aws-mfa-secure 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +16 -0
- data/.rspec +3 -0
- data/CHANGELOG.md +7 -0
- data/Gemfile +6 -0
- data/Gemfile.lock +82 -0
- data/Guardfile +19 -0
- data/LICENSE.txt +22 -0
- data/README.md +126 -0
- data/Rakefile +14 -0
- data/aws-mfa-secure.gemspec +33 -0
- data/docs/how-it-works.md +19 -0
- data/exe/aws-mfa-secure +14 -0
- data/lib/aws-mfa-secure.rb +1 -0
- data/lib/aws_mfa_secure.rb +12 -0
- data/lib/aws_mfa_secure/autoloader.rb +22 -0
- data/lib/aws_mfa_secure/base.rb +128 -0
- data/lib/aws_mfa_secure/cli.rb +38 -0
- data/lib/aws_mfa_secure/command.rb +82 -0
- data/lib/aws_mfa_secure/completer.rb +159 -0
- data/lib/aws_mfa_secure/completer/script.rb +6 -0
- data/lib/aws_mfa_secure/completer/script.sh +10 -0
- data/lib/aws_mfa_secure/credentials.rb +35 -0
- data/lib/aws_mfa_secure/exports.rb +30 -0
- data/lib/aws_mfa_secure/ext/aws.rb +20 -0
- data/lib/aws_mfa_secure/help.rb +9 -0
- data/lib/aws_mfa_secure/help/completion.md +20 -0
- data/lib/aws_mfa_secure/help/completion_script.md +3 -0
- data/lib/aws_mfa_secure/help/exports.md +29 -0
- data/lib/aws_mfa_secure/help/session.md +4 -0
- data/lib/aws_mfa_secure/help/unsets.md +17 -0
- data/lib/aws_mfa_secure/session.rb +26 -0
- data/lib/aws_mfa_secure/unsets.rb +19 -0
- data/lib/aws_mfa_secure/version.rb +3 -0
- data/spec/fixtures/aws-mfa-secure-sessions/fake_credentials +6 -0
- data/spec/lib/cli_spec.rb +18 -0
- data/spec/monkey_patches.rb +20 -0
- data/spec/spec_helper.rb +29 -0
- metadata +239 -0
@@ -0,0 +1,38 @@
|
|
1
|
+
module AwsMfaSecure
|
2
|
+
class CLI < Command
|
3
|
+
desc "session *ARGV", "Calls aws cli with a MFA secure session"
|
4
|
+
long_desc Help.text(:session)
|
5
|
+
def session(*argv)
|
6
|
+
Session.new(options, *argv).run
|
7
|
+
end
|
8
|
+
|
9
|
+
desc "exports", "Generate export statements that can be eval"
|
10
|
+
long_desc Help.text(:exports)
|
11
|
+
def exports
|
12
|
+
Exports.new(options).run
|
13
|
+
end
|
14
|
+
|
15
|
+
desc "unsets", "Generate unsets statements that can be eval"
|
16
|
+
long_desc Help.text(:unsets)
|
17
|
+
def unsets
|
18
|
+
Unsets.new(options).run
|
19
|
+
end
|
20
|
+
|
21
|
+
desc "completion *PARAMS", "Prints words for auto-completion."
|
22
|
+
long_desc Help.text("completion")
|
23
|
+
def completion(*params)
|
24
|
+
Completer.new(CLI, *params).run
|
25
|
+
end
|
26
|
+
|
27
|
+
desc "completion_script", "Generates a script that can be eval to setup auto-completion."
|
28
|
+
long_desc Help.text("completion_script")
|
29
|
+
def completion_script
|
30
|
+
Completer::Script.generate
|
31
|
+
end
|
32
|
+
|
33
|
+
desc "version", "prints version"
|
34
|
+
def version
|
35
|
+
puts VERSION
|
36
|
+
end
|
37
|
+
end
|
38
|
+
end
|
@@ -0,0 +1,82 @@
|
|
1
|
+
require "thor"
|
2
|
+
|
3
|
+
# Override thor's long_desc identation behavior
|
4
|
+
# https://github.com/erikhuda/thor/issues/398
|
5
|
+
class Thor
|
6
|
+
module Shell
|
7
|
+
class Basic
|
8
|
+
def print_wrapped(message, options = {})
|
9
|
+
message = "\n#{message}" unless message[0] == "\n"
|
10
|
+
stdout.puts message
|
11
|
+
end
|
12
|
+
end
|
13
|
+
end
|
14
|
+
end
|
15
|
+
|
16
|
+
module AwsMfaSecure
|
17
|
+
class Command < Thor
|
18
|
+
class << self
|
19
|
+
def dispatch(m, args, options, config)
|
20
|
+
# Allow calling for help via:
|
21
|
+
# aws-mfa-secure command help
|
22
|
+
# aws-mfa-secure command -h
|
23
|
+
# aws-mfa-secure command --help
|
24
|
+
# aws-mfa-secure command -D
|
25
|
+
#
|
26
|
+
# as well thor's normal way:
|
27
|
+
#
|
28
|
+
# aws-mfa-secure help command
|
29
|
+
help_flags = Thor::HELP_MAPPINGS + ["help"]
|
30
|
+
if args.length > 1 && !(args & help_flags).empty?
