2022-05-04 19:24:19 +02:00
|
|
|
package awsapi
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"encoding/xml"
|
|
|
|
"fmt"
|
2022-08-21 23:13:44 +02:00
|
|
|
"io"
|
2022-05-04 19:24:19 +02:00
|
|
|
"net/http"
|
|
|
|
"net/url"
|
|
|
|
"os"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/logger"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Config represent aws access configuration.
|
|
|
|
type Config struct {
|
2023-12-20 18:05:39 +01:00
|
|
|
client *http.Client
|
|
|
|
region string
|
|
|
|
roleARN string
|
|
|
|
|
|
|
|
// IRSA may use a different role for assume API call.
|
|
|
|
// It can only be set via AWS_ROLE_ARN env variable.
|
|
|
|
// See https://docs.aws.amazon.com/eks/latest/userguide/pod-configuration.html
|
|
|
|
irsaRoleARN string
|
|
|
|
|
2022-05-04 19:24:19 +02:00
|
|
|
webTokenPath string
|
|
|
|
|
|
|
|
ec2Endpoint string
|
|
|
|
stsEndpoint string
|
2022-05-18 14:58:31 +02:00
|
|
|
service string
|
2022-05-04 19:24:19 +02:00
|
|
|
|
|
|
|
// these keys are needed for obtaining creds.
|
|
|
|
defaultAccessKey string
|
|
|
|
defaultSecretKey string
|
|
|
|
|
|
|
|
// Real credentials used for accessing EC2 API.
|
|
|
|
creds *credentials
|
|
|
|
credsLock sync.Mutex
|
|
|
|
}
|
|
|
|
|
|
|
|
// credentials represent aws api credentials.
|
|
|
|
type credentials struct {
|
|
|
|
AccessKeyID string
|
|
|
|
SecretAccessKey string
|
|
|
|
Token string
|
|
|
|
Expiration time.Time
|
|
|
|
}
|
|
|
|
|
2022-08-05 17:50:00 +02:00
|
|
|
// NewConfig returns new AWS Config from the given args.
|
|
|
|
func NewConfig(ec2Endpoint, stsEndpoint, region, roleARN, accessKey, secretKey, service string) (*Config, error) {
|
2022-05-04 19:24:19 +02:00
|
|
|
cfg := &Config{
|
2022-05-05 09:21:56 +02:00
|
|
|
client: http.DefaultClient,
|
|
|
|
region: region,
|
|
|
|
roleARN: roleARN,
|
2023-12-20 18:05:39 +01:00
|
|
|
irsaRoleARN: os.Getenv("AWS_ROLE_ARN"),
|
2022-05-18 14:58:31 +02:00
|
|
|
service: service,
|
2022-05-05 09:21:56 +02:00
|
|
|
defaultAccessKey: os.Getenv("AWS_ACCESS_KEY_ID"),
|
|
|
|
defaultSecretKey: os.Getenv("AWS_SECRET_ACCESS_KEY"),
|
2022-05-04 19:24:19 +02:00
|
|
|
}
|
2022-05-18 14:58:31 +02:00
|
|
|
if cfg.service == "" {
|
|
|
|
cfg.service = "aps"
|
|
|
|
}
|
2022-05-04 19:24:19 +02:00
|
|
|
if cfg.region == "" {
|
|
|
|
r, err := getDefaultRegion(cfg.client)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot determine default AWS region: %w", err)
|
|
|
|
}
|
|
|
|
cfg.region = r
|
|
|
|
}
|
2022-08-05 17:50:00 +02:00
|
|
|
cfg.ec2Endpoint = buildAPIEndpoint(ec2Endpoint, cfg.region, "ec2")
|
|
|
|
cfg.stsEndpoint = buildAPIEndpoint(stsEndpoint, cfg.region, "sts")
|
2022-05-04 19:24:19 +02:00
|
|
|
if cfg.roleARN == "" {
|
|
|
|
cfg.roleARN = os.Getenv("AWS_ROLE_ARN")
|
|
|
|
}
|
|
|
|
cfg.webTokenPath = os.Getenv("AWS_WEB_IDENTITY_TOKEN_FILE")
|
2023-12-20 18:05:39 +01:00
|
|
|
if cfg.webTokenPath != "" && cfg.irsaRoleARN == "" {
|
2022-05-04 19:24:19 +02:00
|
|
|
return nil, fmt.Errorf("roleARN is missing for AWS_WEB_IDENTITY_TOKEN_FILE=%q; set it via env var AWS_ROLE_ARN", cfg.webTokenPath)
|
|
|
|
}
|
|
|
|
// explicitly set credentials has priority over env variables
|
|
|
|
if len(accessKey) > 0 {
|
|
|
|
cfg.defaultAccessKey = accessKey
|
|
|
|
}
|
|
|
|
if len(secretKey) > 0 {
|
|
|
|
cfg.defaultSecretKey = secretKey
|
|
|
|
}
|
|
|
|
cfg.creds = &credentials{
|
|
|
|
AccessKeyID: cfg.defaultAccessKey,
|
|
|
|
SecretAccessKey: cfg.defaultSecretKey,
|
|
|
|
}
|
2023-12-20 18:05:39 +01:00
|
|
|
|
2022-05-04 19:24:19 +02:00
|
|
|
return cfg, nil
|
|
|
|
}
|
|
|
|
|
2022-09-30 19:48:29 +02:00
|
|
|
// GetRegion returns region for the given cfg.
