:"vault_aws_engine" required:"false" cty:"vault_aws_engine" hcl:"vault_aws_engine"`
|
||||
PollingConfig *common.FlatAWSPollingConfig `mapstructure:"aws_polling" required:"false" cty:"aws_polling" hcl:"aws_polling"`
|
||||
|
@ -175,6 +176,7 @@ func (*FlatConfig) HCL2Spec() map[string]hcldec.Spec {
|
|||
"secret_key": &hcldec.AttrSpec{Name: "secret_key", Type: cty.String, Required: false},
|
||||
"skip_region_validation": &hcldec.AttrSpec{Name: "skip_region_validation", Type: cty.Bool, Required: false},
|
||||
"skip_metadata_api_check": &hcldec.AttrSpec{Name: "skip_metadata_api_check", Type: cty.Bool, Required: false},
|
||||
"skip_credential_validation": &hcldec.AttrSpec{Name: "skip_credential_validation", Type: cty.Bool, Required: false},
|
||||
"token": &hcldec.AttrSpec{Name: "token", Type: cty.String, Required: false},
|
||||
"vault_aws_engine": &hcldec.BlockSpec{TypeName: "vault_aws_engine", Nested: hcldec.ObjectSpec((*common.FlatVaultAWSEngineOptions)(nil).HCL2Spec())},
|
||||
"aws_polling": &hcldec.BlockSpec{TypeName: "aws_polling", Nested: hcldec.ObjectSpec((*common.FlatAWSPollingConfig)(nil).HCL2Spec())},
|
||||
|
|
|
@ -74,6 +74,7 @@ type FlatConfig struct {
|
|||
SecretKey *string `mapstructure:"secret_key" required:"true" cty:"secret_key" hcl:"secret_key"`
|
||||
SkipValidation *bool `mapstructure:"skip_region_validation" required:"false" cty:"skip_region_validation" hcl:"skip_region_validation"`
|
||||
SkipMetadataApiCheck *bool `mapstructure:"skip_metadata_api_check" cty:"skip_metadata_api_check" hcl:"skip_metadata_api_check"`
|
||||
SkipCredsValidation *bool `mapstructure:"skip_credential_validation" cty:"skip_credential_validation" hcl:"skip_credential_validation"`
|
||||
Token *string `mapstructure:"token" required:"false" cty:"token" hcl:"token"`
|
||||
VaultAWSEngine *common.FlatVaultAWSEngineOptions `mapstructure:"vault_aws_engine" required:"false" cty:"vault_aws_engine" hcl:"vault_aws_engine"`
|
||||
PollingConfig *common.FlatAWSPollingConfig `mapstructure:"aws_polling" required:"false" cty:"aws_polling" hcl:"aws_polling"`
|
||||
|
@ -219,6 +220,7 @@ func (*FlatConfig) HCL2Spec() map[string]hcldec.Spec {
|
|||
"secret_key": &hcldec.AttrSpec{Name: "secret_key", Type: cty.String, Required: false},
|
||||
"skip_region_validation": &hcldec.AttrSpec{Name: "skip_region_validation", Type: cty.Bool, Required: false},
|
||||
"skip_metadata_api_check": &hcldec.AttrSpec{Name: "skip_metadata_api_check", Type: cty.Bool, Required: false},
|
||||
"skip_credential_validation": &hcldec.AttrSpec{Name: "skip_credential_validation", Type: cty.Bool, Required: false},
|
||||
"token": &hcldec.AttrSpec{Name: "token", Type: cty.String, Required: false},
|
||||
"vault_aws_engine": &hcldec.BlockSpec{TypeName: "vault_aws_engine", Nested: hcldec.ObjectSpec((*common.FlatVaultAWSEngineOptions)(nil).HCL2Spec())},
|
||||
"aws_polling": &hcldec.BlockSpec{TypeName: "aws_polling", Nested: hcldec.ObjectSpec((*common.FlatAWSPollingConfig)(nil).HCL2Spec())},
|
||||
|
|
|
@ -76,6 +76,7 @@ type FlatConfig struct {
|
|||
SecretKey *string `mapstructure:"secret_key" required:"true" cty:"secret_key" hcl:"secret_key"`
|
||||
SkipValidation *bool `mapstructure:"skip_region_validation" required:"false" cty:"skip_region_validation" hcl:"skip_region_validation"`
|
||||
SkipMetadataApiCheck *bool `mapstructure:"skip_metadata_api_check" cty:"skip_metadata_api_check" hcl:"skip_metadata_api_check"`
|
||||
SkipCredsValidation *bool `mapstructure:"skip_credential_validation" cty:"skip_credential_validation" hcl:"skip_credential_validation"`
|
||||
Token *string `mapstructure:"token" required:"false" cty:"token" hcl:"token"`
|
||||
VaultAWSEngine *common.FlatVaultAWSEngineOptions `mapstructure:"vault_aws_engine" required:"false" cty:"vault_aws_engine" hcl:"vault_aws_engine"`
|
||||
PollingConfig *common.FlatAWSPollingConfig `mapstructure:"aws_polling" required:"false" cty:"aws_polling" hcl:"aws_polling"`
|
||||
|
@ -199,6 +200,7 @@ func (*FlatConfig) HCL2Spec() map[string]hcldec.Spec {
|
|||
"secret_key": &hcldec.AttrSpec{Name: "secret_key", Type: cty.String, Required: false},
|
||||
"skip_region_validation": &hcldec.AttrSpec{Name: "skip_region_validation", Type: cty.Bool, Required: false},
|
||||
"skip_metadata_api_check": &hcldec.AttrSpec{Name: "skip_metadata_api_check", Type: cty.Bool, Required: false},
|
||||
"skip_credential_validation": &hcldec.AttrSpec{Name: "skip_credential_validation", Type: cty.Bool, Required: false},
|
||||
"token": &hcldec.AttrSpec{Name: "token", Type: cty.String, Required: false},
|
||||
"vault_aws_engine": &hcldec.BlockSpec{TypeName: "vault_aws_engine", Nested: hcldec.ObjectSpec((*common.FlatVaultAWSEngineOptions)(nil).HCL2Spec())},
|
||||
"aws_polling": &hcldec.BlockSpec{TypeName: "aws_polling", Nested: hcldec.ObjectSpec((*common.FlatAWSPollingConfig)(nil).HCL2Spec())},
|
||||
|
|
|
@ -31,6 +31,7 @@ type FlatConfig struct {
|
|||
SecretKey *string `mapstructure:"secret_key" required:"true" cty:"secret_key" hcl:"secret_key"`
|
||||
SkipValidation *bool `mapstructure:"skip_region_validation" required:"false" cty:"skip_region_validation" hcl:"skip_region_validation"`
|
||||
SkipMetadataApiCheck *bool `mapstructure:"skip_metadata_api_check" cty:"skip_metadata_api_check" hcl:"skip_metadata_api_check"`
|
||||
SkipCredsValidation *bool `mapstructure:"skip_credential_validation" cty:"skip_credential_validation" hcl:"skip_credential_validation"`
|
||||
Token *string `mapstructure:"token" required:"false" cty:"token" hcl:"token"`
|
||||
VaultAWSEngine *common.FlatVaultAWSEngineOptions `mapstructure:"vault_aws_engine" required:"false" cty:"vault_aws_engine" hcl:"vault_aws_engine"`
|
||||
PollingConfig *common.FlatAWSPollingConfig `mapstructure:"aws_polling" required:"false" cty:"aws_polling" hcl:"aws_polling"`
|
||||
|
@ -181,6 +182,7 @@ func (*FlatConfig) HCL2Spec() map[string]hcldec.Spec {
|
|||
"secret_key": &hcldec.AttrSpec{Name: "secret_key", Type: cty.String, Required: false},
|
||||
"skip_region_validation": &hcldec.AttrSpec{Name: "skip_region_validation", Type: cty.Bool, Required: false},
|
||||
"skip_metadata_api_check": &hcldec.AttrSpec{Name: "skip_metadata_api_check", Type: cty.Bool, Required: false},
|
||||
"skip_credential_validation": &hcldec.AttrSpec{Name: "skip_credential_validation", Type: cty.Bool, Required: false},
|
||||
"token": &hcldec.AttrSpec{Name: "token", Type: cty.String, Required: false},
|
||||
"vault_aws_engine": &hcldec.BlockSpec{TypeName: "vault_aws_engine", Nested: hcldec.ObjectSpec((*common.FlatVaultAWSEngineOptions)(nil).HCL2Spec())},
|
||||
"aws_polling": &hcldec.BlockSpec{TypeName: "aws_polling", Nested: hcldec.ObjectSpec((*common.FlatAWSPollingConfig)(nil).HCL2Spec())},
|
||||
|
|
1
go.mod
1
go.mod
|
@ -51,6 +51,7 @@ require (
|
|||
github.com/gopherjs/gopherjs v0.0.0-20181103185306-d547d1d9531e // indirect
|
||||
github.com/grpc-ecosystem/go-grpc-middleware v1.1.0
|
||||
github.com/hako/durafmt v0.0.0-20200710122514-c0fb7b4da026
|
||||
github.com/hashicorp/aws-sdk-go-base v0.6.0
|
||||
github.com/hashicorp/consul/api v1.4.0
|
||||
github.com/hashicorp/errwrap v1.0.0
|
||||
github.com/hashicorp/go-checkpoint v0.0.0-20171009173528-1545e56e46de
|
||||
|
|
3
go.sum
3
go.sum
|
@ -114,6 +114,7 @@ github.com/aws/aws-sdk-go v1.15.78/go.mod h1:E3/ieXAlvM0XWO57iftYVDLLvQ824smPP3A
|
|||
github.com/aws/aws-sdk-go v1.16.22/go.mod h1:KmX6BPdI08NWTb3/sm4ZGu5ShLoqVDhKgpiN924inxo=
|
||||
github.com/aws/aws-sdk-go v1.30.8 h1:4BHbh8K3qKmcnAgToZ2LShldRF9inoqIBccpCLNCy3I=
|
||||
github.com/aws/aws-sdk-go v1.30.8/go.mod h1:5zCpMtNQVjRREroY7sYe8lOMRSxkhG6MZveU8YkpAk0=
|
||||
github.com/aws/aws-sdk-go v1.31.9/go.mod h1:5zCpMtNQVjRREroY7sYe8lOMRSxkhG6MZveU8YkpAk0=
|
||||
github.com/aws/aws-sdk-go v1.34.26 h1:tw4nsSfGvCDnXt2xPe8NkxIrDui+asAWinMknPLEf80=
|
||||
github.com/aws/aws-sdk-go v1.34.26/go.mod h1:5zCpMtNQVjRREroY7sYe8lOMRSxkhG6MZveU8YkpAk0=
|
||||
github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973 h1:xJ4a3vCFaGF/jqvzLMYoU8P317H5OQ+Via4RmuPwCS0=
|
||||
|
@ -282,6 +283,8 @@ github.com/grpc-ecosystem/go-grpc-middleware v1.1.0 h1:THDBEeQ9xZ8JEaCLyLQqXMMdR
|
|||
github.com/grpc-ecosystem/go-grpc-middleware v1.1.0/go.mod h1:f5nM7jw/oeRSadq3xCzHAvxcr8HZnzsqU6ILg/0NiiE=
|
||||
github.com/hako/durafmt v0.0.0-20200710122514-c0fb7b4da026 h1:BpJ2o0OR5FV7vrkDYfXYVJQeMNWa8RhklZOpW2ITAIQ=
|
||||
github.com/hako/durafmt v0.0.0-20200710122514-c0fb7b4da026/go.mod h1:5Scbynm8dF1XAPwIwkGPqzkM/shndPm79Jd1003hTjE=
|
||||
github.com/hashicorp/aws-sdk-go-base v0.6.0 h1:qmUbzM36msbBF59YctwuO5w0M2oNXjlilgKpnEhx1uw=
|
||||
github.com/hashicorp/aws-sdk-go-base v0.6.0/go.mod h1:2fRjWDv3jJBeN6mVWFHV6hFTNeFBx2gpDLQaZNxUVAY=
|
||||
github.com/hashicorp/consul/api v1.4.0 h1:jfESivXnO5uLdH650JU/6AnjRoHrLhULq0FnC3Kp9EY=
|
||||
github.com/hashicorp/consul/api v1.4.0/go.mod h1:xc8u05kyMa3Wjr9eEAsIAo3dg8+LywT5E/Cl7cNS5nU=
|
||||
github.com/hashicorp/consul/sdk v0.4.0 h1:zBtCfKJZcJDBvSCkQJch4ulp59m1rATFLKwNo/LYY30=
|
||||
|
|
|
@ -30,6 +30,7 @@ type FlatConfig struct {
|
|||
SecretKey *string `mapstructure:"secret_key" required:"true" cty:"secret_key" hcl:"secret_key"`
|
||||
SkipValidation *bool `mapstructure:"skip_region_validation" required:"false" cty:"skip_region_validation" hcl:"skip_region_validation"`
|
||||
SkipMetadataApiCheck *bool `mapstructure:"skip_metadata_api_check" cty:"skip_metadata_api_check" hcl:"skip_metadata_api_check"`
|
||||
SkipCredsValidation *bool `mapstructure:"skip_credential_validation" cty:"skip_credential_validation" hcl:"skip_credential_validation"`
|
||||
Token *string `mapstructure:"token" required:"false" cty:"token" hcl:"token"`
|
||||
VaultAWSEngine *common.FlatVaultAWSEngineOptions `mapstructure:"vault_aws_engine" required:"false" cty:"vault_aws_engine" hcl:"vault_aws_engine"`
|
||||
PollingConfig *common.FlatAWSPollingConfig `mapstructure:"aws_polling" required:"false" cty:"aws_polling" hcl:"aws_polling"`
|
||||
|
@ -82,6 +83,7 @@ func (*FlatConfig) HCL2Spec() map[string]hcldec.Spec {
|
|||
"secret_key": &hcldec.AttrSpec{Name: "secret_key", Type: cty.String, Required: false},
|
||||
"skip_region_validation": &hcldec.AttrSpec{Name: "skip_region_validation", Type: cty.Bool, Required: false},
|
||||
"skip_metadata_api_check": &hcldec.AttrSpec{Name: "skip_metadata_api_check", Type: cty.Bool, Required: false},
|
||||
"skip_credential_validation": &hcldec.AttrSpec{Name: "skip_credential_validation", Type: cty.Bool, Required: false},
|
||||
"token": &hcldec.AttrSpec{Name: "token", Type: cty.String, Required: false},
|
||||
"vault_aws_engine": &hcldec.BlockSpec{TypeName: "vault_aws_engine", Nested: hcldec.ObjectSpec((*common.FlatVaultAWSEngineOptions)(nil).HCL2Spec())},
|
||||
"aws_polling": &hcldec.BlockSpec{TypeName: "aws_polling", Nested: hcldec.ObjectSpec((*common.FlatAWSPollingConfig)(nil).HCL2Spec())},
|
||||
|
|
|
@ -0,0 +1,26 @@
|
|||
issues:
|
||||
max-per-linter: 0
|
||||
max-same-issues: 0
|
||||
|
||||
linters:
|
||||
disable-all: true
|
||||
enable:
|
||||
- deadcode
|
||||
- dogsled
|
||||
- errcheck
|
||||
- goconst
|
||||
- gofmt
|
||||
- gomnd
|
||||
- gosimple
|
||||
- ineffassign
|
||||
- interfacer
|
||||
- misspell
|
||||
- scopelint
|
||||
- staticcheck
|
||||
- structcheck
|
||||
- unconvert
|
||||
- unparam
|
||||
- unused
|
||||
- typecheck
|
||||
- varcheck
|
||||
- vet
|
|
@ -0,0 +1,53 @@
|
|||
# v0.6.0 (unreleased)
|
||||
|
||||
BREAKING CHANGES
|
||||
|
||||
* AWS error checking function have been moved to `tfawserr` package. `IsAWSErr` has been renamed to `ErrMessageContains` and `IsAWSErrExtended` has been renamed to `ErrMessageAndOrigErrContain`. #37
|
||||
|
||||
ENHANCEMENTS
|
||||
|
||||
* Additional AWS error checking function have been added to the `tfawserr` package - `ErrCodeEquals`, `ErrCodeContains` and `ErrStatusCodeEquals`.