|
31
|
+
args -= help_flags
|
32
|
+
args.insert(-2, "help")
|
33
|
+
end
|
34
|
+
|
35
|
+
# aws-mfa-secure version
|
36
|
+
# aws-mfa-secure --version
|
37
|
+
# aws-mfa-secure -v
|
38
|
+
version_flags = ["--version", "-v"]
|
39
|
+
if args.length == 1 && !(args & version_flags).empty?
|
40
|
+
args = ["version"]
|
41
|
+
end
|
42
|
+
|
43
|
+
super
|
44
|
+
end
|
45
|
+
|
46
|
+
# Override command_help to include the description at the top of the
|
47
|
+
# long_description.
|
48
|
+
def command_help(shell, command_name)
|
49
|
+
meth = normalize_command_name(command_name)
|
50
|
+
command = all_commands[meth]
|
51
|
+
alter_command_description(command)
|
52
|
+
super
|
53
|
+
end
|
54
|
+
|
55
|
+
def alter_command_description(command)
|
56
|
+
return unless command
|
57
|
+
|
58
|
+
# Add description to beginning of long_description
|
59
|
+
long_desc = if command.long_description
|
60
|
+
"#{command.description}\n\n#{command.long_description}"
|
61
|
+
else
|
62
|
+
command.description
|
63
|
+
end
|
64
|
+
|
65
|
+
# add reference url to end of the long_description
|
66
|
+
unless website.empty?
|
67
|
+
full_command = [command.ancestor_name, command.name].compact.join('-')
|
68
|
+
url = "#{website}/reference/aws-mfa-secure-#{full_command}"
|
69
|
+
long_desc += "\n\nHelp also available at: #{url}"
|
70
|
+
end
|
71
|
+
|
72
|
+
command.long_description = long_desc
|
73
|
+
end
|
74
|
+
private :alter_command_description
|
75
|
+
|
76
|
+
# meant to be overriden
|
77
|
+
def website
|
78
|
+
""
|
79
|
+
end
|
80
|
+
end
|
81
|
+
end
|
82
|
+
end
|
@@ -0,0 +1,159 @@
|
|
1
|
+
=begin
|
2
|
+
Code Explanation:
|
3
|
+
|
4
|
+
There are 3 types of things to auto-complete:
|
5
|
+
|
6
|
+
1. command: the command itself
|
7
|
+
2. parameters: command parameters.
|
8
|
+
3. options: command options
|
9
|
+
|
10
|
+
Here's an example:
|
11
|
+
|
12
|
+
mycli hello name --from me
|
13
|
+
|
14
|
+
* command: hello
|
15
|
+
* parameters: name
|
16
|
+
* option: --from
|
17
|
+
|
18
|
+
When command parameters are done processing, the remaining completion words will be options. We can tell that the command params are completed based on the method arity.
|
19
|
+
|
20
|
+
## Arity
|
21
|
+
|
22
|
+
For example, say you had a method for a CLI command with the following form:
|
23
|
+
|
24
|
+
ufo scale service count --cluster development
|
25
|
+
|
26
|
+
It's equivalent ruby method:
|
27
|
+
|
28
|
+
scale(service, count) = has an arity of 2
|
29
|
+
|
30
|
+
So typing:
|
31
|
+
|
32
|
+
ufo scale service count [TAB] # there are 3 parameters including the "scale" command according to Thor's CLI processing.
|
33
|
+
|
34
|
+
So the completion should only show options, something like this:
|
35
|
+
|
36
|
+
--noop --verbose --cluster
|
37
|
+
|
38
|
+
## Splat Arguments
|
39
|
+
|
40
|
+
When the ruby method has a splat argument, it's arity is negative. Here are some example methods and their arities.