|
|
|
|
func (cfg *Config) GetRegion() string {
|
|
|
|
return cfg.region
|
|
|
|
}
|
|
|
|
|
2022-05-04 19:24:19 +02:00
|
|
|
// GetEC2APIResponse performs EC2 API request with ghe given action.
|
2022-05-05 09:21:56 +02:00
|
|
|
//
|
|
|
|
// filtersQueryString must contain an optional percent-encoded query string for aws filters.
|
2022-05-05 09:59:28 +02:00
|
|
|
// This string can be obtained by calling GetFiltersQueryString().
|
2022-05-05 09:21:56 +02:00
|
|
|
// See https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeInstances.html for examples.
|
|
|
|
// See also https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_Filter.html
|
|
|
|
func (cfg *Config) GetEC2APIResponse(action, filtersQueryString, nextPageToken string) ([]byte, error) {
|
2022-05-04 19:24:19 +02:00
|
|
|
ac, err := cfg.getFreshAPICredentials()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
apiURL := fmt.Sprintf("%s?Action=%s", cfg.ec2Endpoint, url.QueryEscape(action))
|
2022-05-05 09:21:56 +02:00
|
|
|
if len(filtersQueryString) > 0 {
|
|
|
|
apiURL += "&" + filtersQueryString
|
2022-05-04 19:24:19 +02:00
|
|
|
}
|
|
|
|
if len(nextPageToken) > 0 {
|
|
|
|
apiURL += fmt.Sprintf("&NextToken=%s", url.QueryEscape(nextPageToken))
|
|
|
|
}
|
2023-01-24 10:42:55 +01:00
|
|
|
apiURL += "&Version=2016-11-15"
|
2022-05-04 19:24:19 +02:00
|
|
|
req, err := newSignedGetRequest(apiURL, "ec2", cfg.region, ac)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot create signed request: %w", err)
|
|
|
|
}
|
|
|
|
resp, err := cfg.client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot perform http request to %q: %w", apiURL, err)
|
|
|
|
}
|
|
|
|
return readResponseBody(resp, apiURL)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SignRequest signs request for service access and payloadHash.
|
2022-05-18 14:58:31 +02:00
|
|
|
func (cfg *Config) SignRequest(req *http.Request, payloadHash string) error {
|
2022-05-04 19:24:19 +02:00
|
|
|
ac, err := cfg.getFreshAPICredentials()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-05-18 14:58:31 +02:00
|
|
|
return signRequestWithTime(req, cfg.service, cfg.region, payloadHash, ac, time.Now().UTC())
|
2022-05-04 19:24:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func readResponseBody(resp *http.Response, apiURL string) ([]byte, error) {
|
2022-08-21 23:13:44 +02:00
|
|
|
data, err := io.ReadAll(resp.Body)
|
2022-05-04 19:24:19 +02:00
|
|
|
_ = resp.Body.Close()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot read response from %q: %w", apiURL, err)
|
|
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
return nil, fmt.Errorf("unexpected status code for %q; got %d; want %d; response body: %q",
|
|
|
|
apiURL, resp.StatusCode, http.StatusOK, data)
|
|
|
|
}
|
|
|
|
return data, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func getDefaultRegion(client *http.Client) (string, error) {
|
|
|
|
envRegion := os.Getenv("AWS_REGION")
|
|
|
|
if envRegion != "" {
|
|
|
|
return envRegion, nil
|
|
|
|
}
|
|
|
|
data, err := getMetadataByPath(client, "dynamic/instance-identity/document")
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
var id IdentityDocument
|
|
|
|
if err := json.Unmarshal(data, &id); err != nil {
|
|
|
|
return "", fmt.Errorf("cannot parse identity document: %w", err)
|
|
|
|
}
|
|
|
|
return id.Region, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// IdentityDocument is identity document returned from AWS metadata server.