|
||||
|
||||
# v0.5.0 (June 4, 2020)
|
||||
|
||||
BREAKING CHANGES
|
||||
|
||||
* Credential ordering has changed from static, environment, shared credentials, EC2 metadata, default AWS Go SDK (shared configuration, web identity, ECS, EC2 Metadata) to static, environment, shared credentials, default AWS Go SDK (shared configuration, web identity, ECS, EC2 Metadata). #20
|
||||
* The `AWS_METADATA_TIMEOUT` environment variable no longer has any effect as we now depend on the default AWS Go SDK EC2 Metadata client timeout of one second with two retries. #20 / #44
|
||||
|
||||
ENHANCEMENTS
|
||||
|
||||
* Always enable AWS shared configuration file support (no longer require `AWS_SDK_LOAD_CONFIG` environment variable) #38
|
||||
* Automatically expand `~` prefix for home directories in shared credentials filename handling #40
|
||||
* Support assume role duration, policy ARNs, tags, and transitive tag keys via configuration #39
|
||||
* Add `CannotAssumeRoleError` and `NoValidCredentialSourcesError` error types with helpers #42
|
||||
|
||||
BUG FIXES
|
||||
|
||||
* Properly use custom STS endpoint during AssumeRole API calls triggered by Terraform AWS Provider and S3 Backend configurations #32
|
||||
* Properly use custom EC2 metadata endpoint during API calls triggered by fallback credentials lookup #32
|
||||
* Prefer shared configuration handling over EC2 metadata #20
|
||||
* Prefer ECS credentials over EC2 metadata #20
|
||||
* Remove hardcoded AWS Provider messaging in error messages #31 / #42
|
||||
|
||||
# v0.4.0 (October 3, 2019)
|
||||
|
||||
BUG FIXES
|
||||
|
||||
* awsauth: fixed credentials retrieval, validation, and error handling
|
||||
|
||||
# v0.3.0 (February 26, 2019)
|
||||
|
||||
BUG FIXES
|
||||
|
||||
* session: Return error instead of logging with AWS Account ID lookup failure [GH-3]
|
||||
|
||||
# v0.2.0 (February 20, 2019)
|
||||
|
||||
ENHANCEMENTS
|
||||
|
||||
* validation: Add `ValidateAccountID` and `ValidateRegion` functions [GH-1]
|
||||
|
||||
# v0.1.0 (February 18, 2019)
|
||||
|
||||
* Initial release after split from github.com/terraform-providers/terraform-provider-aws
|
|
@ -0,0 +1,17 @@
|
|||
default: test lint
|
||||
|
||||
fmt:
|
||||
@echo "==> Fixing source code with gofmt..."
|
||||
gofmt -s -w ./
|
||||
|
||||
lint:
|
||||
@echo "==> Checking source code against linters..."
|
||||
@golangci-lint run ./...
|
||||
|
||||
test:
|
||||
go test -timeout=30s -parallel=4 ./...
|
||||
|
||||
tools:
|
||||
GO111MODULE=off go get -u github.com/golangci/golangci-lint/cmd/golangci-lint
|
||||
|
||||
.PHONY: lint test tools
|
|
@ -0,0 +1,373 @@
|
|||
Mozilla Public License Version 2.0
|
||||
==================================
|
||||
|
||||
1. Definitions
|
||||
--------------
|
||||
|
||||
1.1. "Contributor"
|
||||
means each individual or legal entity that creates, contributes to
|
||||
the creation of, or owns Covered Software.
|
||||
|
||||
1.2. "Contributor Version"
|
||||
means the combination of the Contributions of others (if any) used
|
||||
by a Contributor and that particular Contributor's Contribution.
|
||||
|
||||
1.3. "Contribution"
|
||||
means Covered Software of a particular Contributor.
|
||||
|
||||
1.4. "Covered Software"
|
||||
means Source Code Form to which the initial Contributor has attached
|
||||
the notice in Exhibit A, the Executable Form of such Source Code
|
||||
Form, and Modifications of such Source Code Form, in each case
|
||||
including portions thereof.
|
||||
|
||||
1.5. "Incompatible With Secondary Licenses"
|
||||
means
|
||||
|
||||
(a) that the initial Contributor has attached the notice described
|
||||
in Exhibit B to the Covered Software; or
|
||||
|
||||
(b) that the Covered Software was made available under the terms of
|
||||
version 1.1 or earlier of the License, but not also under the
|
||||
terms of a Secondary License.
|
||||
|
||||
1.6. "Executable Form"
|
||||
means any form of the work other than Source Code Form.
|
||||
|
||||
1.7. "Larger Work"
|
||||
means a work that combines Covered Software with other material, in
|
||||
a separate file or files, that is not Covered Software.
|
||||
|
||||
1.8. "License"
|
||||
means this document.
|
||||
|
||||
1.9. "Licensable"
|
||||
means having the right to grant, to the maximum extent possible,
|
||||
whether at the time of the initial grant or subsequently, any and
|
||||
all of the rights conveyed by this License.
|
||||
|
||||
1.10. "Modifications"
|
||||
means any of the following:
|
||||
|
||||
(a) any file in Source Code Form that results from an addition to,
|
||||
deletion from, or modification of the contents of Covered
|
||||
Software; or
|
||||
|
||||
(b) any new file in Source Code Form that contains any Covered
|
||||
Software.
|
||||
|
||||
1.11. "Patent Claims" of a Contributor
|
||||
means any patent claim(s), including without limitation, method,
|
||||
process, and apparatus claims, in any patent Licensable by such
|
||||
Contributor that would be infringed, but for the grant of the
|
||||
License, by the making, using, selling, offering for sale, having
|
||||
made, import, or transfer of either its Contributions or its
|
||||
Contributor Version.
|
||||
|
||||
1.12. "Secondary License"
|
||||
means either the GNU General Public License, Version 2.0, the GNU
|
||||
Lesser General Public License, Version 2.1, the GNU Affero General
|
||||
Public License, Version 3.0, or any later versions of those
|
||||
licenses.
|
||||
|
||||
1.13. "Source Code Form"
|
||||
means the form of the work preferred for making modifications.
|
||||
|
||||
1.14. "You" (or "Your")
|
||||
means an individual or a legal entity exercising rights under this
|
||||
License. For legal entities, "You" includes any entity that
|
||||
controls, is controlled by, or is under common control with You. For
|
||||
purposes of this definition, "control" means (a) the power, direct
|
||||
or indirect, to cause the direction or management of such entity,
|
||||
whether by contract or otherwise, or (b) ownership of more than
|
||||
fifty percent (50%) of the outstanding shares or beneficial
|
||||
ownership of such entity.
|
||||
|
||||
2. License Grants and Conditions
|
||||
--------------------------------
|
||||
|
||||
2.1. Grants
|
||||
|
||||
Each Contributor hereby grants You a world-wide, royalty-free,
|
||||
non-exclusive license:
|
||||
|
||||
(a) under intellectual property rights (other than patent or trademark)
|
||||
Licensable by such Contributor to use, reproduce, make available,
|
||||
modify, display, perform, distribute, and otherwise exploit its
|
||||
Contributions, either on an unmodified basis, with Modifications, or
|
||||
as part of a Larger Work; and
|
||||
|
||||
(b) under Patent Claims of such Contributor to make, use, sell, offer
|
||||
for sale, have made, import, and otherwise transfer either its
|
||||
Contributions or its Contributor Version.
|
||||
|
||||
2.2. Effective Date
|
||||
|
||||
The licenses granted in Section 2.1 with respect to any Contribution
|
||||
become effective for each Contribution on the date the Contributor first
|
||||
distributes such Contribution.
|
||||
|
||||
2.3. Limitations on Grant Scope
|
||||
|
||||
The licenses granted in this Section 2 are the only rights granted under
|
||||
this License. No additional rights or licenses will be implied from the
|
||||
distribution or licensing of Covered Software under this License.
|
||||
Notwithstanding Section 2.1(b) above, no patent license is granted by a
|
||||
Contributor:
|
||||
|
||||
(a) for any code that a Contributor has removed from Covered Software;
|
||||
or
|
||||
|
||||
(b) for infringements caused by: (i) Your and any other third party's
|
||||
modifications of Covered Software, or (ii) the combination of its
|
||||
Contributions with other software (except as part of its Contributor
|
||||
Version); or
|
||||
|
||||
(c) under Patent Claims infringed by Covered Software in the absence of
|
||||
its Contributions.
|
||||
|
||||
This License does not grant any rights in the trademarks, service marks,
|
||||
or logos of any Contributor (except as may be necessary to comply with
|
||||
the notice requirements in Section 3.4).
|
||||
|
||||
2.4. Subsequent Licenses
|
||||
|
||||
No Contributor makes additional grants as a result of Your choice to
|
||||
distribute the Covered Software under a subsequent version of this
|
||||
License (see Section 10.2) or under the terms of a Secondary License (if
|
||||
permitted under the terms of Section 3.3).
|
||||
|
||||
2.5. Representation
|
||||
|
||||
Each Contributor represents that the Contributor believes its
|
||||
Contributions are its original creation(s) or it has sufficient rights
|
||||
to grant the rights to its Contributions conveyed by this License.
|
||||
|
||||
2.6. Fair Use
|
||||
|
||||
This License is not intended to limit any rights You have under
|
||||
applicable copyright doctrines of fair use, fair dealing, or other
|
||||
equivalents.
|
||||
|
||||
2.7. Conditions
|
||||
|
||||
Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted
|
||||
in Section 2.1.
|
||||
|
||||
3. Responsibilities
|
||||
-------------------
|
||||
|
||||
3.1. Distribution of Source Form
|
||||
|
||||
All distribution of Covered Software in Source Code Form, including any
|
||||
Modifications that You create or to which You contribute, must be under
|
||||
the terms of this License. You must inform recipients that the Source
|
||||
Code Form of the Covered Software is governed by the terms of this
|
||||
License, and how they can obtain a copy of this License. You may not
|
||||
attempt to alter or restrict the recipients' rights in the Source Code
|
||||
Form.
