aws_assume_role 0.0.3 → 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.gitignore +1 -0
- data/.rubocop.yml +31 -11
- data/Gemfile +7 -13
- data/LICENSE.md +201 -19
- data/README.md +176 -145
- data/aws_assume_role.gemspec +35 -21
- data/bin/aws-assume-role +1 -83
- data/i18n/en.yml +106 -0
- data/lib/aws_assume_role.rb +2 -3
- data/lib/aws_assume_role/cli.rb +15 -0
- data/lib/aws_assume_role/cli/actions/abstract_action.rb +53 -0
- data/lib/aws_assume_role/cli/actions/configure_profile.rb +21 -0
- data/lib/aws_assume_role/cli/actions/configure_role_assumption.rb +19 -0
- data/lib/aws_assume_role/cli/actions/console.rb +68 -0
- data/lib/aws_assume_role/cli/actions/delete_profile.rb +20 -0
- data/lib/aws_assume_role/cli/actions/includes.rb +18 -0
- data/lib/aws_assume_role/cli/actions/list_profiles.rb +10 -0
- data/lib/aws_assume_role/cli/actions/migrate_profile.rb +18 -0
- data/lib/aws_assume_role/cli/actions/reset_environment.rb +48 -0
- data/lib/aws_assume_role/cli/actions/run.rb +34 -0
- data/lib/aws_assume_role/cli/actions/set_environment.rb +60 -0
- data/lib/aws_assume_role/cli/actions/test.rb +31 -0
- data/lib/aws_assume_role/cli/commands/configure.rb +29 -0
- data/lib/aws_assume_role/cli/commands/console.rb +17 -0
- data/lib/aws_assume_role/cli/commands/delete.rb +11 -0
- data/lib/aws_assume_role/cli/commands/environment.rb +32 -0
- data/lib/aws_assume_role/cli/commands/list.rb +10 -0
- data/lib/aws_assume_role/cli/commands/migrate.rb +11 -0
- data/lib/aws_assume_role/cli/commands/run.rb +17 -0
- data/lib/aws_assume_role/cli/commands/test.rb +18 -0
- data/lib/aws_assume_role/configuration.rb +19 -0
- data/lib/aws_assume_role/core_ext/aws-sdk/credential_provider_chain.rb +2 -0
- data/lib/aws_assume_role/core_ext/aws-sdk/includes.rb +7 -0
- data/lib/aws_assume_role/credentials/factories.rb +9 -0
- data/lib/aws_assume_role/credentials/factories/abstract_factory.rb +31 -0
- data/lib/aws_assume_role/credentials/factories/assume_role.rb +38 -0
- data/lib/aws_assume_role/credentials/factories/default_chain_provider.rb +101 -0
- data/lib/aws_assume_role/credentials/factories/environment.rb +24 -0
- data/lib/aws_assume_role/credentials/factories/includes.rb +17 -0
- data/lib/aws_assume_role/credentials/factories/instance_profile.rb +17 -0
- data/lib/aws_assume_role/credentials/factories/repository.rb +35 -0
- data/lib/aws_assume_role/credentials/factories/shared.rb +15 -0
- data/lib/aws_assume_role/credentials/factories/shared_keyring.rb +16 -0
- data/lib/aws_assume_role/credentials/factories/static.rb +16 -0
- data/lib/aws_assume_role/credentials/providers/assume_role_credentials.rb +58 -0
- data/lib/aws_assume_role/credentials/providers/includes.rb +9 -0
- data/lib/aws_assume_role/credentials/providers/mfa_session_credentials.rb +102 -0
- data/lib/aws_assume_role/credentials/providers/shared_keyring_credentials.rb +22 -0
- data/lib/aws_assume_role/includes.rb +30 -0
- data/lib/aws_assume_role/logging.rb +16 -28
- data/lib/aws_assume_role/profile_configuration.rb +71 -0
- data/lib/aws_assume_role/runner.rb +39 -0
- data/lib/aws_assume_role/store/includes.rb +16 -0