|
|
|
|
//
|
|
|
|
// See https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html
|
|
|
|
type IdentityDocument struct {
|
|
|
|
Region string
|
|
|
|
}
|
|
|
|
|
|
|
|
// getFreshAPICredentials returns fresh EC2 API credentials.
|
|
|
|
//
|
|
|
|
// The credentials are refreshed if needed.
|
|
|
|
func (cfg *Config) getFreshAPICredentials() (*credentials, error) {
|
|
|
|
cfg.credsLock.Lock()
|
|
|
|
defer cfg.credsLock.Unlock()
|
|
|
|
|
|
|
|
if len(cfg.defaultAccessKey) > 0 && len(cfg.defaultSecretKey) > 0 && len(cfg.roleARN) == 0 {
|
|
|
|
// There is no need in refreshing statically set api credentials if roleARN isn't set.
|
|
|
|
return cfg.creds, nil
|
|
|
|
}
|
|
|
|
if time.Until(cfg.creds.Expiration) > 10*time.Second {
|
|
|
|
// credentials aren't expired yet.
|
|
|
|
return cfg.creds, nil
|
|
|
|
}
|
|
|
|
// credentials have been expired. Update them.
|
|
|
|
ac, err := cfg.getAPICredentials()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot obtain new EC2 API credentials: %w", err)
|
|
|
|
}
|
|
|
|
cfg.creds = ac
|
|
|
|
return ac, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getAPICredentials obtains new EC2 API credentials from instance metadata and role_arn.
|
|
|
|
func (cfg *Config) getAPICredentials() (*credentials, error) {
|
|
|
|
acNew := &credentials{
|
|
|
|
AccessKeyID: cfg.defaultAccessKey,
|
|
|
|
SecretAccessKey: cfg.defaultSecretKey,
|
|
|
|
}
|
|
|
|
if len(cfg.webTokenPath) > 0 {
|
2022-08-21 22:51:13 +02:00
|
|
|
token, err := os.ReadFile(cfg.webTokenPath)
|
2022-05-04 19:24:19 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot read webToken from path: %q, err: %w", cfg.webTokenPath, err)
|
|
|
|
}
|
2023-12-20 18:05:39 +01:00
|
|
|
return cfg.getRoleWebIdentityCredentials(string(token), cfg.irsaRoleARN)
|
2022-05-04 19:24:19 +02:00
|
|
|
}
|
|
|
|
if ecsMetaURI := os.Getenv("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI"); len(ecsMetaURI) > 0 {
|
|
|
|
path := "http://169.254.170.2" + ecsMetaURI
|
2022-07-18 11:33:52 +02:00
|
|
|
ac, err := getECSRoleCredentialsByPath(cfg.client, path)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot obtain ECS role credentials: %w", err)
|
|
|
|
}
|
|
|
|
acNew = ac
|
2022-05-04 19:24:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// we need instance credentials if dont have access keys
|
|
|
|
if len(acNew.AccessKeyID) == 0 && len(acNew.SecretAccessKey) == 0 {
|
|
|
|
ac, err := getInstanceRoleCredentials(cfg.client)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot obtain instance role credentials: %w", err)
|
|
|
|
}
|
|
|
|
acNew = ac
|
|
|
|
}
|
|
|
|
|
|
|
|
// read credentials from sts api, if role_arn is defined
|
|
|
|
if len(cfg.roleARN) > 0 {
|
2023-12-20 18:05:39 +01:00
|
|
|
ac, err := cfg.getRoleARNCredentials(acNew, cfg.roleARN)
|
2022-05-04 19:24:19 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot get credentials for role_arn %q: %w", cfg.roleARN, err)
|
|
|
|
}
|
|
|
|
acNew = ac
|
|
|
|
}
|
|
|
|
if len(acNew.AccessKeyID) == 0 {
|
|
|
|
return nil, fmt.Errorf("missing AWS access_key; it may be set via env var AWS_ACCESS_KEY_ID or use instance iam role")
|
|
|
|
}
|
|
|
|
if len(acNew.SecretAccessKey) == 0 {
|
|
|
|
return nil, fmt.Errorf("missing AWS secret_key; it may be set via env var AWS_SECRET_ACCESS_KEY or use instance iam role")
|
|
|
|
}
|
|
|
|
return acNew, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getECSRoleCredentialsByPath makes request to ecs metadata service
|
2023-02-13 13:27:13 +01:00
|
|
|
// and retrieves instances credentials
|
2022-05-04 19:24:19 +02:00
|
|
|
// https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-iam-roles.html
|
|
|
|
func getECSRoleCredentialsByPath(client *http.Client, path string) (*credentials, error) {
|
|
|
|
resp, err := client.Get(path)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot get ECS instance role credentials: %w", err)
|
|
|
|
}
|
|
|
|
data, err := readResponseBody(resp, path)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return parseMetadataSecurityCredentials(data)
|
|
|
|
}
|
|
|
|
|
|
|
|
// getInstanceRoleCredentials makes request to local ec2 instance metadata service
|
|
|
|
// and tries to retrieve credentials from assigned iam role.