|
||||
|
||||
3.2. Distribution of Executable Form
|
||||
|
||||
If You distribute Covered Software in Executable Form then:
|
||||
|
||||
(a) such Covered Software must also be made available in Source Code
|
||||
Form, as described in Section 3.1, and You must inform recipients of
|
||||
the Executable Form how they can obtain a copy of such Source Code
|
||||
Form by reasonable means in a timely manner, at a charge no more
|
||||
than the cost of distribution to the recipient; and
|
||||
|
||||
(b) You may distribute such Executable Form under the terms of this
|
||||
License, or sublicense it under different terms, provided that the
|
||||
license for the Executable Form does not attempt to limit or alter
|
||||
the recipients' rights in the Source Code Form under this License.
|
||||
|
||||
3.3. Distribution of a Larger Work
|
||||
|
||||
You may create and distribute a Larger Work under terms of Your choice,
|
||||
provided that You also comply with the requirements of this License for
|
||||
the Covered Software. If the Larger Work is a combination of Covered
|
||||
Software with a work governed by one or more Secondary Licenses, and the
|
||||
Covered Software is not Incompatible With Secondary Licenses, this
|
||||
License permits You to additionally distribute such Covered Software
|
||||
under the terms of such Secondary License(s), so that the recipient of
|
||||
the Larger Work may, at their option, further distribute the Covered
|
||||
Software under the terms of either this License or such Secondary
|
||||
License(s).
|
||||
|
||||
3.4. Notices
|
||||
|
||||
You may not remove or alter the substance of any license notices
|
||||
(including copyright notices, patent notices, disclaimers of warranty,
|
||||
or limitations of liability) contained within the Source Code Form of
|
||||
the Covered Software, except that You may alter any license notices to
|
||||
the extent required to remedy known factual inaccuracies.
|
||||
|
||||
3.5. Application of Additional Terms
|
||||
|
||||
You may choose to offer, and to charge a fee for, warranty, support,
|
||||
indemnity or liability obligations to one or more recipients of Covered
|
||||
Software. However, You may do so only on Your own behalf, and not on
|
||||
behalf of any Contributor. You must make it absolutely clear that any
|
||||
such warranty, support, indemnity, or liability obligation is offered by
|
||||
You alone, and You hereby agree to indemnify every Contributor for any
|
||||
liability incurred by such Contributor as a result of warranty, support,
|
||||
indemnity or liability terms You offer. You may include additional
|
||||
disclaimers of warranty and limitations of liability specific to any
|
||||
jurisdiction.
|
||||
|
||||
4. Inability to Comply Due to Statute or Regulation
|
||||
---------------------------------------------------
|
||||
|
||||
If it is impossible for You to comply with any of the terms of this
|
||||
License with respect to some or all of the Covered Software due to
|
||||
statute, judicial order, or regulation then You must: (a) comply with
|
||||
the terms of this License to the maximum extent possible; and (b)
|
||||
describe the limitations and the code they affect. Such description must
|
||||
be placed in a text file included with all distributions of the Covered
|
||||
Software under this License. Except to the extent prohibited by statute
|
||||
or regulation, such description must be sufficiently detailed for a
|
||||
recipient of ordinary skill to be able to understand it.
|
||||
|
||||
5. Termination
|
||||
--------------
|
||||
|
||||
5.1. The rights granted under this License will terminate automatically
|
||||
if You fail to comply with any of its terms. However, if You become
|
||||
compliant, then the rights granted under this License from a particular
|
||||
Contributor are reinstated (a) provisionally, unless and until such
|
||||
Contributor explicitly and finally terminates Your grants, and (b) on an
|
||||
ongoing basis, if such Contributor fails to notify You of the
|
||||
non-compliance by some reasonable means prior to 60 days after You have
|
||||
come back into compliance. Moreover, Your grants from a particular
|
||||
Contributor are reinstated on an ongoing basis if such Contributor
|
||||
notifies You of the non-compliance by some reasonable means, this is the
|
||||
first time You have received notice of non-compliance with this License
|
||||
from such Contributor, and You become compliant prior to 30 days after
|
||||
Your receipt of the notice.
|
||||
|
||||
5.2. If You initiate litigation against any entity by asserting a patent
|
||||
infringement claim (excluding declaratory judgment actions,
|
||||
counter-claims, and cross-claims) alleging that a Contributor Version
|
||||
directly or indirectly infringes any patent, then the rights granted to
|
||||
You by any and all Contributors for the Covered Software under Section
|
||||
2.1 of this License shall terminate.
|
||||
|
||||
5.3. In the event of termination under Sections 5.1 or 5.2 above, all
|
||||
end user license agreements (excluding distributors and resellers) which
|
||||
have been validly granted by You or Your distributors under this License
|
||||
prior to termination shall survive termination.
|
||||
|
||||
************************************************************************
|
||||
* *
|
||||
* 6. Disclaimer of Warranty *
|
||||
* ------------------------- *
|
||||
* *
|
||||
* Covered Software is provided under this License on an "as is" *
|
||||
* basis, without warranty of any kind, either expressed, implied, or *
|
||||
* statutory, including, without limitation, warranties that the *
|
||||
* Covered Software is free of defects, merchantable, fit for a *
|
||||
* particular purpose or non-infringing. The entire risk as to the *
|
||||
* quality and performance of the Covered Software is with You. *
|
||||
* Should any Covered Software prove defective in any respect, You *
|
||||
* (not any Contributor) assume the cost of any necessary servicing, *
|
||||
* repair, or correction. This disclaimer of warranty constitutes an *
|
||||
* essential part of this License. No use of any Covered Software is *
|
||||
* authorized under this License except under this disclaimer. *
|
||||
* *
|
||||
************************************************************************
|
||||
|
||||
************************************************************************
|
||||
* *
|
||||
* 7. Limitation of Liability *
|
||||
* -------------------------- *
|
||||
* *
|
||||
* Under no circumstances and under no legal theory, whether tort *
|
||||
* (including negligence), contract, or otherwise, shall any *
|
||||
* Contributor, or anyone who distributes Covered Software as *
|
||||
* permitted above, be liable to You for any direct, indirect, *
|
||||
* special, incidental, or consequential damages of any character *
|
||||
* including, without limitation, damages for lost profits, loss of *
|
||||
* goodwill, work stoppage, computer failure or malfunction, or any *
|
||||
* and all other commercial damages or losses, even if such party *
|
||||
* shall have been informed of the possibility of such damages. This *
|
||||
* limitation of liability shall not apply to liability for death or *
|
||||
* personal injury resulting from such party's negligence to the *
|
||||
* extent applicable law prohibits such limitation. Some *
|
||||
* jurisdictions do not allow the exclusion or limitation of *
|
||||
* incidental or consequential damages, so this exclusion and *
|
||||
* limitation may not apply to You. *
|
||||
* *
|
||||
************************************************************************
|
||||
|
||||
8. Litigation
|
||||
-------------
|
||||
|
||||
Any litigation relating to this License may be brought only in the
|
||||
courts of a jurisdiction where the defendant maintains its principal
|
||||
place of business and such litigation shall be governed by laws of that
|
||||
jurisdiction, without reference to its conflict-of-law provisions.
|
||||
Nothing in this Section shall prevent a party's ability to bring
|
||||
cross-claims or counter-claims.
|
||||
|
||||
9. Miscellaneous
|
||||
----------------
|
||||
|
||||
This License represents the complete agreement concerning the subject
|
||||
matter hereof. If any provision of this License is held to be
|
||||
unenforceable, such provision shall be reformed only to the extent
|
||||
necessary to make it enforceable. Any law or regulation which provides
|
||||
that the language of a contract shall be construed against the drafter
|
||||
shall not be used to construe this License against a Contributor.
|
||||
|
||||
10. Versions of the License
|
||||
---------------------------
|
||||
|
||||
10.1. New Versions
|
||||
|
||||
Mozilla Foundation is the license steward. Except as provided in Section
|
||||
10.3, no one other than the license steward has the right to modify or
|
||||
publish new versions of this License. Each version will be given a
|
||||
distinguishing version number.
|
||||
|
||||
10.2. Effect of New Versions
|
||||
|
||||
You may distribute the Covered Software under the terms of the version
|
||||
of the License under which You originally received the Covered Software,
|
||||
or under the terms of any subsequent version published by the license
|
||||
steward.
|
||||
|
||||
10.3. Modified Versions
|
||||
|
||||
If you create software not governed by this License, and you want to
|
||||
create a new license for such software, you may create and use a
|
||||
modified version of this License if you rename the license and remove
|
||||
any references to the name of the license steward (except to note that
|
||||
such modified license differs from this License).
|
||||
|
||||
10.4. Distributing Source Code Form that is Incompatible With Secondary
|
||||
Licenses
|
||||
|
||||
If You choose to distribute Source Code Form that is Incompatible With
|
||||
Secondary Licenses under the terms of this version of the License, the
|
||||
notice described in Exhibit B of this License must be attached.
|
||||
|
||||
Exhibit A - Source Code Form License Notice
|
||||
-------------------------------------------
|
||||
|
||||
This Source Code Form is subject to the terms of the Mozilla Public
|
||||
License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
|
||||
If it is not possible or desirable to put the notice in a particular
|
||||
file, then You may include the notice in a location (such as a LICENSE
|
||||
file in a relevant directory) where a recipient would be likely to look
|
||||
for such a notice.
|
||||
|
||||
You may add additional accurate notices of copyright ownership.
|
||||
|
||||
Exhibit B - "Incompatible With Secondary Licenses" Notice
|
||||
---------------------------------------------------------
|
||||
|
||||
This Source Code Form is "Incompatible With Secondary Licenses", as
|
||||
defined by the Mozilla Public License, v. 2.0.
|
|
@ -0,0 +1,40 @@
|
|||
# aws-sdk-go-base
|
||||
|
||||
An opinionated [AWS Go SDK](https://github.com/aws/aws-sdk-go) library for consistent authentication configuration between projects and additional helper functions. This library was originally started in [HashiCorp Terraform](https://github.com/hashicorp/terraform), migrated with the [Terraform AWS Provider](https://github.com/terraform-providers/terraform-provider-aws) during the Terraform 0.10 Core and Provider split, and now is offered as a separate library to allow easier dependency management in the Terraform ecosystem.
|
||||
|
||||
**NOTE:** This library is not currently designed or intended for usage outside the [Terraform S3 Backend](https://www.terraform.io/docs/backends/types/s3.html) and the [Terraform AWS Provider](https://www.terraform.io/docs/providers/aws/index.html).
|
||||
|
||||
## Requirements
|
||||
|
||||
- [Go](https://golang.org/doc/install) 1.13
|
||||
|
||||
## Development
|
||||
|
||||
Testing this project can be done through Go standard library functionality or if [Make](https://www.gnu.org/software/make/) is available:
|
||||
|
||||
```sh
|
||||
$ go test -v ./...
|
||||
# Optionally if Make is available; both run the same testing
|
||||
$ make test
|
||||
```
|
||||
|
||||
Code quality assurance uses [golangci-lint](https://github.com/golangci/golangci-lint):
|
||||
|
||||
```sh
|
||||
$ golangci-lint run ./...
|
||||
# Optionally if Make is available; both run the same linting
|
||||
$ make lint
|
||||
```
|
||||
|
||||
## Release Process
|
||||
|
||||
- Push a new `vX.Y.Z` tag to the repository
|
||||
- Close associated `vX.Y.Z` milestone
|
||||
- For Terraform AWS Provider: Renovate will automatically detect the update and submit a dependency pull request (usually within an hour)
|
||||
- For Terraform S3 Backend: Submit a new dependency pull request by running:
|
||||
|
||||
```sh
|
||||
go get github.com/hashicorp/aws-sdk-go-base@vX.Y.Z
|
||||
go mod tidy
|
||||
go mod vendor
|
||||
```
|
|
@ -0,0 +1,341 @@
|
|||
package awsbase
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
"log"
|
||||
"os"
|
||||
"time"
|
||||
|
||||
"github.com/aws/aws-sdk-go/aws"
|
||||
"github.com/aws/aws-sdk-go/aws/arn"
|
||||
"github.com/aws/aws-sdk-go/aws/awserr"
|
||||
awsCredentials "github.com/aws/aws-sdk-go/aws/credentials"
|
||||
"github.com/aws/aws-sdk-go/aws/credentials/ec2rolecreds"
|
||||
"github.com/aws/aws-sdk-go/aws/credentials/stscreds"
|
||||
"github.com/aws/aws-sdk-go/aws/ec2metadata"
|
||||
"github.com/aws/aws-sdk-go/aws/session"
|
||||
"github.com/aws/aws-sdk-go/service/iam"
|
||||
"github.com/aws/aws-sdk-go/service/sts"
|
||||
"github.com/hashicorp/aws-sdk-go-base/tfawserr"
|
||||
"github.com/hashicorp/go-cleanhttp"
|
||||
"github.com/hashicorp/go-multierror"
|
||||
homedir "github.com/mitchellh/go-homedir"
|
||||
)
|
||||
|
||||
const (
|
||||
// Default amount of time for EC2/ECS metadata client operations.
|
||||
// Keep this value low to prevent long delays in non-EC2/ECS environments.
|
||||
DefaultMetadataClientTimeout = 100 * time.Millisecond
|
||||
)
|
||||
|
||||
// GetAccountIDAndPartition gets the account ID and associated partition.