- data/lib/aws_assume_role/store/keyring.rb +59 -0
- data/lib/aws_assume_role/store/serialization.rb +18 -0
- data/lib/aws_assume_role/store/shared_config_with_keyring.rb +175 -0
- data/lib/aws_assume_role/types.rb +30 -0
- data/lib/aws_assume_role/ui.rb +55 -0
- data/lib/aws_assume_role/vendored/aws.rb +4 -0
- data/lib/aws_assume_role/vendored/aws/README.md +2 -0
- data/lib/aws_assume_role/vendored/aws/assume_role_credentials.rb +68 -0
- data/lib/aws_assume_role/vendored/aws/includes.rb +9 -0
- data/lib/aws_assume_role/vendored/aws/refreshing_credentials.rb +60 -0
- data/lib/aws_assume_role/vendored/aws/shared_config.rb +220 -0
- data/lib/aws_assume_role/version.rb +3 -0
- metadata +264 -20
- data/.rspec +0 -2
- data/Rakefile +0 -2
- data/bin/test.rb +0 -39
- data/lib/aws_assume_role/credentials.rb +0 -92
- data/lib/aws_assume_role/profile.rb +0 -203
- data/lib/aws_assume_role/profile/assume_role.rb +0 -127
- data/lib/aws_assume_role/profile/basic.rb +0 -152
- data/lib/aws_assume_role/profile/list.rb +0 -57
data/aws_assume_role.gemspec
CHANGED
@@ -1,32 +1,46 @@
|
|
1
1
|
# coding: utf-8
|
2
|
-
|
3
|
-
$LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
4
|
-
|
2
|
+
require_relative "lib/aws_assume_role/version"
|
5
3
|
Gem::Specification.new do |spec|
|
6
|
-
spec.name =
|
7
|
-
spec.version =
|
8
|
-
spec.authors = [
|
9
|
-
spec.email = [
|
4
|
+
spec.name = "aws_assume_role"
|
5
|
+
spec.version = AwsAssumeRole::VERSION
|
6
|
+
spec.authors = ["Jon Topper", "Jack Thomas", "Naadir Jeewa"]
|
7
|
+
spec.email = ["jon@scalefactory.com", "jack@scalefactory.com", "naadir@scalefactory.com"]
|
10
8
|
|
11
|
-
spec.description =
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
spec.summary =
|
16
|
-
spec.homepage =
|
17
|
-
spec.license =
|
9
|
+
spec.description = "Used to fetch multiple AWS Role Credential "\
|
10
|
+
"Keys using different Session Keys "\
|
11
|
+
"and store them securely using Gnome Keyring "\
|
12
|
+
"or OSX keychain"
|
13
|
+
spec.summary = "Manage AWS STS credentials with MFA"
|
14
|
+
spec.homepage = "https://github.com/scalefactory/aws-assume-role"
|
15
|
+
spec.license = "Apache-2.0"
|
18
16
|
|
19
17
|
spec.files = `git ls-files -z`.split("\x0").reject { |f|
|
20
18
|
f.match(%r{^(test|spec|features)/})
|
21
19
|
}
|
22
|
-
spec.bindir =
|
20
|
+
spec.bindir = "bin"
|
23
21
|
spec.executables = spec.files.grep(%r{^bin/aws}) { |f| File.basename(f) }
|
24
|
-
spec.require_paths = [
|
22
|
+
spec.require_paths = ["lib"]
|
25
23
|
|
26
|
-
spec.add_runtime_dependency
|
27
|
-
spec.add_runtime_dependency
|
28
|
-
spec.add_runtime_dependency
|
24
|
+
spec.add_runtime_dependency "activesupport", "~> 4.0"
|
25
|
+
spec.add_runtime_dependency "aws-sdk", "~> 2.7"
|
26
|
+
spec.add_runtime_dependency "dry-configurable", "~> 0.5"
|
27
|
+
spec.add_runtime_dependency "dry-initializer", "~> 1.1"
|
28
|
+
spec.add_runtime_dependency "dry-types", "~> 0.9"
|
29
|
+
spec.add_runtime_dependency "dry-validation", "~> 0.10"
|
30
|
+
spec.add_runtime_dependency "gli", "~> 2.15"
|
31
|
+
spec.add_runtime_dependency "highline", "~> 1.7"
|
32
|
+
spec.add_runtime_dependency "i18n", "~> 0.7"