|
41
|
+
|
42
|
+
ship(service) = 1
|
43
|
+
scale(service, count) = 2
|
44
|
+
ships(*services) = -1
|
45
|
+
foo(example, *rest) = -2
|
46
|
+
|
47
|
+
Fortunately, negative and positive arity values are processed the same way. So we take simply take the absolute value of the arity and process it the same.
|
48
|
+
|
49
|
+
Here are some test cases, hit TAB after typing the command:
|
50
|
+
|
51
|
+
aws-mfa-secure completion
|
52
|
+
aws-mfa-secure completion hello
|
53
|
+
aws-mfa-secure completion hello name
|
54
|
+
aws-mfa-secure completion hello name --
|
55
|
+
aws-mfa-secure completion hello name --noop
|
56
|
+
|
57
|
+
aws-mfa-secure completion
|
58
|
+
aws-mfa-secure completion sub:goodbye
|
59
|
+
aws-mfa-secure completion sub:goodbye name
|
60
|
+
|
61
|
+
## Subcommands and Thor::Group Registered Commands
|
62
|
+
|
63
|
+
Sometimes the commands are not simple thor commands but are subcommands or Thor::Group commands. A good specific example is the ufo tool.
|
64
|
+
|
65
|
+
* regular command: ufo ship
|
66
|
+
* subcommand: ufo docker
|
67
|
+
* Thor::Group command: ufo init
|
68
|
+
|
69
|
+
Auto-completion accounts for each of these type of commands.
|
70
|
+
=end
|
71
|
+
module AwsMfaSecure
|
72
|
+
class Completer
|
73
|
+
def initialize(command_class, *params)
|
74
|
+
@params = params
|
75
|
+
@current_command = @params[0]
|
76
|
+
@command_class = command_class # CLI initiall
|
77
|
+
end
|
78
|
+
|
79
|
+
def run
|
80
|
+
if subcommand?(@current_command)
|
81
|
+
subcommand_class = @command_class.subcommand_classes[@current_command]
|
82
|
+
@params.shift # destructive
|
83
|
+
Completer.new(subcommand_class, *@params).run # recursively use subcommand
|
84
|
+
return
|
85
|
+
end
|
86
|
+
|
87
|
+
# full command has been found!
|
88
|
+
unless found?(@current_command)
|
89
|
+
puts all_commands
|
90
|
+
return
|
91
|
+
end
|
92
|
+
|
93
|
+
# will only get to here if command aws found (above)
|
94
|
+
arity = @command_class.instance_method(@current_command).arity.abs
|
95
|
+
if @params.size > arity or thor_group_command?
|
96
|
+
puts options_completion
|
97
|
+
else
|
98
|
+
puts params_completion
|
99
|
+
end
|
100
|
+
end
|
101
|
+
|
102
|
+
def subcommand?(command)
|
103
|
+
@command_class.subcommands.include?(command)
|
104
|
+
end
|
105
|
+
|
106
|
+
# hacky way to detect that command is a registered Thor::Group command
|
107
|
+
def thor_group_command?
|
108
|
+
command_params(raw=true) == [[:rest, :args]]
|
109
|
+
end
|
110
|
+
|
111
|
+
def found?(command)
|
112
|
+
public_methods = @command_class.public_instance_methods(false)
|
113
|
+
command && public_methods.include?(command.to_sym)
|
114
|
+
end
|
115
|
+
|
116
|
+
# all top-level commands
|
117
|
+
def all_commands
|
118
|
+
commands = @command_class.all_commands.reject do |k,v|
|
119
|
+
v.is_a?(Thor::HiddenCommand)
|
120
|
+
end
|
121
|
+
commands.keys
|
122
|
+
end
|
123
|
+
|
124
|
+
def command_params(raw=false)
|
125
|
+
params = @command_class.instance_method(@current_command).parameters
|
126
|
+
# Example:
|
127
|
+
# >> Sub.instance_method(:goodbye).parameters
|
128
|
+
# => [[:req, :name]]
|
129
|
+
# >>
|
130
|
+
raw ? params : params.map!(&:last)
|
131
|
+
end
|
132
|
+
|
133
|
+
def params_completion
|
134
|
+
offset = @params.size - 1
|
135
|
+
offset_params = command_params[offset..-1]
|
136
|
+
command_params[offset..-1].first
|
137
|
+
end
|
138
|
+
|
139
|
+
def options_completion
|
140
|
+
used = ARGV.select { |a| a.include?('--') } # so we can remove used options
|
141
|
+
|
142
|
+
method_options = @command_class.all_commands[@current_command].options.keys
|
143
|
+
class_options = @command_class.class_options.keys
|
144
|
+
|
145
|
+
all_options = method_options + class_options + ['help']