|
||||
func GetAccountIDAndPartition(iamconn *iam.IAM, stsconn *sts.STS, authProviderName string) (string, string, error) {
|
||||
var accountID, partition string
|
||||
var err, errors error
|
||||
|
||||
if authProviderName == ec2rolecreds.ProviderName {
|
||||
accountID, partition, err = GetAccountIDAndPartitionFromEC2Metadata()
|
||||
} else {
|
||||
accountID, partition, err = GetAccountIDAndPartitionFromIAMGetUser(iamconn)
|
||||
}
|
||||
if accountID != "" {
|
||||
return accountID, partition, nil
|
||||
}
|
||||
errors = multierror.Append(errors, err)
|
||||
|
||||
accountID, partition, err = GetAccountIDAndPartitionFromSTSGetCallerIdentity(stsconn)
|
||||
if accountID != "" {
|
||||
return accountID, partition, nil
|
||||
}
|
||||
errors = multierror.Append(errors, err)
|
||||
|
||||
accountID, partition, err = GetAccountIDAndPartitionFromIAMListRoles(iamconn)
|
||||
if accountID != "" {
|
||||
return accountID, partition, nil
|
||||
}
|
||||
errors = multierror.Append(errors, err)
|
||||
|
||||
return accountID, partition, errors
|
||||
}
|
||||
|
||||
// GetAccountIDAndPartitionFromEC2Metadata gets the account ID and associated
|
||||
// partition from EC2 metadata.
|
||||
func GetAccountIDAndPartitionFromEC2Metadata() (string, string, error) {
|
||||
log.Println("[DEBUG] Trying to get account information via EC2 Metadata")
|
||||
|
||||
cfg := &aws.Config{}
|
||||
setOptionalEndpoint(cfg)
|
||||
sess, err := session.NewSession(cfg)
|
||||
if err != nil {
|
||||
return "", "", fmt.Errorf("error creating EC2 Metadata session: %w", err)
|
||||
}
|
||||
|
||||
metadataClient := ec2metadata.New(sess)
|
||||
info, err := metadataClient.IAMInfo()
|
||||
if err != nil {
|
||||
// We can end up here if there's an issue with the instance metadata service
|
||||
// or if we're getting credentials from AdRoll's Hologram (in which case IAMInfo will
|
||||
// error out).
|
||||
err = fmt.Errorf("failed getting account information via EC2 Metadata IAM information: %w", err)
|
||||
log.Printf("[DEBUG] %s", err)
|
||||
return "", "", err
|
||||
}
|
||||
|
||||
return parseAccountIDAndPartitionFromARN(info.InstanceProfileArn)
|
||||
}
|
||||
|
||||
// GetAccountIDAndPartitionFromIAMGetUser gets the account ID and associated
|
||||
// partition from IAM.
|
||||
func GetAccountIDAndPartitionFromIAMGetUser(iamconn *iam.IAM) (string, string, error) {
|
||||
log.Println("[DEBUG] Trying to get account information via iam:GetUser")
|
||||
|
||||
output, err := iamconn.GetUser(&iam.GetUserInput{})
|
||||
if err != nil {
|
||||
// AccessDenied and ValidationError can be raised
|
||||
// if credentials belong to federated profile, so we ignore these
|
||||
if awsErr, ok := err.(awserr.Error); ok {
|
||||
switch awsErr.Code() {
|
||||
case "AccessDenied", "InvalidClientTokenId", "ValidationError":
|
||||
return "", "", nil
|
||||
}
|
||||
}
|
||||
err = fmt.Errorf("failed getting account information via iam:GetUser: %w", err)
|
||||
log.Printf("[DEBUG] %s", err)
|
||||
return "", "", err
|
||||
}
|
||||
|
||||
if output == nil || output.User == nil {
|
||||
err = errors.New("empty iam:GetUser response")
|
||||
log.Printf("[DEBUG] %s", err)
|
||||
return "", "", err
|
||||
}
|
||||
|
||||
return parseAccountIDAndPartitionFromARN(aws.StringValue(output.User.Arn))
|
||||
}
|
||||
|
||||
// GetAccountIDAndPartitionFromIAMListRoles gets the account ID and associated
|
||||
// partition from listing IAM roles.
|
||||
func GetAccountIDAndPartitionFromIAMListRoles(iamconn *iam.IAM) (string, string, error) {
|
||||
log.Println("[DEBUG] Trying to get account information via iam:ListRoles")
|
||||
|
||||
output, err := iamconn.ListRoles(&iam.ListRolesInput{
|
||||
MaxItems: aws.Int64(int64(1)),
|
||||
})
|
||||
if err != nil {
|
||||
err = fmt.Errorf("failed getting account information via iam:ListRoles: %w", err)
|
||||
log.Printf("[DEBUG] %s", err)
|
||||
return "", "", err
|
||||
}
|
||||
|
||||
if output == nil || len(output.Roles) < 1 {
|
||||
err = fmt.Errorf("empty iam:ListRoles response")
|
||||
log.Printf("[DEBUG] %s", err)
|
||||
return "", "", err
|
||||
}
|
||||
|
||||
return parseAccountIDAndPartitionFromARN(aws.StringValue(output.Roles[0].Arn))
|
||||
}
|
||||
|
||||
// GetAccountIDAndPartitionFromSTSGetCallerIdentity gets the account ID and associated
|
||||
// partition from STS caller identity.
|
||||
func GetAccountIDAndPartitionFromSTSGetCallerIdentity(stsconn *sts.STS) (string, string, error) {
|
||||
log.Println("[DEBUG] Trying to get account information via sts:GetCallerIdentity")
|
||||
|
||||
output, err := stsconn.GetCallerIdentity(&sts.GetCallerIdentityInput{})
|
||||
if err != nil {
|
||||
return "", "", fmt.Errorf("error calling sts:GetCallerIdentity: %w", err)
|
||||
}
|
||||
|
||||
if output == nil || output.Arn == nil {
|
||||
err = errors.New("empty sts:GetCallerIdentity response")
|
||||
log.Printf("[DEBUG] %s", err)
|
||||
return "", "", err
|
||||
}
|
||||
|
||||
return parseAccountIDAndPartitionFromARN(aws.StringValue(output.Arn))
|
||||
}
|
||||
|
||||
func parseAccountIDAndPartitionFromARN(inputARN string) (string, string, error) {
|
||||
arn, err := arn.Parse(inputARN)
|
||||
if err != nil {
|
||||
return "", "", fmt.Errorf("error parsing ARN (%s): %s", inputARN, err)
|
||||
}
|
||||
return arn.AccountID, arn.Partition, nil
|
||||
}
|
||||
|
||||
// GetCredentialsFromSession returns credentials derived from a session. A
|
||||
// session uses the AWS SDK Go chain of providers so may use a provider (e.g.,
|
||||
// ProcessProvider) that is not part of the Terraform provider chain.
|
||||
func GetCredentialsFromSession(c *Config) (*awsCredentials.Credentials, error) {
|
||||
log.Printf("[INFO] Attempting to use session-derived credentials")
|
||||
|
||||
// Avoid setting HTTPClient here as it will prevent the ec2metadata
|
||||
// client from automatically lowering the timeout to 1 second.
|
||||
options := &session.Options{
|
||||
Config: aws.Config{
|
||||
EndpointResolver: c.EndpointResolver(),
|
||||
MaxRetries: aws.Int(0),
|
||||
Region: aws.String(c.Region),
|
||||
},
|
||||
Profile: c.Profile,
|
||||
SharedConfigState: session.SharedConfigEnable,
|
||||
}
|
||||
|
||||
sess, err := session.NewSessionWithOptions(*options)
|
||||
if err != nil {
|
||||
if tfawserr.ErrCodeEquals(err, "NoCredentialProviders") {
|
||||
return nil, c.NewNoValidCredentialSourcesError(err)
|
||||
}
|
||||
return nil, fmt.Errorf("Error creating AWS session: %w", err)
|
||||
}
|
||||
|
||||
creds := sess.Config.Credentials
|
||||
cp, err := sess.Config.Credentials.Get()
|
||||
if err != nil {
|
||||
return nil, c.NewNoValidCredentialSourcesError(err)
|
||||
}
|
||||
|
||||
log.Printf("[INFO] Successfully derived credentials from session")
|
||||
log.Printf("[INFO] AWS Auth provider used: %q", cp.ProviderName)
|
||||
return creds, nil
|
||||
}
|
||||
|
||||
// GetCredentials gets credentials from the environment, shared credentials,
|
||||
// the session (which may include a credential process), or ECS/EC2 metadata endpoints.
|
||||
// GetCredentials also validates the credentials and the ability to assume a role
|
||||
// or will return an error if unsuccessful.
|
||||
func GetCredentials(c *Config) (*awsCredentials.Credentials, error) {
|
||||
sharedCredentialsFilename, err := homedir.Expand(c.CredsFilename)
|
||||
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("error expanding shared credentials filename: %w", err)
|
||||
}
|
||||
|
||||
// build a chain provider, lazy-evaluated by aws-sdk
|
||||
providers := []awsCredentials.Provider{
|
||||
&awsCredentials.StaticProvider{Value: awsCredentials.Value{
|
||||
AccessKeyID: c.AccessKey,
|
||||
SecretAccessKey: c.SecretKey,
|
||||
SessionToken: c.Token,
|
||||
}},
|
||||
&awsCredentials.EnvProvider{},
|
||||
&awsCredentials.SharedCredentialsProvider{
|
||||
Filename: sharedCredentialsFilename,
|
||||
Profile: c.Profile,
|
||||
},
|
||||
}
|
||||
|
||||
// Validate the credentials before returning them
|
||||
creds := awsCredentials.NewChainCredentials(providers)
|
||||
cp, err := creds.Get()
|
||||
if err != nil {
|
||||
if tfawserr.ErrCodeEquals(err, "NoCredentialProviders") {
|
||||
creds, err = GetCredentialsFromSession(c)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
} else {
|
||||
return nil, fmt.Errorf("Error loading credentials for AWS Provider: %w", err)
|
||||
}
|
||||
} else {
|
||||
log.Printf("[INFO] AWS Auth provider used: %q", cp.ProviderName)
|
||||
}
|
||||
|
||||
// This is the "normal" flow (i.e. not assuming a role)
|
||||
if c.AssumeRoleARN == "" {
|
||||
return creds, nil
|
||||
}
|
||||
|
||||
// Otherwise we need to construct an STS client with the main credentials, and verify
|
||||
// that we can assume the defined role.
|
||||
log.Printf("[INFO] Attempting to AssumeRole %s (SessionName: %q, ExternalId: %q)",
|
||||
c.AssumeRoleARN, c.AssumeRoleSessionName, c.AssumeRoleExternalID)
|
||||
|
||||
awsConfig := &aws.Config{
|
||||
Credentials: creds,
|
||||
EndpointResolver: c.EndpointResolver(),
|
||||
Region: aws.String(c.Region),
|
||||
MaxRetries: aws.Int(c.MaxRetries),
|
||||
HTTPClient: cleanhttp.DefaultClient(),
|
||||
}
|
||||
|
||||
assumeRoleSession, err := session.NewSession(awsConfig)
|
||||
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("error creating assume role session: %w", err)
|
||||
}
|
||||
|
||||
stsclient := sts.New(assumeRoleSession)
|
||||
assumeRoleProvider := &stscreds.AssumeRoleProvider{
|
||||
Client: stsclient,
|
||||
RoleARN: c.AssumeRoleARN,
|
||||
}
|
||||
|
||||
if c.AssumeRoleDurationSeconds > 0 {
|
||||
assumeRoleProvider.Duration = time.Duration(c.AssumeRoleDurationSeconds) * time.Second
|
||||
}
|
||||
|
||||
if c.AssumeRoleExternalID != "" {
|
||||
assumeRoleProvider.ExternalID = aws.String(c.AssumeRoleExternalID)
|
||||
}
|
||||
|
||||
if c.AssumeRolePolicy != "" {
|
||||
assumeRoleProvider.Policy = aws.String(c.AssumeRolePolicy)
|
||||
}
|
||||
|
||||
if len(c.AssumeRolePolicyARNs) > 0 {
|
||||
var policyDescriptorTypes []*sts.PolicyDescriptorType
|
||||
|
||||
for _, policyARN := range c.AssumeRolePolicyARNs {
|
||||
policyDescriptorType := &sts.PolicyDescriptorType{
|
||||
Arn: aws.String(policyARN),
|
||||
}
|
||||
policyDescriptorTypes = append(policyDescriptorTypes, policyDescriptorType)
|
||||
}
|
||||
|
||||
assumeRoleProvider.PolicyArns = policyDescriptorTypes
|
||||
}
|
||||
|
||||
if c.AssumeRoleSessionName != "" {
|
||||
assumeRoleProvider.RoleSessionName = c.AssumeRoleSessionName
|
||||
}
|
||||
|
||||
if len(c.AssumeRoleTags) > 0 {
|
||||
var tags []*sts.Tag
|
||||
|
||||
for k, v := range c.AssumeRoleTags {
|
||||
tag := &sts.Tag{
|
||||
Key: aws.String(k),
|
||||
Value: aws.String(v),
|
||||
}
|
||||
tags = append(tags, tag)
|
||||
}
|
||||
|
||||
assumeRoleProvider.Tags = tags
|
||||
}
|
||||
|
||||
if len(c.AssumeRoleTransitiveTagKeys) > 0 {
|
||||
assumeRoleProvider.TransitiveTagKeys = aws.StringSlice(c.AssumeRoleTransitiveTagKeys)
|
||||
}
|
||||
|
||||
providers = []awsCredentials.Provider{assumeRoleProvider}
|
||||
|
||||
assumeRoleCreds := awsCredentials.NewChainCredentials(providers)
|
||||
_, err = assumeRoleCreds.Get()
|
||||
if err != nil {
|
||||
return nil, c.NewCannotAssumeRoleError(err)
|
||||
}
|
||||
|
||||
return assumeRoleCreds, nil
|
||||
}
|
||||
|
||||
func setOptionalEndpoint(cfg *aws.Config) string {
|
||||
endpoint := os.Getenv("AWS_METADATA_URL")
|
||||
if endpoint != "" {
|
||||
log.Printf("[INFO] Setting custom metadata endpoint: %q", endpoint)
|
||||
cfg.Endpoint = aws.String(endpoint)
|
||||
return endpoint
|
||||
}
|
||||
return ""
|
||||
}
|
|
@ -0,0 +1,35 @@
|
|||
package awsbase
|
||||
|
||||
type Config struct {
|
||||
AccessKey string
|
||||
AssumeRoleARN string
|
||||
AssumeRoleDurationSeconds int
|
||||
AssumeRoleExternalID string
|
||||
AssumeRolePolicy string
|
||||
AssumeRolePolicyARNs []string
|
||||
AssumeRoleSessionName string
|
||||
AssumeRoleTags map[string]string
|
||||
AssumeRoleTransitiveTagKeys []string
|
||||
CallerDocumentationURL string
|
||||
CallerName string
|
||||
CredsFilename string
|
||||
DebugLogging bool
|
||||
IamEndpoint string
|
||||
Insecure bool
|
||||
MaxRetries int
|
||||
Profile string
|
||||
Region string
|
||||
SecretKey string
|
||||
SkipCredsValidation bool
|
||||
SkipMetadataApiCheck bool
|
||||
SkipRequestingAccountId bool
|
||||
StsEndpoint string
|
||||
Token string
|
||||
UserAgentProducts []*UserAgentProduct
|
||||
}
|
||||
|
||||
type UserAgentProduct struct {
|
||||
Extra []string
|
||||
Name string
|
||||
Version string
|
||||
}
|
|
@ -0,0 +1,46 @@
|
|||
package awsbase
|
||||
|
||||
import (
|
||||
"log"
|
||||
"os"
|
||||
|
||||
"github.com/aws/aws-sdk-go/aws/ec2metadata"
|
||||
"github.com/aws/aws-sdk-go/aws/endpoints"
|
||||
"github.com/aws/aws-sdk-go/service/iam"
|
||||
"github.com/aws/aws-sdk-go/service/sts"
|
||||
)
|
||||
|
||||
func (c *Config) EndpointResolver() endpoints.Resolver {
|
||||
resolver := func(service, region string, optFns ...func(*endpoints.Options)) (endpoints.ResolvedEndpoint, error) {
|
||||
// Ensure we pass all existing information (e.g. SigningRegion) and
|
||||
// only override the URL, otherwise a MissingRegion error can occur
|
||||
// when aws.Config.Region is not defined.
