mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 18:17:55 +00:00 
			
		
		
		
	 7ca2caf3d0
			
		
	
	7ca2caf3d0
	
	
	
		
			
			* audit: deprecate errwrap.Wrapf() * builtin/audit/file: deprecate errwrap.Wrapf() * builtin/crediential/app-id: deprecate errwrap.Wrapf() * builtin/credential/approle: deprecate errwrap.Wrapf() * builtin/credential/aws: deprecate errwrap.Wrapf() * builtin/credentials/token: deprecate errwrap.Wrapf() * builtin/credential/github: deprecate errwrap.Wrapf() * builtin/credential/cert: deprecate errwrap.Wrapf() * builtin/logical/transit: deprecate errwrap.Wrapf() * builtin/logical/totp: deprecate errwrap.Wrapf() * builtin/logical/ssh: deprecate errwrap.Wrapf() * builtin/logical/rabbitmq: deprecate errwrap.Wrapf() * builtin/logical/postgresql: deprecate errwrap.Wrapf() * builtin/logical/pki: deprecate errwrap.Wrapf() * builtin/logical/nomad: deprecate errwrap.Wrapf() * builtin/logical/mssql: deprecate errwrap.Wrapf() * builtin/logical/database: deprecate errwrap.Wrapf() * builtin/logical/consul: deprecate errwrap.Wrapf() * builtin/logical/cassandra: deprecate errwrap.Wrapf() * builtin/logical/aws: deprecate errwrap.Wrapf()
		
			
				
	
	
		
			216 lines
		
	
	
		
			6.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			216 lines
		
	
	