|
33
|
+
spec.add_runtime_dependency "inifile", "~> 3.0"
|
34
|
+
spec.add_runtime_dependency "launchy", "~> 2.4"
|
35
|
+
spec.add_runtime_dependency "keyring", "~> 0.4", ">= 0.4.1"
|
36
|
+
spec.add_runtime_dependency "pastel", "~> 0.7"
|
37
|
+
spec.add_development_dependency "rubocop", "~> 0.46"
|
38
|
+
spec.add_development_dependency "yard", "~> 0.9"
|
29
39
|
|
30
|
-
|
31
|
-
|
40
|
+
case Gem::Platform.local.os
|
41
|
+
when "linux"
|
42
|
+
spec.add_dependency "gir_ffi-gnome_keyring", "~> 0.0", ">= 0.0.3"
|
43
|
+
when "darwin"
|
44
|
+
spec.add_dependency "ruby-keychain", "~> 0.3", ">= 0.3.2"
|
45
|
+
end
|
32
46
|
end
|
data/bin/aws-assume-role
CHANGED
@@ -1,84 +1,2 @@
|
|
1
1
|
#!/usr/bin/env ruby
|
2
|
-
|
3
|
-
$LOAD_PATH.unshift File.expand_path('../lib/', __FILE__)
|
4
|
-
|
5
|
-
require 'optparse'
|
6
|
-
require 'aws_assume_role'
|
7
|
-
|
8
|
-
options = {}
|
9
|
-
optparse = OptionParser.new do |opts|
|
10
|
-
|
11
|
-
options[:config] = "#{ENV['HOME']}/.aws/assume.yaml"
|
12
|
-
opts.on('-c', '--config file', 'Config file. defaults to' \
|
13
|
-
'~/.aws/assume.yaml.') do |c|
|
14
|
-
options[:config] = c
|
15
|
-
end
|
16
|
-
|
17
|
-
options[:profile] = false
|
18
|
-
opts.on('-p', '--profile name', 'Load the credentials for a profile into AWS ' \
|
19
|
-
'environment variables.') do |c|
|
20
|
-
options[:profile] = c
|
21
|
-
end
|
22
|
-
|
23
|
-
options[:add] = false
|
24
|
-
opts.on('-a', '--add', 'Add basic/parent account credentials to keystore' \
|
25
|
-
'environment variables. Must provide a profile name') do |c|
|
26
|
-
options[:add] = c
|
27
|
-
end
|
28
|
-
|
29
|
-
options[:delete] = false
|
30
|
-
opts.on('-d', '--delete', 'Delete credentials from keystore. Must ' \
|
31
|
-
'provide a profile name.') do
|
32
|
-
options[:delete] = true
|
33
|
-
end
|
34
|
-
|
35
|
-
options[:debug] = false
|
36
|
-
opts.on('--debug', 'Enable debugging') do
|
37
|
-
options[:debug] = true
|
38
|
-
end
|
39
|
-
|
40
|
-
options[:verbose] = false
|
41
|
-
opts.on('-v', '--verbose', 'Get more words') do
|
42
|
-
options[:verbose] = true
|
43
|
-
end
|
44
|
-
|
45
|
-
end
|
46
|
-
|
47
|
-
optdata = optparse.parse!
|
48
|
-
|
49
|
-
if options[:debug]
|
50
|
-
AWSAssumeRole::Profile.logger.level = Logger::DEBUG
|
51
|
-
else
|
52
|
-
AWSAssumeRole::Profile.logger.level = Logger::WARN
|
53
|
-
end
|
54
|
-
|
55
|
-
|
56
|
-
begin
|
57
|
-
AWSAssumeRole::Profile.load_profiles
|
58
|
-
AWSAssumeRole::Profile.load_config_file(options[:config])
|
59
|
-
rescue Errno::ENOENT
|
60
|
-
STDERR.puts "No config file at options[:config]. Please create one!"
|
61
|
-
exit -1 # rubocop:disable Lint/AmbiguousOperator
|
62
|
-
end
|
63
|
-
|
64
|
-
if options[:profile] != false
|
65
|
-
profile = AWSAssumeRole::Profile.get_by_name(options[:profile] )
|
66
|
-
|
67
|
-
if options[:delete]
|
68
|
-
profile.remove
|
69
|
-
elsif options[:add]
|
70
|
-
profile.add
|
71
|
-
else
|
72
|
-
profile.use
|
73
|
-
end
|
74
|
-
|
75
|
-
if options[:verbose]
|
76
|
-
system('env | grep "AWS" | sort')
|
77
|
-
end
|
78
|
-
end
|
79
|
-
|
80
|
-
unless optdata.empty?