|
||||
resolvedEndpoint, err := endpoints.DefaultResolver().EndpointFor(service, region, optFns...)
|
||||
|
||||
if err != nil {
|
||||
return resolvedEndpoint, err
|
||||
}
|
||||
|
||||
switch service {
|
||||
case ec2metadata.ServiceName:
|
||||
if endpoint := os.Getenv("AWS_METADATA_URL"); endpoint != "" {
|
||||
log.Printf("[INFO] Setting custom EC2 metadata endpoint: %s", endpoint)
|
||||
resolvedEndpoint.URL = endpoint
|
||||
}
|
||||
case iam.ServiceName:
|
||||
if endpoint := c.IamEndpoint; endpoint != "" {
|
||||
log.Printf("[INFO] Setting custom IAM endpoint: %s", endpoint)
|
||||
resolvedEndpoint.URL = endpoint
|
||||
}
|
||||
case sts.ServiceName:
|
||||
if endpoint := c.StsEndpoint; endpoint != "" {
|
||||
log.Printf("[INFO] Setting custom STS endpoint: %s", endpoint)
|
||||
resolvedEndpoint.URL = endpoint
|
||||
}
|
||||
}
|
||||
|
||||
return resolvedEndpoint, nil
|
||||
}
|
||||
|
||||
return endpoints.ResolverFunc(resolver)
|
||||
}
|
|
@ -0,0 +1,76 @@
|
|||
package awsbase
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
)
|
||||
|
||||
// CannotAssumeRoleError occurs when AssumeRole cannot complete.
|
||||
type CannotAssumeRoleError struct {
|
||||
Config *Config
|
||||
Err error
|
||||
}
|
||||
|
||||
func (e CannotAssumeRoleError) Error() string {
|
||||
if e.Config == nil {
|
||||
return fmt.Sprintf("cannot assume role: %s", e.Err)
|
||||
}
|
||||
|
||||
return fmt.Sprintf(`IAM Role (%s) cannot be assumed.
|
||||
|
||||
There are a number of possible causes of this - the most common are:
|
||||
* The credentials used in order to assume the role are invalid
|
||||
* The credentials do not have appropriate permission to assume the role
|
||||
* The role ARN is not valid
|
||||
|
||||
Error: %s
|
||||
`, e.Config.AssumeRoleARN, e.Err)
|
||||
}
|
||||
|
||||
func (e CannotAssumeRoleError) Unwrap() error {
|
||||
return e.Err
|
||||
}
|
||||
|
||||
// IsCannotAssumeRoleError returns true if the error contains the CannotAssumeRoleError type.
|
||||
func IsCannotAssumeRoleError(err error) bool {
|
||||
var e CannotAssumeRoleError
|
||||
return errors.As(err, &e)
|
||||
}
|
||||
|
||||
func (c *Config) NewCannotAssumeRoleError(err error) CannotAssumeRoleError {
|
||||
return CannotAssumeRoleError{Config: c, Err: err}
|
||||
}
|
||||
|
||||
// NoValidCredentialSourcesError occurs when all credential lookup methods have been exhausted without results.
|
||||
type NoValidCredentialSourcesError struct {
|
||||
Config *Config
|
||||
Err error
|
||||
}
|
||||
|
||||
func (e NoValidCredentialSourcesError) Error() string {
|
||||
if e.Config == nil {
|
||||
return fmt.Sprintf("no valid credential sources found: %s", e.Err)
|
||||
}
|
||||
|
||||
return fmt.Sprintf(`no valid credential sources for %s found.
|
||||
|
||||
Please see %s
|
||||
for more information about providing credentials.
|
||||
|
||||
Error: %s
|
||||
`, e.Config.CallerName, e.Config.CallerDocumentationURL, e.Err)
|
||||
}
|
||||
|
||||
func (e NoValidCredentialSourcesError) Unwrap() error {
|
||||
return e.Err
|
||||
}
|
||||
|
||||
// IsNoValidCredentialSourcesError returns true if the error contains the NoValidCredentialSourcesError type.
|
||||
func IsNoValidCredentialSourcesError(err error) bool {
|
||||
var e NoValidCredentialSourcesError
|
||||
return errors.As(err, &e)
|
||||
}
|
||||
|
||||
func (c *Config) NewNoValidCredentialSourcesError(err error) NoValidCredentialSourcesError {
|
||||
return NoValidCredentialSourcesError{Config: c, Err: err}
|
||||
}
|
|
@ -0,0 +1,10 @@
|
|||
module github.com/hashicorp/aws-sdk-go-base
|
||||
|
||||
require (
|
||||
github.com/aws/aws-sdk-go v1.31.9
|
||||
github.com/hashicorp/go-cleanhttp v0.5.0
|
||||
github.com/hashicorp/go-multierror v1.0.0
|
||||
github.com/mitchellh/go-homedir v1.1.0
|
||||
)
|
||||
|
||||
go 1.13
|
|
@ -0,0 +1,31 @@
|
|||
github.com/aws/aws-sdk-go v1.31.9 h1:n+b34ydVfgC30j0Qm69yaapmjejQPW2BoDBX7Uy/tLI=
|
||||
github.com/aws/aws-sdk-go v1.31.9/go.mod h1:5zCpMtNQVjRREroY7sYe8lOMRSxkhG6MZveU8YkpAk0=
|
||||
github.com/davecgh/go-spew v1.1.0 h1:ZDRjVQ15GmhC3fiQ8ni8+OwkZQO4DARzQgrnXU1Liz8=
|
||||
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||
github.com/go-sql-driver/mysql v1.5.0/go.mod h1:DCzpHaOWr8IXmIStZouvnhqoel9Qv2LBy8hT2VhHyBg=
|
||||
github.com/hashicorp/errwrap v1.0.0 h1:hLrqtEDnRye3+sgx6z4qVLNuviH3MR5aQ0ykNJa/UYA=
|
||||
github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=
|
||||
github.com/hashicorp/go-cleanhttp v0.5.0 h1:wvCrVc9TjDls6+YGAF2hAifE1E5U1+b4tH6KdvN3Gig=
|
||||
github.com/hashicorp/go-cleanhttp v0.5.0/go.mod h1:JpRdi6/HCYpAwUzNwuwqhbovhLtngrth3wmdIIUrZ80=
|
||||
github.com/hashicorp/go-multierror v1.0.0 h1:iVjPR7a6H0tWELX5NxNe7bYopibicUzc7uPribsnS6o=
|
||||
github.com/hashicorp/go-multierror v1.0.0/go.mod h1:dHtQlpGsu+cZNNAkkCN/P3hoUDHhCYQXV3UM06sGGrk=
|
||||
github.com/jmespath/go-jmespath v0.3.0 h1:OS12ieG61fsCg5+qLJ+SsW9NicxNkg3b25OyT2yCeUc=
|
||||
github.com/jmespath/go-jmespath v0.3.0/go.mod h1:9QtRXoHjLGCJ5IBSaohpXITPlowMeeYCZ7fLUTSywik=
|
||||
github.com/mitchellh/go-homedir v1.1.0 h1:lukF9ziXFxDFPkA1vsr5zpc1XuPDn/wFntq5mG+4E0Y=
|
||||
github.com/mitchellh/go-homedir v1.1.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
|
||||
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
|
||||
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||
github.com/stretchr/testify v1.5.1 h1:nOGnQDM7FYENwehXlg/kFVnos3rEvtKTjRvOWSzb6H4=
|
||||
github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
|
||||
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||
golang.org/x/net v0.0.0-20200202094626-16171245cfb2 h1:CCH4IOTTfewWjGOlSp+zGcjutRKlBEZQ6wTn8ozI/nI=
|
||||
golang.org/x/net v0.0.0-20200202094626-16171245cfb2/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||
golang.org/x/text v0.3.0 h1:g61tztE5qeGQ89tm6NTjjM9VPIm088od1l6aSorWRWg=
|
||||
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
||||
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405 h1:yhCVgyC4o1eVCa2tZl7eS0r+SDo693bJlVdllGtEeKM=
|
||||
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||
gopkg.in/yaml.v2 v2.2.2 h1:ZCJp+EgiOT7lHqUV2J862kp8Qj64Jo6az82+3Td9dZw=
|
||||
gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
|
|
@ -0,0 +1,18 @@
|
|||
package awsbase
|
||||
|
||||
import (
|
||||
"log"
|
||||
"strings"
|
||||
)
|
||||
|
||||
type DebugLogger struct{}
|
||||
|
||||
func (l DebugLogger) Log(args ...interface{}) {
|
||||
tokens := make([]string, 0, len(args))
|
||||
for _, arg := range args {
|
||||
if token, ok := arg.(string); ok {
|
||||
tokens = append(tokens, token)
|
||||
}
|
||||
}
|
||||
log.Printf("[DEBUG] [aws-sdk-go] %s", strings.Join(tokens, " "))
|
||||
}
|
|
@ -0,0 +1,512 @@
|
|||
package awsbase
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"log"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"net/url"
|
||||
"os"
|
||||
"time"
|
||||
|
||||
"github.com/aws/aws-sdk-go/aws"
|
||||
awsCredentials "github.com/aws/aws-sdk-go/aws/credentials"
|
||||
"github.com/aws/aws-sdk-go/aws/credentials/ec2rolecreds"
|
||||
"github.com/aws/aws-sdk-go/aws/credentials/endpointcreds"
|
||||
"github.com/aws/aws-sdk-go/aws/credentials/stscreds"
|
||||
"github.com/aws/aws-sdk-go/aws/session"
|
||||
)
|
||||
|
||||
const (
|
||||
MockEc2MetadataAccessKey = `Ec2MetadataAccessKey`
|
||||
MockEc2MetadataSecretKey = `Ec2MetadataSecretKey`
|
||||
MockEc2MetadataSessionToken = `Ec2MetadataSessionToken`
|
||||
|
||||
MockEcsCredentialsAccessKey = `EcsCredentialsAccessKey`
|
||||
MockEcsCredentialsSecretKey = `EcsCredentialsSecretKey`
|
||||
MockEcsCredentialsSessionToken = `EcsCredentialsSessionToken`
|
||||
|
||||
MockEnvAccessKey = `EnvAccessKey`
|
||||
MockEnvSecretKey = `EnvSecretKey`
|
||||
MockEnvSessionToken = `EnvSessionToken`
|
||||
|
||||
MockStaticAccessKey = `StaticAccessKey`
|
||||
MockStaticSecretKey = `StaticSecretKey`
|
||||
|
||||
MockStsAssumeRoleAccessKey = `AssumeRoleAccessKey`
|
||||
MockStsAssumeRoleArn = `arn:aws:iam::555555555555:role/AssumeRole`
|
||||
MockStsAssumeRoleExternalId = `AssumeRoleExternalId`
|
||||
MockStsAssumeRoleInvalidResponseBodyInvalidClientTokenId = `<ErrorResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
|
||||
<Error>
|
||||
<Type>Sender</Type>
|
||||
<Code>InvalidClientTokenId</Code>
|
||||
<Message>The security token included in the request is invalid.</Message>
|
||||
</Error>
|
||||
<RequestId>4d0cf5ec-892a-4d3f-84e4-30e9987d9bdd</RequestId>
|
||||
</ErrorResponse>`
|
||||
MockStsAssumeRolePolicy = `{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": {
|
||||
"Effect": "Allow",
|
||||
"Action": "*",
|
||||
"Resource": "*",
|
||||
}
|
||||
}`
|
||||
MockStsAssumeRolePolicyArn = `arn:aws:iam::555555555555:policy/AssumeRolePolicy1`
|
||||
MockStsAssumeRoleSecretKey = `AssumeRoleSecretKey`
|
||||
MockStsAssumeRoleSessionName = `AssumeRoleSessionName`
|
||||
MockStsAssumeRoleSessionToken = `AssumeRoleSessionToken`
|
||||
MockStsAssumeRoleTagKey = `AssumeRoleTagKey`
|
||||
MockStsAssumeRoleTagValue = `AssumeRoleTagValue`
|
||||
MockStsAssumeRoleTransitiveTagKey = `AssumeRoleTagKey`
|
||||
MockStsAssumeRoleValidResponseBody = `<AssumeRoleResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
|
||||
<AssumeRoleResult>
|
||||
<AssumedRoleUser>
|
||||
<Arn>arn:aws:sts::555555555555:assumed-role/role/AssumeRoleSessionName</Arn>
|
||||
<AssumedRoleId>ARO123EXAMPLE123:AssumeRoleSessionName</AssumedRoleId>
|