|
146
|
+
|
147
|
+
all_options.map! { |o| "--#{o.to_s.gsub('_','-')}" }
|
148
|
+
filtered_options = all_options - used
|
149
|
+
filtered_options.uniq
|
150
|
+
end
|
151
|
+
|
152
|
+
# Useful for debugging. Using puts messes up completion.
|
153
|
+
def log(msg)
|
154
|
+
File.open("/tmp/complete.log", "a") do |file|
|
155
|
+
file.puts(msg)
|
156
|
+
end
|
157
|
+
end
|
158
|
+
end
|
159
|
+
end
|
@@ -0,0 +1,10 @@
|
|
1
|
+
_aws-mfa-secure() {
|
2
|
+
COMPREPLY=()
|
3
|
+
local word="${COMP_WORDS[COMP_CWORD]}"
|
4
|
+
local words=("${COMP_WORDS[@]}")
|
5
|
+
unset words[0]
|
6
|
+
local completion=$(aws-mfa-secure completion ${words[@]})
|
7
|
+
COMPREPLY=( $(compgen -W "$completion" -- "$word") )
|
8
|
+
}
|
9
|
+
|
10
|
+
complete -F _aws-mfa-secure aws-mfa-secure
|
@@ -0,0 +1,35 @@
|
|
1
|
+
# Useful for Ruby interfacing
|
2
|
+
module AwsMfaSecure
|
3
|
+
class Credentials < Base
|
4
|
+
# Using Singleton as caching mechanism for speed
|
5
|
+
# The fetch_creds? is slow from shelling out to python for aws configure get.
|
6
|
+
include Singleton
|
7
|
+
|
8
|
+
attr_reader :data
|
9
|
+
def initialize
|
10
|
+
@aws_profile = aws_profile
|
11
|
+
setup
|
12
|
+
end
|
13
|
+
|
14
|
+
def setup
|
15
|
+
return unless iam_mfa?
|
16
|
+
|
17
|
+
if fetch_creds?
|
18
|
+
resp = get_session_token(shell: true)
|
19
|
+
save_creds(resp.credentials.to_h)
|
20
|
+
end
|
21
|
+
|
22
|
+
@data = credentials
|
23
|
+
end
|
24
|
+
|
25
|
+
def set?
|
26
|
+
!!@data
|
27
|
+
end
|
28
|
+
|
29
|
+
%w[access_key_id secret_access_key session_token].each do |name|
|
30
|
+
define_method name do
|
31
|
+
@data[name]
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
35
|
+
end
|
@@ -0,0 +1,30 @@
|
|
1
|
+
module AwsMfaSecure
|
2
|
+
class Exports < Base
|
3
|
+
def initialize(options={})
|
4
|
+
@options = options
|
5
|
+
@aws_profile = aws_profile
|
6
|
+
end
|
7
|
+
|
8
|
+
def run
|
9
|
+
unless iam_mfa?
|
10
|
+
$stderr.puts "WARN: mfa_serial is not configured for this AWS_PROFILE=#{@aws_profile}"
|
11
|
+
return
|
12
|
+
end
|
13
|
+
|
14
|
+
if fetch_creds?
|
15
|
+
resp = get_session_token
|
16
|
+
save_creds(resp.credentials.to_h)
|
17
|
+
end
|
18
|
+
|
19
|
+
puts script
|
20
|
+
end
|
21
|
+
|
22
|
+
def script
|
23
|
+
<<~EOL
|
24
|
+
export AWS_ACCESS_KEY_ID=#{credentials["access_key_id"]}
|
25
|
+
export AWS_SECRET_ACCESS_KEY=#{credentials["secret_access_key"]}
|
26
|
+
export AWS_SESSION_TOKEN=#{credentials["session_token"]}
|
27
|
+
EOL
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
@@ -0,0 +1,20 @@
|
|
1
|
+
require "aws-sdk-core"
|
2
|
+
|
3
|
+
module AwsMfaCredentials
|
4
|
+
def initialize(*)
|
5
|
+
credentials = AwsMfaSecure::Credentials.instance
|
6
|
+
if credentials.set?