|
|
|
|
//
|
|
|
|
// See https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html
|
|
|
|
func getInstanceRoleCredentials(client *http.Client) (*credentials, error) {
|
|
|
|
instanceRoleName, err := getMetadataByPath(client, "meta-data/iam/security-credentials/")
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot get instanceRoleName: %w", err)
|
|
|
|
}
|
|
|
|
data, err := getMetadataByPath(client, "meta-data/iam/security-credentials/"+string(instanceRoleName))
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot get security credentails for instanceRoleName %q: %w", instanceRoleName, err)
|
|
|
|
}
|
|
|
|
return parseMetadataSecurityCredentials(data)
|
|
|
|
}
|
|
|
|
|
|
|
|
// parseMetadataSecurityCredentials parses apiCredentials from metadata response to http://169.254.169.254/latest/meta-data/iam/security-credentials/*
|
|
|
|
//
|
|
|
|
// See https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html
|
|
|
|
func parseMetadataSecurityCredentials(data []byte) (*credentials, error) {
|
|
|
|
var msc MetadataSecurityCredentials
|
|
|
|
if err := json.Unmarshal(data, &msc); err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot parse metadata security credentials from %q: %w", data, err)
|
|
|
|
}
|
|
|
|
return &credentials{
|
|
|
|
AccessKeyID: msc.AccessKeyID,
|
|
|
|
SecretAccessKey: msc.SecretAccessKey,
|
|
|
|
Token: msc.Token,
|
|
|
|
Expiration: msc.Expiration,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// MetadataSecurityCredentials represents credentials obtained from http://169.254.169.254/latest/meta-data/iam/security-credentials/*
|
|
|
|
//
|
|
|
|
// See https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html
|
|
|
|
type MetadataSecurityCredentials struct {
|
|
|
|
AccessKeyID string `json:"AccessKeyId"`
|
|
|
|
SecretAccessKey string `json:"SecretAccessKey"`
|
|
|
|
Token string `json:"Token"`
|
|
|
|
Expiration time.Time `json:"Expiration"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// getMetadataByPath returns instance metadata by url path
|
|
|
|
func getMetadataByPath(client *http.Client, apiPath string) ([]byte, error) {
|
|
|
|
// See https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html
|
|
|
|
|
|
|
|
// Obtain session token
|
|
|
|
sessionTokenURL := "http://169.254.169.254/latest/api/token"
|
2023-02-23 03:53:05 +01:00
|
|
|
req, err := http.NewRequest(http.MethodPut, sessionTokenURL, nil)
|
2022-05-04 19:24:19 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot create request for IMDSv2 session token at url %q: %w", sessionTokenURL, err)
|
|
|
|
}
|
|
|
|
req.Header.Set("X-aws-ec2-metadata-token-ttl-seconds", "60")
|
|
|
|
resp, err := client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot obtain IMDSv2 session token from %q: %w", sessionTokenURL, err)
|
|
|
|
}
|
|
|
|
token, err := readResponseBody(resp, sessionTokenURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot read IMDSv2 session token from %q: %w", sessionTokenURL, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Use session token in the request.