||||
</AssumedRoleUser>
|
||||
<Credentials>
|
||||
<AccessKeyId>AssumeRoleAccessKey</AccessKeyId>
|
||||
<SecretAccessKey>AssumeRoleSecretKey</SecretAccessKey>
|
||||
<SessionToken>AssumeRoleSessionToken</SessionToken>
|
||||
<Expiration>2099-12-31T23:59:59Z</Expiration>
|
||||
</Credentials>
|
||||
</AssumeRoleResult>
|
||||
<ResponseMetadata>
|
||||
<RequestId>01234567-89ab-cdef-0123-456789abcdef</RequestId>
|
||||
</ResponseMetadata>
|
||||
</AssumeRoleResponse>`
|
||||
|
||||
MockStsAssumeRoleWithWebIdentityAccessKey = `AssumeRoleWithWebIdentityAccessKey`
|
||||
MockStsAssumeRoleWithWebIdentityArn = `arn:aws:iam::666666666666:role/WebIdentityToken`
|
||||
MockStsAssumeRoleWithWebIdentitySecretKey = `AssumeRoleWithWebIdentitySecretKey`
|
||||
MockStsAssumeRoleWithWebIdentitySessionName = `AssumeRoleWithWebIdentitySessionName`
|
||||
MockStsAssumeRoleWithWebIdentitySessionToken = `AssumeRoleWithWebIdentitySessionToken`
|
||||
MockStsAssumeRoleWithWebIdentityValidResponseBody = `<AssumeRoleWithWebIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
|
||||
<AssumeRoleWithWebIdentityResult>
|
||||
<SubjectFromWebIdentityToken>amzn1.account.AF6RHO7KZU5XRVQJGXK6HB56KR2A</SubjectFromWebIdentityToken>
|
||||
<Audience>client.6666666666666666666.6666@apps.example.com</Audience>
|
||||
<AssumedRoleUser>
|
||||
<Arn>arn:aws:sts::666666666666:assumed-role/FederatedWebIdentityRole/AssumeRoleWithWebIdentitySessionName</Arn>
|
||||
<AssumedRoleId>ARO123EXAMPLE123:AssumeRoleWithWebIdentitySessionName</AssumedRoleId>
|
||||
</AssumedRoleUser>
|
||||
<Credentials>
|
||||
<SessionToken>AssumeRoleWithWebIdentitySessionToken</SessionToken>
|
||||
<SecretAccessKey>AssumeRoleWithWebIdentitySecretKey</SecretAccessKey>
|
||||
<Expiration>2099-12-31T23:59:59Z</Expiration>
|
||||
<AccessKeyId>AssumeRoleWithWebIdentityAccessKey</AccessKeyId>
|
||||
</Credentials>
|
||||
<Provider>www.amazon.com</Provider>
|
||||
</AssumeRoleWithWebIdentityResult>
|
||||
<ResponseMetadata>
|
||||
<RequestId>01234567-89ab-cdef-0123-456789abcdef</RequestId>
|
||||
</ResponseMetadata>
|
||||
</AssumeRoleWithWebIdentityResponse>`
|
||||
|
||||
MockStsGetCallerIdentityAccountID = `222222222222`
|
||||
MockStsGetCallerIdentityInvalidResponseBodyAccessDenied = `<ErrorResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
|
||||
<Error>
|
||||
<Type>Sender</Type>
|
||||
<Code>AccessDenied</Code>
|
||||
<Message>User: arn:aws:iam::123456789012:user/Bob is not authorized to perform: sts:GetCallerIdentity</Message>
|
||||
</Error>
|
||||
<RequestId>01234567-89ab-cdef-0123-456789abcdef</RequestId>
|
||||
</ErrorResponse>`
|
||||
MockStsGetCallerIdentityPartition = `aws`
|
||||
MockStsGetCallerIdentityValidResponseBody = `<GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
|
||||
<GetCallerIdentityResult>
|
||||
<Arn>arn:aws:iam::222222222222:user/Alice</Arn>
|
||||
<UserId>AKIAI44QH8DHBEXAMPLE</UserId>
|
||||
<Account>222222222222</Account>
|
||||
</GetCallerIdentityResult>
|
||||
<ResponseMetadata>
|
||||
<RequestId>01234567-89ab-cdef-0123-456789abcdef</RequestId>
|
||||
</ResponseMetadata>
|
||||
</GetCallerIdentityResponse>`
|
||||
|
||||
MockWebIdentityToken = `WebIdentityToken`
|
||||
)
|
||||
|
||||
var (
|
||||
MockEc2MetadataCredentials = awsCredentials.Value{
|
||||
AccessKeyID: MockEc2MetadataAccessKey,
|
||||
ProviderName: ec2rolecreds.ProviderName,
|
||||
SecretAccessKey: MockEc2MetadataSecretKey,
|
||||
SessionToken: MockEc2MetadataSessionToken,
|
||||
}
|
||||
|
||||
MockEcsCredentialsCredentials = awsCredentials.Value{
|
||||
AccessKeyID: MockEcsCredentialsAccessKey,
|
||||
ProviderName: endpointcreds.ProviderName,
|
||||
SecretAccessKey: MockEcsCredentialsSecretKey,
|
||||
SessionToken: MockEcsCredentialsSessionToken,
|
||||
}
|
||||
|
||||
MockEnvCredentials = awsCredentials.Value{
|
||||
AccessKeyID: MockEnvAccessKey,
|
||||
ProviderName: awsCredentials.EnvProviderName,
|
||||
SecretAccessKey: MockEnvSecretKey,
|
||||
}
|
||||
|
||||
MockEnvCredentialsWithSessionToken = awsCredentials.Value{
|
||||
AccessKeyID: MockEnvAccessKey,
|
||||
ProviderName: awsCredentials.EnvProviderName,
|
||||
SecretAccessKey: MockEnvSecretKey,
|
||||
SessionToken: MockEnvSessionToken,
|
||||
}
|
||||
|
||||
MockStaticCredentials = awsCredentials.Value{
|
||||
AccessKeyID: MockStaticAccessKey,
|
||||
ProviderName: awsCredentials.StaticProviderName,
|
||||
SecretAccessKey: MockStaticSecretKey,
|
||||
}
|
||||
|
||||
MockStsAssumeRoleCredentials = awsCredentials.Value{
|
||||
AccessKeyID: MockStsAssumeRoleAccessKey,
|
||||
ProviderName: stscreds.ProviderName,
|
||||
SecretAccessKey: MockStsAssumeRoleSecretKey,
|
||||
SessionToken: MockStsAssumeRoleSessionToken,
|
||||
}
|
||||
MockStsAssumeRoleInvalidEndpointInvalidClientTokenId = &MockEndpoint{
|
||||
Request: &MockRequest{
|
||||
Body: url.Values{
|
||||
"Action": []string{"AssumeRole"},
|
||||
"DurationSeconds": []string{"900"},
|
||||
"RoleArn": []string{MockStsAssumeRoleArn},
|
||||
"RoleSessionName": []string{MockStsAssumeRoleSessionName},
|
||||
"Version": []string{"2011-06-15"},
|
||||
}.Encode(),
|
||||
Method: http.MethodPost,
|
||||
Uri: "/",
|
||||
},
|
||||
Response: &MockResponse{
|
||||
Body: MockStsAssumeRoleInvalidResponseBodyInvalidClientTokenId,
|
||||
ContentType: "text/xml",
|
||||
StatusCode: http.StatusForbidden,
|
||||
},
|
||||
}
|
||||
MockStsAssumeRoleValidEndpoint = &MockEndpoint{
|
||||
Request: &MockRequest{
|
||||
Body: url.Values{
|
||||
"Action": []string{"AssumeRole"},
|
||||
"DurationSeconds": []string{"900"},
|
||||
"RoleArn": []string{MockStsAssumeRoleArn},
|
||||
"RoleSessionName": []string{MockStsAssumeRoleSessionName},
|
||||
"Version": []string{"2011-06-15"},
|
||||
}.Encode(),
|
||||
Method: http.MethodPost,
|
||||
Uri: "/",
|
||||
},
|
||||
Response: &MockResponse{
|
||||
Body: MockStsAssumeRoleValidResponseBody,
|
||||
ContentType: "text/xml",
|
||||
StatusCode: http.StatusOK,
|
||||
},
|
||||
}
|
||||
|
||||
MockStsAssumeRoleWithWebIdentityValidEndpoint = &MockEndpoint{
|
||||
Request: &MockRequest{
|
||||
Body: url.Values{
|
||||
"Action": []string{"AssumeRoleWithWebIdentity"},
|
||||
"RoleArn": []string{MockStsAssumeRoleWithWebIdentityArn},
|
||||
"RoleSessionName": []string{MockStsAssumeRoleWithWebIdentitySessionName},
|
||||
"Version": []string{"2011-06-15"},
|
||||
"WebIdentityToken": []string{MockWebIdentityToken},
|
||||
}.Encode(),
|
||||
Method: http.MethodPost,
|
||||
Uri: "/",
|
||||
},
|
||||
Response: &MockResponse{
|
||||
Body: MockStsAssumeRoleWithWebIdentityValidResponseBody,
|
||||
ContentType: "text/xml",
|
||||
StatusCode: http.StatusOK,
|
||||
},
|
||||
}
|
||||
|
||||
MockStsAssumeRoleWithWebIdentityCredentials = awsCredentials.Value{
|
||||
AccessKeyID: MockStsAssumeRoleWithWebIdentityAccessKey,
|
||||
ProviderName: stscreds.WebIdentityProviderName,
|
||||
SecretAccessKey: MockStsAssumeRoleWithWebIdentitySecretKey,
|
||||
SessionToken: MockStsAssumeRoleWithWebIdentitySessionToken,
|
||||
}
|
||||
|
||||
MockStsGetCallerIdentityInvalidEndpointAccessDenied = &MockEndpoint{
|
||||
Request: &MockRequest{
|
||||
Body: url.Values{
|
||||
"Action": []string{"GetCallerIdentity"},
|
||||
"Version": []string{"2011-06-15"},
|
||||
}.Encode(),
|
||||
Method: http.MethodPost,
|
||||
Uri: "/",
|
||||
},
|
||||
Response: &MockResponse{
|
||||
Body: MockStsGetCallerIdentityInvalidResponseBodyAccessDenied,
|
||||
ContentType: "text/xml",
|
||||
StatusCode: http.StatusForbidden,
|
||||
},
|
||||
}
|
||||
MockStsGetCallerIdentityValidEndpoint = &MockEndpoint{
|
||||
Request: &MockRequest{
|
||||
Body: url.Values{
|
||||
"Action": []string{"GetCallerIdentity"},
|
||||
"Version": []string{"2011-06-15"},
|
||||
}.Encode(),
|
||||
Method: http.MethodPost,
|
||||
Uri: "/",
|
||||
},
|
||||
Response: &MockResponse{
|
||||
Body: MockStsGetCallerIdentityValidResponseBody,
|
||||
ContentType: "text/xml",
|
||||
StatusCode: http.StatusOK,
|
||||
},
|
||||
}
|
||||
)
|
||||
|
||||
// MockAwsApiServer establishes a httptest server to simulate behaviour of a real AWS API server
|
||||
func MockAwsApiServer(svcName string, endpoints []*MockEndpoint) *httptest.Server {
|
||||
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
buf := new(bytes.Buffer)
|
||||
if _, err := buf.ReadFrom(r.Body); err != nil {
|
||||
w.WriteHeader(http.StatusInternalServerError)
|
||||
fmt.Fprintf(w, "Error reading from HTTP Request Body: %s", err)
|
||||
return
|
||||
}
|
||||
requestBody := buf.String()
|
||||
|
||||
log.Printf("[DEBUG] Received %s API %q request to %q: %s",
|
||||
svcName, r.Method, r.RequestURI, requestBody)
|
||||
|
||||
for _, e := range endpoints {
|
||||
if r.Method == e.Request.Method && r.RequestURI == e.Request.Uri && requestBody == e.Request.Body {
|
||||
log.Printf("[DEBUG] Mocked %s API responding with %d: %s",
|
||||
svcName, e.Response.StatusCode, e.Response.Body)
|
||||
|
||||
w.WriteHeader(e.Response.StatusCode)
|
||||
w.Header().Set("Content-Type", e.Response.ContentType)
|
||||
w.Header().Set("X-Amzn-Requestid", "1b206dd1-f9a8-11e5-becf-051c60f11c4a")
|
||||
w.Header().Set("Date", time.Now().Format(time.RFC1123))
|
||||
|
||||
fmt.Fprintln(w, e.Response.Body)
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
}))
|
||||
|
||||
return ts
|
||||
}
|
||||
|
||||
// GetMockedAwsApiSession establishes an AWS session to a simulated AWS API server for a given service and route endpoints.