		
			6.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package awsauth
 | |
| 
 | |
| import (
 | |
| 	"encoding/base64"
 | |
| 	"encoding/json"
 | |
| 	"fmt"
 | |
| 	"io/ioutil"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/aws/aws-sdk-go/aws"
 | |
| 	"github.com/aws/aws-sdk-go/aws/credentials"
 | |
| 	"github.com/aws/aws-sdk-go/aws/endpoints"
 | |
| 	"github.com/aws/aws-sdk-go/aws/session"
 | |
| 	"github.com/aws/aws-sdk-go/service/sts"
 | |
| 	"github.com/hashicorp/go-hclog"
 | |
| 	"github.com/hashicorp/vault/api"
 | |
| 	"github.com/hashicorp/vault/sdk/helper/awsutil"
 | |
| )
 | |
| 
 | |
| type CLIHandler struct{}
 | |
| 
 | |
| // STS is a really weird service that used to only have global endpoints but now has regional endpoints as well.
 | |
| // For backwards compatibility, even if you request a region other than us-east-1, it'll still sign for us-east-1.
 | |
| // See, e.g., https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#id_credentials_temp_enable-regions_writing_code
 | |
| // So we have to shim in this EndpointResolver to force it to sign for the right region
 | |
| func stsSigningResolver(service, region string, optFns ...func(*endpoints.Options)) (endpoints.ResolvedEndpoint, error) {
 | |
| 	defaultEndpoint, err := endpoints.DefaultResolver().EndpointFor(service, region, optFns...)
 | |
| 	if err != nil {
 | |
| 		return defaultEndpoint, err
 | |
| 	}
 | |
| 	defaultEndpoint.SigningRegion = region
 | |
| 	return defaultEndpoint, nil
 | |
| }
 | |
| 
 | |
| // GenerateLoginData populates the necessary data to send to the Vault server for generating a token
 | |
| // This is useful for other API clients to use
 | |
| func GenerateLoginData(creds *credentials.Credentials, headerValue, configuredRegion string) (map[string]interface{}, error) {
 | |
| 	loginData := make(map[string]interface{})
 | |
| 
 | |
| 	// Use the credentials we've found to construct an STS session
 | |
| 	region, err := awsutil.GetRegion(configuredRegion)
 | |
| 	if err != nil {
 | |
| 		hclog.Default().Warn(fmt.Sprintf("defaulting region to %q due to %s", awsutil.DefaultRegion, err.Error()))
 | |
| 		region = awsutil.DefaultRegion
 | |
| 	}
 | |
| 	stsSession, err := session.NewSessionWithOptions(session.Options{
 | |
| 		Config: aws.Config{
 | |
| 			Credentials:      creds,
 | |
| 			Region:           ®ion,
 | |
| 			EndpointResolver: endpoints.ResolverFunc(stsSigningResolver),
 | |
| 		},
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	var params *sts.GetCallerIdentityInput
 | |
| 	svc := sts.New(stsSession)
 | |
| 	stsRequest, _ := svc.GetCallerIdentityRequest(params)
 | |
| 
 | |
| 	// Inject the required auth header value, if supplied, and then sign the request including that header
 | |
| 	if headerValue != "" {
 | |
| 		stsRequest.HTTPRequest.Header.Add(iamServerIdHeader, headerValue)
 | |
| 	}
 | |
| 	stsRequest.Sign()
 | |
| 
 | |
| 	// Now extract out the relevant parts of the request
 | |
| 	headersJson, err := json.Marshal(stsRequest.HTTPRequest.Header)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	requestBody, err := ioutil.ReadAll(stsRequest.HTTPRequest.Body)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	loginData["iam_http_request_method"] = stsRequest.HTTPRequest.Method
 | |
| 	loginData["iam_request_url"] = base64.StdEncoding.EncodeToString([]byte(stsRequest.HTTPRequest.URL.String()))
 | |
| 	loginData["iam_request_headers"] = base64.StdEncoding.EncodeToString(headersJson)
 | |
| 	loginData["iam_request_body"] = base64.StdEncoding.EncodeToString(requestBody)
 | |
| 
 | |
| 	return loginData, nil
 | |
| }
 | |
| 
 | |
| func (h *CLIHandler) Auth(c *api.Client, m map[string]string) (*api.Secret, error) {
 | |
| 	mount, ok := m["mount"]
 | |
| 	if !ok {
 | |
| 		mount = "aws"
 | |
| 	}
 | |
| 
 | |
| 	role, ok := m["role"]
 | |
| 	if !ok {
 | |
| 		role = ""
 | |
| 	}
 | |
| 
 | |
| 	headerValue, ok := m["header_value"]
 | |
| 	if !ok {
 | |
| 		headerValue = ""
 | |
| 	}
 | |
| 
 | |
| 	logVal, ok := m["log_level"]
 | |
| 	if !ok {
 | |
| 		logVal = "info"
 | |
| 	}
 | |
| 	level := hclog.LevelFromString(logVal)
 | |
| 	if level == hclog.NoLevel {
 | |
| 		return nil, fmt.Errorf("failed to parse 'log_level' value: %q", logVal)
 | |
| 	}
 | |
| 	hlogger := hclog.Default()
 | |
| 	hlogger.SetLevel(level)
 | |
| 
 | |
| 	creds, err := RetrieveCreds(m["aws_access_key_id"], m["aws_secret_access_key"], m["aws_security_token"], hlogger)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	region := m["region"]
 | |
| 	if region == "" {
 | |
| 		region = awsutil.DefaultRegion
 | |
| 	}
 | |
| 	loginData, err := GenerateLoginData(creds, headerValue, region)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if loginData == nil {
 | |
| 		return nil, fmt.Errorf("got nil response from GenerateLoginData")
 | |
| 	}
 | |
| 	loginData["role"] = role
 | |
| 	path := fmt.Sprintf("auth/%s/login", mount)
 | |
| 	secret, err := c.Logical().Write(path, loginData)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if secret == nil {
 | |
| 		return nil, fmt.Errorf("empty response from credential provider")
 | |
| 	}
 | |
| 
 | |
| 	return secret, nil
 | |
| }
 | |
| 
 | |
| func RetrieveCreds(accessKey, secretKey, sessionToken string, logger hclog.Logger) (*credentials.Credentials, error) {
 | |
| 	credConfig := &awsutil.CredentialsConfig{
 | |
| 		AccessKey:    accessKey,
 | |
| 		SecretKey:    secretKey,
 | |
| 		SessionToken: sessionToken,
 | |
| 		Logger:       logger,
 | |
| 	}
 | |
| 	creds, err := credConfig.GenerateCredentialChain()
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if creds == nil {
 | |
| 		return nil, fmt.Errorf("could not compile valid credential providers from static config, environment, shared, or instance metadata")
 | |
| 	}
 | |
| 
 | |
| 	_, err = creds.Get()
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("failed to retrieve credentials from credential chain: %w", err)
 | |
| 	}
 | |
| 	return creds, nil
 | |
| }
 | |
| 
 | |
| func (h *CLIHandler) Help() string {
 | |
| 	help := `
 | |
| Usage: vault login -method=aws [CONFIG K=V...]
 | |
| 
 | |
|   The AWS auth method allows users to authenticate with AWS IAM
 | |
|   credentials. The AWS IAM credentials may be specified in a number of ways,
 | |
|   listed in order of precedence below:
 | |
| 
 | |
|     1. Explicitly via the command line (not recommended)
 | |
| 
 | |
|     2. Via the standard AWS environment variables (AWS_ACCESS_KEY, etc.)
 | |
| 
 | |
|     3. Via the ~/.aws/credentials file
 | |
| 
 | |
|     4. Via EC2 instance profile
 | |
| 
 | |
|   Authenticate using locally stored credentials:
 | |
| 
 | |
|       $ vault login -method=aws
 | |
| 
 | |
|   Authenticate by passing keys:
 | |
| 
 | |
|       $ vault login -method=aws aws_access_key_id=... aws_secret_access_key=...
 | |
| 
 | |
| Configuration:
 | |
| 
 | |
|   aws_access_key_id=<string>
 | |
|       Explicit AWS access key ID
 | |
| 
 | |
|   aws_secret_access_key=<string>
 | |
|       Explicit AWS secret access key
 | |
| 
 | |
|   aws_security_token=<string>
 | |
|       Explicit AWS security token for temporary credentials
 | |
| 
 | |
|   header_value=<string>
 | |
|       Value for the x-vault-aws-iam-server-id header in requests
 | |
| 
 | |
|   mount=<string>
 | |
|       Path where the AWS credential method is mounted. This is usually provided
 | |
|       via the -path flag in the "vault login" command, but it can be specified
 | |
|       here as well. If specified here, it takes precedence over the value for
 | |
|       -path. The default value is "aws".
 | |
| 
 | |
|   role=<string>
 | |
|       Name of the role to request a token against
 | |
| 
 | |
|   log_level=<string>
 | |
|       Set logging level during AWS credential acquisition. Valid levels are
 | |
|       trace, debug, info, warn, error. Defaults to info.
 | |
| `
 | |
| 
 | |
| 	return strings.TrimSpace(help)
 | |
| }
 |