|
|
|
|
apiURL := "http://169.254.169.254/latest/" + apiPath
|
2023-02-23 03:53:05 +01:00
|
|
|
req, err = http.NewRequest(http.MethodGet, apiURL, nil)
|
2022-05-04 19:24:19 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot create request to %q: %w", apiURL, err)
|
|
|
|
}
|
|
|
|
req.Header.Set("X-aws-ec2-metadata-token", string(token))
|
|
|
|
resp, err = client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot obtain response for %q: %w", apiURL, err)
|
|
|
|
}
|
|
|
|
return readResponseBody(resp, apiURL)
|
|
|
|
}
|
|
|
|
|
2023-02-13 13:27:13 +01:00
|
|
|
// getRoleWebIdentityCredentials obtains credentials for the given roleARN with webToken.
|
2023-12-20 18:05:39 +01:00
|
|
|
//
|
2022-05-04 19:24:19 +02:00
|
|
|
// https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithWebIdentity.html
|
|
|
|
// aws IRSA for kubernetes.
|
|
|
|
// https://aws.amazon.com/blogs/opensource/introducing-fine-grained-iam-roles-service-accounts/
|
2023-12-20 18:05:39 +01:00
|
|
|
func (cfg *Config) getRoleWebIdentityCredentials(token, roleARN string) (*credentials, error) {
|
|
|
|
data, err := cfg.getSTSAPIResponse("AssumeRoleWithWebIdentity", roleARN, func(apiURL string) (*http.Request, error) {
|
2022-05-04 19:24:19 +02:00
|
|
|
apiURL += fmt.Sprintf("&WebIdentityToken=%s", url.QueryEscape(token))
|
2023-02-23 03:53:05 +01:00
|
|
|
return http.NewRequest(http.MethodGet, apiURL, nil)
|
2022-05-04 19:24:19 +02:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-12-20 18:05:39 +01:00
|
|
|
creds, err := parseARNCredentials(data, "AssumeRoleWithWebIdentity")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if roleARN != cfg.roleARN {
|
|
|
|
// need to assume a different role
|
|
|
|
assumeCreds, err := cfg.getRoleARNCredentials(creds, cfg.roleARN)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot assume chained role=%q for roleARN=%q: %w", cfg.roleARN, roleARN, err)
|
|
|
|
}
|
|
|
|
if assumeCreds.Expiration.After(creds.Expiration) {
|
|
|
|
assumeCreds.Expiration = creds.Expiration
|
|
|
|
}
|
|
|
|
return assumeCreds, nil
|
|
|
|
}
|
|
|
|
return creds, nil
|
2022-05-04 19:24:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// getSTSAPIResponse makes request to aws sts api with the given cfg and returns temporary credentials with expiration time.
|
|
|
|
//
|
|
|
|
// See https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html
|
2023-12-20 18:05:39 +01:00
|
|
|
func (cfg *Config) getSTSAPIResponse(action string, roleARN string, reqBuilder func(apiURL string) (*http.Request, error)) ([]byte, error) {
|
2022-05-04 19:24:19 +02:00
|
|
|
// See https://docs.aws.amazon.com/AWSEC2/latest/APIReference/Query-Requests.html
|
|
|
|
apiURL := fmt.Sprintf("%s?Action=%s", cfg.stsEndpoint, action)
|
|
|
|
apiURL += "&Version=2011-06-15"
|
2023-12-20 18:05:39 +01:00
|
|
|
apiURL += fmt.Sprintf("&RoleArn=%s", roleARN)
|
2022-05-04 19:24:19 +02:00
|
|
|
// we have to provide unique session name for cloudtrail audit
|
|
|
|
apiURL += "&RoleSessionName=vmagent-ec2-discovery"
|
|
|
|
req, err := reqBuilder(apiURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot create signed request: %w", err)
|
|
|
|
}
|
|
|
|
resp, err := cfg.client.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot perform http request to %q: %w", apiURL, err)
|
|
|
|
}
|
|
|
|
return readResponseBody(resp, apiURL)
|
|
|
|
}
|
|
|
|
|
2023-02-13 13:27:13 +01:00
|
|
|
// getRoleARNCredentials obtains credentials for the given roleARN.
|
2023-12-20 18:05:39 +01:00
|
|
|
func (cfg *Config) getRoleARNCredentials(creds *credentials, roleARN string) (*credentials, error) {
|
|
|
|
data, err := cfg.getSTSAPIResponse("AssumeRole", roleARN, func(apiURL string) (*http.Request, error) {
|
2022-05-04 19:24:19 +02:00
|
|
|
return newSignedGetRequest(apiURL, "sts", cfg.region, creds)
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return parseARNCredentials(data, "AssumeRole")
|
|
|
|
}
|
|
|
|
|
|
|
|
// parseARNCredentials parses apiCredentials from AssumeRole response.