|
||||
func GetMockedAwsApiSession(svcName string, endpoints []*MockEndpoint) (func(), *session.Session, error) {
|
||||
ts := MockAwsApiServer(svcName, endpoints)
|
||||
|
||||
sc := awsCredentials.NewStaticCredentials("accessKey", "secretKey", "")
|
||||
|
||||
sess, err := session.NewSession(&aws.Config{
|
||||
Credentials: sc,
|
||||
Region: aws.String("us-east-1"),
|
||||
Endpoint: aws.String(ts.URL),
|
||||
CredentialsChainVerboseErrors: aws.Bool(true),
|
||||
})
|
||||
|
||||
return ts.Close, sess, err
|
||||
}
|
||||
|
||||
// awsMetadataApiMock establishes a httptest server to mock out the internal AWS Metadata
|
||||
// service. IAM Credentials are retrieved by the EC2RoleProvider, which makes
|
||||
// API calls to this internal URL. By replacing the server with a test server,
|
||||
// we can simulate an AWS environment
|
||||
func awsMetadataApiMock(responses []*MetadataResponse) func() {
|
||||
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
w.Header().Set("Content-Type", "text/plain")
|
||||
w.Header().Add("Server", "MockEC2")
|
||||
log.Printf("[DEBUG] Mock EC2 metadata server received request: %s", r.RequestURI)
|
||||
for _, e := range responses {
|
||||
if r.RequestURI == e.Uri {
|
||||
fmt.Fprintln(w, e.Body)
|
||||
return
|
||||
}
|
||||
}
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
}))
|
||||
|
||||
os.Setenv("AWS_METADATA_URL", ts.URL+"/latest")
|
||||
return ts.Close
|
||||
}
|
||||
|
||||
// ecsCredentialsApiMock establishes a httptest server to mock out the ECS credentials API.
|
||||
func ecsCredentialsApiMock() func() {
|
||||
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.Header().Add("Server", "MockECS")
|
||||
log.Printf("[DEBUG] Mock ECS credentials server received request: %s", r.RequestURI)
|
||||
if r.RequestURI == "/creds" {
|
||||
_ = json.NewEncoder(w).Encode(map[string]string{
|
||||
"AccessKeyId": MockEcsCredentialsAccessKey,
|
||||
"Expiration": time.Now().UTC().Format(time.RFC3339),
|
||||
"RoleArn": "arn:aws:iam::000000000000:role/EcsCredentials",
|
||||
"SecretAccessKey": MockEcsCredentialsSecretKey,
|
||||
"Token": MockEcsCredentialsSessionToken,
|
||||
})
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
}))
|
||||
|
||||
os.Setenv("AWS_CONTAINER_CREDENTIALS_FULL_URI", ts.URL+"/creds")
|
||||
return ts.Close
|
||||
}
|
||||
|
||||
// MockStsAssumeRoleValidEndpointWithOptions returns a valid STS AssumeRole response with configurable request options.
|
||||
func MockStsAssumeRoleValidEndpointWithOptions(options map[string]string) *MockEndpoint {
|
||||
urlValues := url.Values{
|
||||
"Action": []string{"AssumeRole"},
|
||||
"DurationSeconds": []string{"900"},
|
||||
"RoleArn": []string{MockStsAssumeRoleArn},
|
||||
"RoleSessionName": []string{MockStsAssumeRoleSessionName},
|
||||
"Version": []string{"2011-06-15"},
|
||||
}
|
||||
|
||||
for k, v := range options {
|
||||
urlValues.Set(k, v)
|
||||
}
|
||||
|
||||
return &MockEndpoint{
|
||||
Request: &MockRequest{
|
||||
Body: urlValues.Encode(),
|
||||
Method: http.MethodPost,
|
||||
Uri: "/",
|
||||
},
|
||||
Response: &MockResponse{
|
||||
Body: MockStsAssumeRoleValidResponseBody,
|
||||
ContentType: "text/xml",
|
||||
StatusCode: http.StatusOK,
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
// MockEndpoint represents a basic request and response that can be used for creating simple httptest server routes.
|
||||
type MockEndpoint struct {
|
||||
Request *MockRequest
|
||||
Response *MockResponse
|
||||
}
|
||||
|
||||
// MockRequest represents a basic HTTP request
|
||||
type MockRequest struct {
|
||||
Method string
|
||||
Uri string
|
||||
Body string
|
||||
}
|
||||
|
||||
// MockResponse represents a basic HTTP response.
|
||||
type MockResponse struct {
|
||||
StatusCode int
|
||||
Body string
|
||||
ContentType string
|
||||
}
|
||||
|
||||
// MetadataResponse represents a metadata server response URI and body
|
||||
type MetadataResponse struct {
|
||||
Uri string `json:"uri"`
|
||||
Body string `json:"body"`
|
||||
}
|
||||
|
||||
var ec2metadata_instanceIdEndpoint = &MetadataResponse{
|
||||
Uri: "/latest/meta-data/instance-id",
|
||||
Body: "mock-instance-id",
|
||||
}
|
||||
|
||||
var ec2metadata_securityCredentialsEndpoints = []*MetadataResponse{
|
||||
{
|
||||
Uri: "/latest/api/token",
|
||||
Body: "Ec2MetadataApiToken",
|
||||
},
|
||||
{
|
||||
Uri: "/latest/meta-data/iam/security-credentials/",
|
||||
Body: "test_role",
|
||||
},
|
||||
{
|
||||
Uri: "/latest/meta-data/iam/security-credentials/test_role",
|
||||
Body: "{\"Code\":\"Success\",\"LastUpdated\":\"2015-12-11T17:17:25Z\",\"Type\":\"AWS-HMAC\",\"AccessKeyId\":\"Ec2MetadataAccessKey\",\"SecretAccessKey\":\"Ec2MetadataSecretKey\",\"Token\":\"Ec2MetadataSessionToken\"}",
|
||||
},
|
||||
}
|
||||
|
||||
var ec2metadata_iamInfoEndpoint = &MetadataResponse{
|
||||
Uri: "/latest/meta-data/iam/info",
|
||||
Body: "{\"Code\": \"Success\",\"LastUpdated\": \"2016-03-17T12:27:32Z\",\"InstanceProfileArn\": \"arn:aws:iam::000000000000:instance-profile/my-instance-profile\",\"InstanceProfileId\": \"AIPAABCDEFGHIJKLMN123\"}",
|
||||
}
|
||||
|
||||
const ec2metadata_iamInfoEndpoint_expectedAccountID = `000000000000`
|
||||
const ec2metadata_iamInfoEndpoint_expectedPartition = `aws`
|
||||
|
||||
const iamResponse_GetUser_valid = `<GetUserResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
|
||||
<GetUserResult>
|
||||
<User>
|
||||
<UserId>AIDACKCEVSQ6C2EXAMPLE</UserId>
|
||||
<Path>/division_abc/subdivision_xyz/</Path>
|
||||
<UserName>Bob</UserName>
|
||||
<Arn>arn:aws:iam::111111111111:user/division_abc/subdivision_xyz/Bob</Arn>
|
||||
<CreateDate>2013-10-02T17:01:44Z</CreateDate>
|
||||
<PasswordLastUsed>2014-10-10T14:37:51Z</PasswordLastUsed>
|
||||
</User>
|
||||
</GetUserResult>
|
||||
<ResponseMetadata>
|
||||
<RequestId>7a62c49f-347e-4fc4-9331-6e8eEXAMPLE</RequestId>
|
||||
</ResponseMetadata>
|
||||
</GetUserResponse>`
|
||||
|
||||
const iamResponse_GetUser_valid_expectedAccountID = `111111111111`
|
||||
const iamResponse_GetUser_valid_expectedPartition = `aws`
|
||||
|
||||
const iamResponse_GetUser_unauthorized = `<ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
|
||||
<Error>
|
||||
<Type>Sender</Type>
|
||||
<Code>AccessDenied</Code>
|
||||
<Message>User: arn:aws:iam::123456789012:user/Bob is not authorized to perform: iam:GetUser on resource: arn:aws:iam::123456789012:user/Bob</Message>
|
||||
</Error>
|
||||
<RequestId>7a62c49f-347e-4fc4-9331-6e8eEXAMPLE</RequestId>
|
||||
</ErrorResponse>`
|
||||
|
||||
const iamResponse_GetUser_federatedFailure = `<ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
|
||||
<Error>
|
||||
<Type>Sender</Type>
|
||||
<Code>ValidationError</Code>
|
||||
<Message>Must specify userName when calling with non-User credentials</Message>
|
||||
</Error>
|
||||
<RequestId>7a62c49f-347e-4fc4-9331-6e8eEXAMPLE</RequestId>
|
||||
</ErrorResponse>`
|
||||
|
||||
const iamResponse_ListRoles_valid = `<ListRolesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
|
||||
<ListRolesResult>
|
||||
<IsTruncated>true</IsTruncated>
|
||||
<Marker>AWceSSsKsazQ4IEplT9o4hURCzBs00iavlEvEXAMPLE</Marker>
|
||||
<Roles>
|
||||
<member>
|
||||
<Path>/</Path>
|
||||
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222008-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%22ec2.amazonaws.com%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument>
|
||||
<RoleId>AROACKCEVSQ6C2EXAMPLE</RoleId>
|
||||
<RoleName>elasticbeanstalk-role</RoleName>
|
||||
<Arn>arn:aws:iam::444444444444:role/elasticbeanstalk-role</Arn>
|
||||
<CreateDate>2013-10-02T17:01:44Z</CreateDate>
|
||||
</member>
|
||||
</Roles>
|
||||
</ListRolesResult>
|
||||
<ResponseMetadata>
|
||||
<RequestId>7a62c49f-347e-4fc4-9331-6e8eEXAMPLE</RequestId>
|
||||
</ResponseMetadata>
|
||||
</ListRolesResponse>`
|
||||
|
||||
const iamResponse_ListRoles_valid_expectedAccountID = `444444444444`
|
||||
const iamResponse_ListRoles_valid_expectedPartition = `aws`
|
||||
|
||||
const iamResponse_ListRoles_unauthorized = `<ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
|
||||
<Error>
|
||||
<Type>Sender</Type>
|
||||
<Code>AccessDenied</Code>
|
||||
<Message>User: arn:aws:iam::123456789012:user/Bob is not authorized to perform: iam:ListRoles on resource: arn:aws:iam::123456789012:role/</Message>
|
||||
</Error>
|
||||
<RequestId>7a62c49f-347e-4fc4-9331-6e8eEXAMPLE</RequestId>
|
||||
</ErrorResponse>`
|
|
@ -0,0 +1,193 @@
|
|||
package awsbase
|
||||
|
||||
import (
|
||||
"crypto/tls"
|
||||
"fmt"
|
||||
"log"
|
||||
"net/http"
|
||||
"os"
|
||||
|
||||
"github.com/aws/aws-sdk-go/aws"
|
||||
"github.com/aws/aws-sdk-go/aws/endpoints"
|
||||
"github.com/aws/aws-sdk-go/aws/request"
|
||||
"github.com/aws/aws-sdk-go/aws/session"
|
||||
"github.com/aws/aws-sdk-go/service/iam"
|
||||
"github.com/aws/aws-sdk-go/service/sts"
|
||||
"github.com/hashicorp/aws-sdk-go-base/tfawserr"
|
||||
"github.com/hashicorp/go-cleanhttp"
|
||||
)
|
||||
|
||||
const (
|
||||
// AppendUserAgentEnvVar is a conventionally used environment variable
|
||||
// containing additional HTTP User-Agent information.
|
||||
// If present and its value is non-empty, it is directly appended to the
|
||||
// User-Agent header for HTTP requests.
|
||||
AppendUserAgentEnvVar = "TF_APPEND_USER_AGENT"
|
||||
// Maximum network retries.