|
81
|
-
cmd = optdata.join(' ')
|
82
|
-
AWSAssumeRole::Profile.logger.debug "Executing Command '#{cmd}'"
|
83
|
-
system(cmd)
|
84
|
-
end
|
2
|
+
require_relative "../lib/aws_assume_role/cli"
|
data/i18n/en.yml
ADDED
@@ -0,0 +1,106 @@
|
|
1
|
+
en:
|
2
|
+
commands:
|
3
|
+
configure:
|
4
|
+
desc: Configure AWS
|
5
|
+
long_desc: |
|
6
|
+
Configure AWS profiles. If this command is run with no arguments,
|
7
|
+
you will be prompted for configuration values such as your AWS Access
|
8
|
+
Key Id and you AWS Secret Access Key. You can configure a named pro-
|
9
|
+
file using the --profile argument. If your config file does not exist
|
10
|
+
(the default location is ~/.aws/config), the AWS CLI will create it for
|
11
|
+
you. To keep an existing value, hit enter when prompted for the value.
|
12
|
+
When you are prompted for information, the current value will be dis-
|
13
|
+
played in [brackets]. If the config item has no value, it be displayed
|
14
|
+
as [None]. Note that the configure command only work with values from
|
15
|
+
the config file. It does not use any configuration values from envi-
|
16
|
+
ronment variables or the IAM role.
|
17
|
+
|
18
|
+
Note: The values you provide for the AWS Access Key ID and the AWS
|
19
|
+
Secret Access Key will be written to your keyring backend.
|
20
|
+
saved: Profile %s saved to %s
|
21
|
+
console:
|
22
|
+
desc: Launch the AWS console to switch to the profile role.
|
23
|
+
long_desc: |
|
24
|
+
Looks up the Role ARN in the profile, constructs the AWS console
|
25
|
+
URL and launches your browser with it. It's a convenience, doesn't
|
26
|
+
use any of the credentials.
|
27
|
+
set_environment:
|
28
|
+
desc: Export assumed credentials to your shell environment.
|
29
|
+
long_desc: |
|
30
|
+
Set up environment variables in your shell so that you can run AWS CLI
|
31
|
+
or other apps using those credentials without running aws-assume-role
|
32
|
+
again.
|
33
|
+
Supports Bourne, CSh, Fish and PowerShell.
|
34
|
+
shells:
|
35
|
+
powershell: Use `aws-assume-role environment set -s powershell -p <profile_name> | Invoke-Expression` to load into environment
|
36
|
+
others: Use `eval aws-assume-role environment set -p <profile_name>` to load into environment
|
37
|
+
fish: Use `set creds (bin/aws-assume-role environment set -s fish); eval $creds; set -e creds`
|
38
|
+
reset_environment:
|
39
|
+
desc: Delete AWS environment variables.
|
40
|
+
long_desc: |
|
41
|
+
Cleans up your shell environment by removing the following environment variables:
|
42
|
+
AWS_ACCESS_KEY_ID
|
43
|
+
AWS_SECRET_ACCESS_KEY
|
44
|
+
AWS_DEFAULT_REGION
|
45
|
+
AWS_PROFILE
|
46
|
+
AWS_ASSUME_ROLE_LOG_LEVEL
|
47
|
+
GLI_DEBUG
|
48
|
+
Supports Bourne, CSh, Fish and PowerShell.
|
49
|
+
shells:
|
50
|
+
powershell: Use `aws-assume-role environment reset -s powershell -p <profile_name> | Invoke-Expression` to load into environment
|
51
|
+
others: Use `eval aws-assume-role environment reset -p <profile_name>` to load into environment
|
52
|
+
fish: Use `set creds (bin/aws-assume-role environment reset -s fish); eval $creds; set -e creds`
|
53
|
+
run:
|
54
|
+
desc: Run a program with credentials set in the environment.
|
55
|
+
delete:
|
56
|
+
desc: Delete a profile
|
57
|
+
completed: "Profile %s deleted"
|
58
|
+
not_found: "Cannot find profile %s. Try running `aws-assume-role list`"
|
59
|
+
list:
|
60
|
+
desc: List configured profiles
|
61
|
+
migrate:
|
62
|
+
desc: Migrate a store to secure storage.