|
7
|
+
@access_key_id = credentials.access_key_id
|
8
|
+
@secret_access_key = credentials.secret_access_key
|
9
|
+
@session_token = credentials.session_token
|
10
|
+
else
|
11
|
+
super
|
12
|
+
end
|
13
|
+
end
|
14
|
+
end
|
15
|
+
|
16
|
+
module Aws
|
17
|
+
class Credentials
|
18
|
+
prepend AwsMfaCredentials
|
19
|
+
end
|
20
|
+
end
|
@@ -0,0 +1,20 @@
|
|
1
|
+
## Examples
|
2
|
+
|
3
|
+
aws-mfa-secure completion
|
4
|
+
|
5
|
+
Prints words for TAB auto-completion.
|
6
|
+
|
7
|
+
aws-mfa-secure completion
|
8
|
+
aws-mfa-secure completion hello
|
9
|
+
aws-mfa-secure completion hello name
|
10
|
+
|
11
|
+
To enable, TAB auto-completion add the following to your profile:
|
12
|
+
|
13
|
+
eval $(aws-mfa-secure completion_script)
|
14
|
+
|
15
|
+
Auto-completion example usage:
|
16
|
+
|
17
|
+
aws-mfa-secure [TAB]
|
18
|
+
aws-mfa-secure hello [TAB]
|
19
|
+
aws-mfa-secure hello name [TAB]
|
20
|
+
aws-mfa-secure hello name --[TAB]
|
@@ -0,0 +1,29 @@
|
|
1
|
+
## Example
|
2
|
+
|
3
|
+
aws-mfa-secure exports
|
4
|
+
|
5
|
+
## Example with Output
|
6
|
+
|
7
|
+
$ aws-mfa-secure exports
|
8
|
+
Please provide your MFA code: 147280
|
9
|
+
export AWS_ACCESS_KEY_ID=ASIAXZ6ODJLBCEXAMPLE
|
10
|
+
export AWS_SECRET_ACCESS_KEY=HgYHvNxacSsFSwls1FO9RoF5+tvYCFIABEXAMPLE
|
11
|
+
export AWS_SESSION_TOKEN=IQoJb3JpZ2luX2VjEJ3//////////wEaCXVzLWVhc3QtMSJGMEQCIGnuGzUr8aszNWMFlFXQvFVhIA6aGdx3DskqY1JaIZWVAiANfE3xA79vIMVTqLnds4F2LpDy/qUeNRr7e9g9VQoS9SqyAQi2//////////8BEAEaDDUzNjc2NjI3MDE3NyIMgDgauwgJ4FIOMRV+KoYBRKR/MnKFB9/Q0Isc6D8gpG404xGJWqStNfGS0sHNsB5vVP/ccaAj4MG54p0Pl+V0LuIMXy345ua/bxxQFDWqhG0ORsXFEOo3iD1IQ+YA/yougAUl/0hbyvK3Jnf3NEHDejdL95iFCluJhoR0zFlDv7GwwBSXLUxS9K96/vgA0MmgK9a7kaAwoYiZ7gU63wHVDNYa1myqIP16Mi6KZ2zm9inMofixNN1ea3JMyRW+chWW8kdjjW4R3MFecpwoIayE7g3QLanmjE3jzrlxjIJWnl8tiipV+jassiSdlxLL2j1IIFH2pNEqrn4hkHG5t7OG+qZCTl8AnQ4W5wusmBoSIavr5w0dOdyx2mdsBMFtO82ZXvHSryY1gbIM9JyUd7dJ9h/mkfGL2p0n0R/lya8s9j8P8/8if+2uQcF+/BGDxojJ67kYXgstgfLjM5j8pZgyYj6YUFyTpyiOkllbPk/AjyxJY1svxW25wbNO+c13
|
12
|
+
$
|
13
|
+
|
14
|
+
Eval example:
|
15
|
+
|
16
|
+
$ eval `aws-mfa-secure exports`
|
17
|
+
|
18
|
+
Note: Prompts write to stderr so eval-ing the exports works even if with the prompt.
|
19
|
+
|
20
|
+
## Related
|
21
|
+
|
22
|
+
You may also be interested in the `aws-mfa-secure unset` command. It provides a quick way to unset the AWS_* environment variables. Example:
|
23
|
+
|
24
|
+
$ aws-mfa-secure unset # generates script
|
25
|
+
unset AWS_ACCESS_KEY_ID
|
26
|
+
unset AWS_SECRET_ACCESS_KEY
|
27
|
+
unset AWS_SESSION_TOKEN
|
28
|
+
$ eval `aws-mfa-secure unset` # to unset
|
29
|
+
$
|