|
||||
// We depend on the AWS Go SDK DefaultRetryer exponential backoff.
|
||||
// Ensure that if the AWS Config MaxRetries is set high (which it is by
|
||||
// default), that we only retry for a few seconds with typically
|
||||
// unrecoverable network errors, such as DNS lookup failures.
|
||||
MaxNetworkRetryCount = 9
|
||||
)
|
||||
|
||||
// GetSessionOptions attempts to return valid AWS Go SDK session authentication
|
||||
// options based on pre-existing credential provider, configured profile, or
|
||||
// fallback to automatically a determined session via the AWS Go SDK.
|
||||
func GetSessionOptions(c *Config) (*session.Options, error) {
|
||||
options := &session.Options{
|
||||
Config: aws.Config{
|
||||
EndpointResolver: c.EndpointResolver(),
|
||||
HTTPClient: cleanhttp.DefaultClient(),
|
||||
MaxRetries: aws.Int(0),
|
||||
Region: aws.String(c.Region),
|
||||
},
|
||||
Profile: c.Profile,
|
||||
SharedConfigState: session.SharedConfigEnable,
|
||||
}
|
||||
|
||||
// get and validate credentials
|
||||
creds, err := GetCredentials(c)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// add the validated credentials to the session options
|
||||
options.Config.Credentials = creds
|
||||
|
||||
if c.Insecure {
|
||||
transport := options.Config.HTTPClient.Transport.(*http.Transport)
|
||||
transport.TLSClientConfig = &tls.Config{
|
||||
InsecureSkipVerify: true,
|
||||
}
|
||||
}
|
||||
|
||||
if c.DebugLogging {
|
||||
options.Config.LogLevel = aws.LogLevel(aws.LogDebugWithHTTPBody | aws.LogDebugWithRequestRetries | aws.LogDebugWithRequestErrors)
|
||||
options.Config.Logger = DebugLogger{}
|
||||
}
|
||||
|
||||
return options, nil
|
||||
}
|
||||
|
||||
// GetSession attempts to return valid AWS Go SDK session.
|
||||
func GetSession(c *Config) (*session.Session, error) {
|
||||
if c.SkipMetadataApiCheck {
|
||||
os.Setenv("AWS_EC2_METADATA_DISABLED", "true")
|
||||
}
|
||||
|
||||
options, err := GetSessionOptions(c)
|
||||
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
sess, err := session.NewSessionWithOptions(*options)
|
||||
if err != nil {
|
||||
if tfawserr.ErrCodeEquals(err, "NoCredentialProviders") {
|
||||
return nil, c.NewNoValidCredentialSourcesError(err)
|
||||
}
|
||||
return nil, fmt.Errorf("Error creating AWS session: %w", err)
|
||||
}
|
||||
|
||||
if c.MaxRetries > 0 {
|
||||
sess = sess.Copy(&aws.Config{MaxRetries: aws.Int(c.MaxRetries)})
|
||||
}
|
||||
|
||||
for _, product := range c.UserAgentProducts {
|
||||
sess.Handlers.Build.PushBack(request.MakeAddToUserAgentHandler(product.Name, product.Version, product.Extra...))
|
||||
}
|
||||
|
||||
// Add custom input from ENV to the User-Agent request header
|
||||
// Reference: https://github.com/terraform-providers/terraform-provider-aws/issues/9149
|
||||
if v := os.Getenv(AppendUserAgentEnvVar); v != "" {
|
||||
log.Printf("[DEBUG] Using additional User-Agent Info: %s", v)
|
||||
sess.Handlers.Build.PushBack(request.MakeAddToUserAgentFreeFormHandler(v))
|
||||
}
|
||||
|
||||
// Generally, we want to configure a lower retry theshold for networking issues
|
||||
// as the session retry threshold is very high by default and can mask permanent
|
||||
// networking failures, such as a non-existent service endpoint.
|
||||
// MaxRetries will override this logic if it has a lower retry threshold.
|
||||
// NOTE: This logic can be fooled by other request errors raising the retry count
|
||||
// before any networking error occurs
|
||||
sess.Handlers.Retry.PushBack(func(r *request.Request) {
|
||||
if r.RetryCount < MaxNetworkRetryCount {
|
||||
return
|
||||
}
|
||||
// RequestError: send request failed
|
||||
// caused by: Post https://FQDN/: dial tcp: lookup FQDN: no such host
|
||||
if tfawserr.ErrMessageAndOrigErrContain(r.Error, "RequestError", "send request failed", "no such host") {
|
||||
log.Printf("[WARN] Disabling retries after next request due to networking issue")
|
||||
r.Retryable = aws.Bool(false)
|
||||
}
|
||||
// RequestError: send request failed
|
||||
// caused by: Post https://FQDN/: dial tcp IPADDRESS:443: connect: connection refused
|
||||
if tfawserr.ErrMessageAndOrigErrContain(r.Error, "RequestError", "send request failed", "connection refused") {
|
||||
log.Printf("[WARN] Disabling retries after next request due to networking issue")
|
||||
r.Retryable = aws.Bool(false)
|
||||
}
|
||||
})
|
||||
|
||||
if !c.SkipCredsValidation {
|
||||
if _, _, err := GetAccountIDAndPartitionFromSTSGetCallerIdentity(sts.New(sess)); err != nil {
|
||||
return nil, fmt.Errorf("error validating provider credentials: %w", err)
|
||||
}
|
||||
}
|
||||
|
||||
return sess, nil
|
||||
}
|
||||
|
||||
// GetSessionWithAccountIDAndPartition attempts to return valid AWS Go SDK session
|
||||
// along with account ID and partition information if available
|
||||
func GetSessionWithAccountIDAndPartition(c *Config) (*session.Session, string, string, error) {
|
||||
sess, err := GetSession(c)
|
||||
|
||||
if err != nil {
|
||||
return nil, "", "", err
|
||||
}
|
||||
|
||||
if c.AssumeRoleARN != "" {
|
||||
accountID, partition, _ := parseAccountIDAndPartitionFromARN(c.AssumeRoleARN)
|
||||
return sess, accountID, partition, nil
|
||||
}
|
||||
|
||||
iamClient := iam.New(sess)
|
||||
stsClient := sts.New(sess)
|
||||
|
||||
if !c.SkipCredsValidation {
|
||||
accountID, partition, err := GetAccountIDAndPartitionFromSTSGetCallerIdentity(stsClient)
|
||||
|
||||
if err != nil {
|
||||
return nil, "", "", fmt.Errorf("error validating provider credentials: %w", err)
|
||||
}
|
||||
|
||||
return sess, accountID, partition, nil
|
||||
}
|
||||
|
||||
if !c.SkipRequestingAccountId {
|
||||
credentialsProviderName := ""
|
||||
|
||||
if credentialsValue, err := sess.Config.Credentials.Get(); err == nil {
|
||||
credentialsProviderName = credentialsValue.ProviderName
|
||||
}
|
||||
|
||||
accountID, partition, err := GetAccountIDAndPartition(iamClient, stsClient, credentialsProviderName)
|
||||
|
||||
if err == nil {
|
||||
return sess, accountID, partition, nil
|
||||
}
|
||||
|
||||
return nil, "", "", fmt.Errorf(
|
||||
"AWS account ID not previously found and failed retrieving via all available methods. "+
|
||||
"See https://www.terraform.io/docs/providers/aws/index.html#skip_requesting_account_id for workaround and implications. "+
|
||||
"Errors: %w", err)
|
||||
}
|
||||
|
||||
var partition string
|
||||
if p, ok := endpoints.PartitionForRegion(endpoints.DefaultPartitions(), c.Region); ok {
|
||||
partition = p.ID()
|
||||
}
|
||||
|
||||
return sess, "", partition, nil
|
||||
}
|
|
@ -0,0 +1,77 @@
|
|||
package tfawserr
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"strings"
|
||||
|
||||
"github.com/aws/aws-sdk-go/aws/awserr"
|
||||
)
|
||||
|
||||
// ErrMessageAndOrigErrContain returns true if the error matches all these conditions:
|
||||
// * err is of type awserr.Error
|
||||
// * Error.Code() matches code
|
||||
// * Error.Message() contains message
|
||||
// * Error.OrigErr() contains origErrMessage
|
||||
func ErrMessageAndOrigErrContain(err error, code string, message string, origErrMessage string) bool {
|
||||
if !ErrMessageContains(err, code, message) {
|
||||
return false
|
||||
}
|
||||
|
||||
if origErrMessage == "" {
|
||||
return true
|
||||
}
|
||||
|
||||
// Ensure OrigErr() is non-nil, to prevent panics
|
||||
if origErr := err.(awserr.Error).OrigErr(); origErr != nil {
|
||||
return strings.Contains(origErr.Error(), origErrMessage)
|
||||
}
|
||||
|
||||
return false
|
||||
}
|
||||
|
||||
// ErrCodeEquals returns true if the error matches all these conditions:
|
||||
// * err is of type awserr.Error
|
||||
// * Error.Code() equals code
|
||||
func ErrCodeEquals(err error, code string) bool {
|
||||
var awsErr awserr.Error
|
||||
if errors.As(err, &awsErr) {
|
||||
return awsErr.Code() == code
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
// ErrCodeContains returns true if the error matches all these conditions:
|
||||
// * err is of type awserr.Error
|
||||
// * Error.Code() contains code
|
||||
func ErrCodeContains(err error, code string) bool {
|
||||
var awsErr awserr.Error
|
||||
if errors.As(err, &awsErr) {
|
||||
return strings.Contains(awsErr.Code(), code)
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
// ErrMessageContains returns true if the error matches all these conditions:
|
||||
// * err is of type awserr.Error
|
||||
// * Error.Code() equals code
|
||||
// * Error.Message() contains message
|
||||
func ErrMessageContains(err error, code string, message string) bool {
|
||||
var awsErr awserr.Error
|
||||
if errors.As(err, &awsErr) {
|
||||
return awsErr.Code() == code && strings.Contains(awsErr.Message(), message)
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
// ErrStatusCodeEquals returns true if the error matches all these conditions:
|
||||
// * err is of type awserr.RequestFailure
|
||||
// * RequestFailure.StatusCode() equals statusCode
|
||||
// It is always preferable to use ErrMessageContains() except in older APIs (e.g. S3)
|
||||
// that sometimes only respond with status codes.
|
||||
func ErrStatusCodeEquals(err error, statusCode int) bool {
|
||||
var awsErr awserr.RequestFailure
|
||||
if errors.As(err, &awsErr) {
|
||||
return awsErr.StatusCode() == statusCode
|
||||
}
|
||||
return false
|
||||
}
|
|
@ -0,0 +1,44 @@
|
|||
package awsbase
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
|
||||
"github.com/aws/aws-sdk-go/aws/endpoints"
|
||||
)
|
||||
|
||||
// ValidateAccountID checks if the given AWS account ID is specifically allowed or forbidden.
|
||||
// The allowedAccountIDs can be used as a whitelist and forbiddenAccountIDs can be used as a blacklist.
|
||||
func ValidateAccountID(accountID string, allowedAccountIDs, forbiddenAccountIDs []string) error {
|
||||
if len(forbiddenAccountIDs) > 0 {
|
||||
for _, forbiddenAccountID := range forbiddenAccountIDs {
|
||||
if accountID == forbiddenAccountID {
|
||||
return fmt.Errorf("Forbidden AWS Account ID: %s", accountID)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if len(allowedAccountIDs) > 0 {
|
||||
for _, allowedAccountID := range allowedAccountIDs {
|
||||
if accountID == allowedAccountID {
|
||||
return nil
|
||||
}
|
||||
}
|
||||
|
||||
return fmt.Errorf("AWS Account ID not allowed: %s", accountID)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// ValidateRegion checks if the given region is a valid AWS region.
|
||||
func ValidateRegion(region string) error {
|
||||
for _, partition := range endpoints.DefaultPartitions() {
|
||||
for _, partitionRegion := range partition.Regions() {
|
||||
if region == partitionRegion.ID() {
|
||||
return nil
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return fmt.Errorf("Invalid AWS Region: %s", region)
|
||||
}
|
|
@ -291,6 +291,9 @@ github.com/gophercloud/utils/openstack/compute/v2/flavors
|
|||
github.com/grpc-ecosystem/go-grpc-middleware
|
||||
# github.com/hako/durafmt v0.0.0-20200710122514-c0fb7b4da026
|
||||
github.com/hako/durafmt
|
||||
# github.com/hashicorp/aws-sdk-go-base v0.6.0
|
||||
github.com/hashicorp/aws-sdk-go-base
|
||||
github.com/hashicorp/aws-sdk-go-base/tfawserr
|
||||
# github.com/hashicorp/consul/api v1.4.0
|
||||
github.com/hashicorp/consul/api
|
||||
# github.com/hashicorp/errwrap v1.0.0
|
||||
|
|
|
@ -38,6 +38,8 @@
|
|||
|
||||
- `skip_metadata_api_check` (bool) - Skip Metadata Api Check
|
||||
|
||||
- `skip_credential_validation` (bool) - Set to true if you want to skip validating AWS credentials before runtime.
|
||||
|
||||
- `token` (string) - The access token to use. This is different from the
|
||||
access key and secret key. If you're not sure what this is, then you
|
||||
probably don't need it. This will also be read from the AWS_SESSION_TOKEN
|
||||
|
|
Loading…
Reference in New Issue