|
63
|
+
not_found: "Cannot find profile %s. Try running `aws-assume-role list`"
|
64
|
+
saved: Profile %s migrated within %s
|
65
|
+
test:
|
66
|
+
desc: Check that credentials work
|
67
|
+
output: |
|
68
|
+
Logged in as:
|
69
|
+
User: %s
|
70
|
+
Account: %s
|
71
|
+
ARN: %s
|
72
|
+
options:
|
73
|
+
aws_access_key_id: "Enter the AWS Access Key ID to use for this profile"
|
74
|
+
aws_secret_access_key: "Enter the AWS Secret Access Key to use for this profile"
|
75
|
+
region: Enter the AWS region you would like to default to
|
76
|
+
profile_name: Enter the profile name to save into configuration
|
77
|
+
mfa_token:
|
78
|
+
first_time: "Please provide an MFA token"
|
79
|
+
other_times: "Credentials have expired, please provide another MFA"
|
80
|
+
default_role: "A default role to assume (leave blank to not use)"
|
81
|
+
external_id: String provided by the external account holder to uniquely identify you.
|
82
|
+
source_profile: Which profile to use to assume this role.
|
83
|
+
role_session_name: Name to uniquely identify your session
|
84
|
+
mfa_serial: The identification number of the MFA device. Leave blank to determine dynamically at run time.
|
85
|
+
role_arn: The Amazon Resource Name (ARN) of the role to assume.
|
86
|
+
duration_seconds: Default session length
|
87
|
+
shell_type: What type of shell to use.
|
88
|
+
name_to_delete: Please type the name of the profile, i.e. %s , to continue deletion.
|
89
|
+
program_description: "A tool for AWS credential management"
|
90
|
+
errors:
|
91
|
+
NoSuchProfileError: Profile %s not found in shared configuration.
|
92
|
+
MissingCredentialsError: No credentials found!
|
93
|
+
rules:
|
94
|
+
profile:
|
95
|
+
filled?: --profile must be specified.
|
96
|
+
role-arn:
|
97
|
+
format?: "--role-arn must be specified as an ARN in the format `arn:aws:iam::account-id:role/role-name`"
|
98
|
+
filled?: --role-arn is required.
|
99
|
+
serial-number:
|
100
|
+
format?: "--mfa-serial must be specified as an ARN in the format `arn:aws:iam::account-id:mfa/virtual-device-name`"
|
101
|
+
filled?: --mfa-serial is required.
|
102
|
+
region:
|
103
|
+
format?: "--region must be a valid AWS Standard, China or GovCloud region"
|
104
|
+
filled?: --region is required
|
105
|
+
role_specification:
|
106
|
+
filled?: "Either specify --profile OR (--role-arn AND --role-session-name, or neither)"
|
data/lib/aws_assume_role.rb
CHANGED
@@ -1,3 +1,2 @@
|
|
1
|
-
|
2
|
-
|
3
|
-
require 'aws_assume_role/credentials'
|
1
|
+
require_relative "aws_assume_role/store/shared_config_with_keyring"
|
2
|
+
require_relative "aws_assume_role/credentials/factories/default_chain_provider"
|
@@ -0,0 +1,15 @@
|
|
1
|
+
require_relative "includes"
|
2
|
+
require_relative "ui"
|
3
|
+
|
4
|
+
module AwsAssumeRole::Cli
|
5
|
+
include GLI::DSL
|
6
|
+
include GLI::App
|
7
|
+
include AwsAssumeRole
|
8
|
+
include AwsAssumeRole::Ui
|
9
|
+
extend self # rubocop:disable Style/ModuleFunction
|
10
|
+
|
11
|
+
commands_from File.join(File.realpath(__dir__), "cli", "commands")
|
12
|
+
program_desc t "program_description"
|
13
|
+
|
14
|
+
exit run(ARGV)
|
15
|
+
end
|
@@ -0,0 +1,53 @@
|
|
1
|
+
require_relative "includes"
|
2
|
+
require_relative "../../profile_configuration"
|
3
|
+
|
4
|
+
class AwsAssumeRole::Cli::Actions::AbstractAction
|
5
|
+
include AwsAssumeRole
|
6
|
+
include AwsAssumeRole::Types
|
7
|
+
include Ui
|
8
|
+
CommandSchema = proc { raise "CommandSchema Not implemented" }
|
9
|
+
|
10
|
+
def initialize(global_options, options, args)
|
11
|
+
config = ProfileConfiguration.new_from_cli(global_options, options, args)
|
12
|
+
result = validate_options(config.to_h.deep_symbolize_keys)
|
13
|
+
return act_on(config) if result.success?