|
|
|
|
//
|
|
|
|
// See https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html
|
|
|
|
func parseARNCredentials(data []byte, role string) (*credentials, error) {
|
|
|
|
var arr AssumeRoleResponse
|
|
|
|
if err := xml.Unmarshal(data, &arr); err != nil {
|
|
|
|
return nil, fmt.Errorf("cannot parse AssumeRoleResponse response from %q: %w", data, err)
|
|
|
|
}
|
|
|
|
var cred assumeCredentials
|
|
|
|
switch role {
|
|
|
|
case "AssumeRole":
|
|
|
|
cred = arr.AssumeRoleResult.Credentials
|
|
|
|
case "AssumeRoleWithWebIdentity":
|
|
|
|
cred = arr.AssumeRoleWithWebIdentityResult.Credentials
|
|
|
|
default:
|
|
|
|
logger.Panicf("BUG: unexpected role: %q", role)
|
|
|
|
}
|
|
|
|
return &credentials{
|
|
|
|
AccessKeyID: cred.AccessKeyID,
|
|
|
|
SecretAccessKey: cred.SecretAccessKey,
|
|
|
|
Token: cred.SessionToken,
|
|
|
|
Expiration: cred.Expiration,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type assumeCredentials struct {
|
|
|
|
AccessKeyID string `xml:"AccessKeyId"`
|
|
|
|
SecretAccessKey string `xml:"SecretAccessKey"`
|
|
|
|
SessionToken string `xml:"SessionToken"`
|
|
|
|
Expiration time.Time `xml:"Expiration"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// AssumeRoleResponse represents AssumeRole response
|
|
|
|
//
|
|
|
|
// See https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html
|
|
|
|
type AssumeRoleResponse struct {
|
|
|
|
AssumeRoleResult struct {
|
|
|
|
Credentials assumeCredentials `xml:"Credentials"`
|
|
|
|
} `xml:"AssumeRoleResult"`
|
|
|
|
AssumeRoleWithWebIdentityResult struct {
|
|
|
|
Credentials assumeCredentials `xml:"Credentials"`
|
|
|
|
} `xml:"AssumeRoleWithWebIdentityResult"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// buildAPIEndpoint creates endpoint for aws api access
|
|
|
|
func buildAPIEndpoint(customEndpoint, region, service string) string {
|
|
|
|
// See https://docs.aws.amazon.com/AWSEC2/latest/APIReference/Query-Requests.html
|
|
|
|
if len(customEndpoint) == 0 {
|
|
|
|
return fmt.Sprintf("https://%s.%s.amazonaws.com/", service, region)
|
|
|
|
}
|
|
|
|
endpoint := customEndpoint
|
|
|
|
// endpoint may contain only hostname. Convert it to proper url then.
|
|
|
|
if !strings.Contains(endpoint, "://") {
|
|
|
|
endpoint = "https://" + endpoint
|
|
|
|
}
|
|
|
|
if !strings.HasSuffix(endpoint, "/") {
|
|
|
|
endpoint += "/"
|
|
|
|
}
|
|
|
|
return endpoint
|
|
|
|
}
|
2022-05-05 09:59:28 +02:00
|
|
|
|
|
|
|
// GetFiltersQueryString returns query string formed from the given filters.
|
2022-05-09 14:33:19 +02:00
|
|
|
func GetFiltersQueryString(filters []Filter) string {
|
2022-05-05 09:59:28 +02:00
|
|
|
// See how to build filters query string at examples at https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeInstances.html
|
|
|
|
var args []string
|
|
|
|
for i, f := range filters {
|
|
|
|
args = append(args, fmt.Sprintf("Filter.%d.Name=%s", i+1, url.QueryEscape(f.Name)))
|
|
|
|
for j, v := range f.Values {
|
|
|
|
args = append(args, fmt.Sprintf("Filter.%d.Value.%d=%s", i+1, j+1, url.QueryEscape(v)))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return strings.Join(args, "&")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Filter is ec2 filter.
|
|
|
|
//
|
|
|
|
// See https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeInstances.html
|
|
|
|
// and https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_Filter.html
|
|
|
|
type Filter struct {
|
|
|
|
Name string `yaml:"name"`
|
|
|
|
Values []string `yaml:"values"`
|
|
|
|
}
|