|
14
|
+
Ui.show_validation_errors result
|
15
|
+
end
|
16
|
+
|
17
|
+
private
|
18
|
+
|
19
|
+
def try_for_credentials(config)
|
20
|
+
@provider ||= AwsAssumeRole::Credentials::Factories::DefaultChainProvider.new(config.to_h)
|
21
|
+
creds = @provider.resolve(nil_with_role_not_set: true)
|
22
|
+
return creds unless creds.nil?
|
23
|
+
rescue NoMethodError
|
24
|
+
error "Cannot find any credentials"
|
25
|
+
exit 404
|
26
|
+
end
|
27
|
+
|
28
|
+
def resolved_region
|
29
|
+
@provider.region
|
30
|
+
end
|
31
|
+
|
32
|
+
def resolved_profile
|
33
|
+
@provider.profile
|
34
|
+
end
|
35
|
+
|
36
|
+
def validate_options(options)
|
37
|
+
command_schema = self.class::CommandSchema
|
38
|
+
::Dry::Validation.Schema do
|
39
|
+
configure { config.messages = :i18n }
|
40
|
+
instance_eval(&command_schema)
|
41
|
+
end.call(options)
|
42
|
+
end
|
43
|
+
|
44
|
+
def prompt_for_option(key, option_name, validator, fmt: nil)
|
45
|
+
text_lookup = t("options.#{key}")
|
46
|
+
text = fmt.nil? ? text_lookup : format(text_lookup, fmt)
|
47
|
+
Ui.ask_with_validation(option_name, text) { instance_eval(&validator) }
|
48
|
+
end
|
49
|
+
|
50
|
+
def act_on(_options)
|
51
|
+
raise "Act On Not Implemented"
|
52
|
+
end
|
53
|
+
end
|
@@ -0,0 +1,21 @@
|
|
1
|
+
require_relative "abstract_action"
|
2
|
+
require_relative "../../store/shared_config_with_keyring"
|
3
|
+
|
4
|
+
class AwsAssumeRole::Cli::Actions::ConfigureProfile < AwsAssumeRole::Cli::Actions::AbstractAction
|
5
|
+
CommandSchema = proc do
|
6
|
+
required(:profile)
|
7
|
+
optional(:region) { filled? > format?(REGION_REGEX) }
|
8
|
+
optional(:mfa_serial)
|
9
|
+
optional(:profile_name)
|
10
|
+
end
|
11
|
+
|
12
|
+
def act_on(config)
|
13
|
+
new_hash = config.to_h
|
14
|
+
profile = config.profile || prompt_for_option(:profile_name, "profile", proc { filled? })
|
15
|
+
new_hash[:region] = prompt_for_option(:region, "region", proc { filled? > format?(REGION_REGEX) })
|
16
|
+
new_hash[:aws_access_key_id] = prompt_for_option(:aws_access_key_id, "aws_access_key_id", ACCESS_KEY_VALIDATOR)
|
17
|
+
new_hash[:aws_secret_access_key] = prompt_for_option(:aws_secret_access_key, "aws_secret_access_key", proc { filled? })
|
18
|
+
AwsAssumeRole.shared_config.save_profile(profile, new_hash)
|
19
|
+
out format(t("commands.configure.saved"), config.profile, AwsAssumeRole.shared_config.config_path)
|
20
|
+
end
|
21
|
+
end
|
@@ -0,0 +1,19 @@
|
|
1
|
+
require_relative "abstract_action"
|
2
|
+
|
3
|
+
class AwsAssumeRole::Cli::Actions::ConfigureRoleAssumption < AwsAssumeRole::Cli::Actions::AbstractAction
|
4
|
+
CommandSchema = proc do
|
5
|
+
required(:profile)
|
6
|
+
required(:source_profile) { str? }
|
7
|
+
optional(:region) { filled? > format?(REGION_REGEX) }
|
8
|
+
optional(:serial_number) { filled? > format?(MFA_REGEX) }
|
9
|
+
required(:role_session_name).filled?
|
10
|
+
required(:role_arn) { filled? & format?(ROLE_REGEX) }
|
11
|
+
required(:external_id).filled?
|
12
|
+
required(:duration_seconds).filled?
|
13
|
+
end
|
14
|
+
|
15
|
+
def act_on(config)
|
16
|
+
AwsAssumeRole.shared_config.save_profile(config.profile, config.to_h.compact)
|
17
|
+
out format(t("commands.configure.saved"), config.profile, AwsAssumeRole.shared_config.config_path)
|
18
|
+
end
|
19
|
+
end
|
@@ -0,0 +1,68 @@
|
|
1
|
+
require_relative "includes"
|
2
|
+
require_relative "../../runner"
|
3
|
+
require "cgi"
|
4
|
+
require "json"
|
5
|
+
|
6
|
+
class AwsAssumeRole::Cli::Actions::Console < AwsAssumeRole::Cli::Actions::AbstractAction
|
7
|
+
include AwsAssumeRole::Ui
|
8
|
+
include AwsAssumeRole::Logging
|
9
|
+
|
10
|
+
FEDERATION_URL = "https://signin.aws.amazon.com/federation".freeze
|
11
|
+
CONSOLE_URL = "https://console.aws.amazon.com".freeze
|
12
|
+
GENERIC_SIGNIN_URL = "https://signin.aws.amazon.com/console".freeze
|
13
|
+
SIGNIN_URL = [FEDERATION_URL, "?Action=getSigninToken", "&Session=%s"].join
|
14
|
+
LOGIN_URL = [FEDERATION_URL, "?Action=login", "&Destination=%s", "&SigninToken=%s"].join
|
15
|
+
|
16
|
+
CommandSchema = proc do
|
17
|
+
required(:profile).maybe
|
18
|
+
optional(:region) { filled? > format?(REGION_REGEX) }
|
19
|
+
optional(:serial_number) { filled? > format?(MFA_REGEX) }
|
20
|
+
required(:role_arn).maybe
|
21
|
+
required(:role_session_name).maybe
|
22
|
+
required(:duration_seconds).maybe
|
23
|
+
rule(role_specification: [:profile, :role_arn, :role_session_name, :duration_seconds]) do |p, r, s, d|
|
24
|
+
(p.filled? | p.empty? & r.filled?) & (r.filled? > s.filled? & d.filled?)
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
def try_federation(config)
|
29
|
+
credentials = try_for_credentials config.to_h
|
30
|
+
return unless credentials.set?
|
31
|
+
session = session_json(credentials)
|
32
|
+
signin_url = format SIGNIN_URL, CGI.escape(session)
|
33
|
+
sso_token = JSON.parse(URI.parse(signin_url).read)["SigninToken"]
|
34
|
+
format LOGIN_URL, CGI.escape(CONSOLE_URL), CGI.escape(sso_token)
|
35
|
+
rescue OpenURI::HTTPError
|
36
|
+
error "Error getting federated session, forming simple switch URL instead"
|
37
|
+
end
|
38
|
+
|
39
|
+
def session_json(credentials)
|
40
|
+
{
|
41
|
+
sessionId: credentials.credentials.access_key_id,
|
42
|
+
sessionKey: credentials.credentials.secret_access_key,
|
43
|
+
sessionToken: credentials.credentials.session_token,
|
44
|
+
}.to_json
|
45
|
+
end
|
46
|
+
|
47
|
+
def try_switch_url(config)
|
48
|
+
profile = AwsAssumeRole.shared_config.determine_profile(profile_name: config.profile)
|
49
|
+
config_section = AwsAssumeRole.shared_config.parsed_config[profile]
|
50
|
+
raise Aws::Errors::NoSuchProfileError if config_section.nil?
|
51
|
+
resolved_role_arn = config.role_arn || config_section.fetch("role_arn", nil)
|
52
|
+
return unless resolved_role_arn
|
53
|
+
components = resolved_role_arn.split(":")
|
54
|
+
account = components[4]
|
55
|
+
role = components[5].split("/").last
|
56
|
+
display_name = config.profile || "#{account}_#{role}"
|
57
|
+
format "https://signin.aws.amazon.com/switchrole?account=%s&roleName=%s&displayName=%s", account, role, display_name
|
58
|
+
end
|
59
|
+
|
60
|
+
def act_on(config)
|
61
|
+
final_url = try_federation(config) || try_switch_url(config) || CONSOLE_URL
|
62
|
+
Launchy.open final_url
|
63
|
+
rescue KeyError, Aws::Errors::NoSuchProfileError
|
64
|
+
error format(t("errors.NoSuchProfileError"), config.profile)
|
65
|
+
rescue Aws::Errors::MissingCredentialsError
|
66
|
+
error t("errors.MissingCredentialsError")
|
67
|
+
end
|
68
|
+
end
|