123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370 |
- /*
- * MinIO Go Library for Amazon S3 Compatible Cloud Storage
- * Copyright 2017 MinIO, Inc.
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
- package credentials
- import (
- "bufio"
- "errors"
- "fmt"
- "io/ioutil"
- "net"
- "net/http"
- "net/url"
- "os"
- "path"
- "strings"
- "time"
- jsoniter "github.com/json-iterator/go"
- )
- // DefaultExpiryWindow - Default expiry window.
- // ExpiryWindow will allow the credentials to trigger refreshing
- // prior to the credentials actually expiring. This is beneficial
- // so race conditions with expiring credentials do not cause
- // request to fail unexpectedly due to ExpiredTokenException exceptions.
- // DefaultExpiryWindow can be used as parameter to (*Expiry).SetExpiration.
- // When used the tokens refresh will be triggered when 80% of the elapsed
- // time until the actual expiration time is passed.
- const DefaultExpiryWindow = -1
- // A IAM retrieves credentials from the EC2 service, and keeps track if
- // those credentials are expired.
- type IAM struct {
- Expiry
- // Required http Client to use when connecting to IAM metadata service.
- Client *http.Client
- // Custom endpoint to fetch IAM role credentials.
- Endpoint string
- }
- // IAM Roles for Amazon EC2
- // http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html
- const (
- defaultIAMRoleEndpoint = "http://169.254.169.254"
- defaultECSRoleEndpoint = "http://169.254.170.2"
- defaultSTSRoleEndpoint = "https://sts.amazonaws.com"
- defaultIAMSecurityCredsPath = "/latest/meta-data/iam/security-credentials/"
- tokenRequestTTLHeader = "X-aws-ec2-metadata-token-ttl-seconds"
- tokenPath = "/latest/api/token"
- tokenTTL = "21600"
- tokenRequestHeader = "X-aws-ec2-metadata-token"
- )
- // NewIAM returns a pointer to a new Credentials object wrapping the IAM.
- func NewIAM(endpoint string) *Credentials {
- return New(&IAM{
- Client: &http.Client{
- Transport: http.DefaultTransport,
- },
- Endpoint: endpoint,
- })
- }
- // Retrieve retrieves credentials from the EC2 service.
- // Error will be returned if the request fails, or unable to extract
- // the desired
- func (m *IAM) Retrieve() (Value, error) {
- token := os.Getenv("AWS_CONTAINER_AUTHORIZATION_TOKEN")
- var roleCreds ec2RoleCredRespBody
- var err error
- endpoint := m.Endpoint
- switch {
- case len(os.Getenv("AWS_WEB_IDENTITY_TOKEN_FILE")) > 0:
- if len(endpoint) == 0 {
- if len(os.Getenv("AWS_REGION")) > 0 {
- if strings.HasPrefix(os.Getenv("AWS_REGION"), "cn-") {
- endpoint = "https://sts." + os.Getenv("AWS_REGION") + ".amazonaws.com.cn"
- } else {
- endpoint = "https://sts." + os.Getenv("AWS_REGION") + ".amazonaws.com"
- }
- } else {
- endpoint = defaultSTSRoleEndpoint
- }
- }
- creds := &STSWebIdentity{
- Client: m.Client,
- STSEndpoint: endpoint,
- GetWebIDTokenExpiry: func() (*WebIdentityToken, error) {
- token, err := ioutil.ReadFile(os.Getenv("AWS_WEB_IDENTITY_TOKEN_FILE"))
- if err != nil {
- return nil, err
- }
- return &WebIdentityToken{Token: string(token)}, nil
- },
- roleARN: os.Getenv("AWS_ROLE_ARN"),
- roleSessionName: os.Getenv("AWS_ROLE_SESSION_NAME"),
- }
- stsWebIdentityCreds, err := creds.Retrieve()
- if err == nil {
- m.SetExpiration(creds.Expiration(), DefaultExpiryWindow)
- }
- return stsWebIdentityCreds, err
- case len(os.Getenv("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI")) > 0:
- if len(endpoint) == 0 {
- endpoint = fmt.Sprintf("%s%s", defaultECSRoleEndpoint,
- os.Getenv("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI"))
- }
- roleCreds, err = getEcsTaskCredentials(m.Client, endpoint, token)
- case len(os.Getenv("AWS_CONTAINER_CREDENTIALS_FULL_URI")) > 0:
- if len(endpoint) == 0 {
- endpoint = os.Getenv("AWS_CONTAINER_CREDENTIALS_FULL_URI")
- var ok bool
- if ok, err = isLoopback(endpoint); !ok {
- if err == nil {
- err = fmt.Errorf("uri host is not a loopback address: %s", endpoint)
- }
- break
- }
- }
- roleCreds, err = getEcsTaskCredentials(m.Client, endpoint, token)
- default:
- roleCreds, err = getCredentials(m.Client, endpoint)
- }
- if err != nil {
- return Value{}, err
- }
- // Expiry window is set to 10secs.
- m.SetExpiration(roleCreds.Expiration, DefaultExpiryWindow)
- return Value{
- AccessKeyID: roleCreds.AccessKeyID,
- SecretAccessKey: roleCreds.SecretAccessKey,
- SessionToken: roleCreds.Token,
- SignerType: SignatureV4,
- }, nil
- }
- // A ec2RoleCredRespBody provides the shape for unmarshaling credential
- // request responses.
- type ec2RoleCredRespBody struct {
- // Success State
- Expiration time.Time
- AccessKeyID string
- SecretAccessKey string
- Token string
- // Error state
- Code string
- Message string
- // Unused params.
- LastUpdated time.Time
- Type string
- }
- // Get the final IAM role URL where the request will
- // be sent to fetch the rolling access credentials.
- // http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html
- func getIAMRoleURL(endpoint string) (*url.URL, error) {
- u, err := url.Parse(endpoint)
- if err != nil {
- return nil, err
- }
- u.Path = defaultIAMSecurityCredsPath
- return u, nil
- }
- // listRoleNames lists of credential role names associated
- // with the current EC2 service. If there are no credentials,
- // or there is an error making or receiving the request.
- // http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html
- func listRoleNames(client *http.Client, u *url.URL, token string) ([]string, error) {
- req, err := http.NewRequest(http.MethodGet, u.String(), nil)
- if err != nil {
- return nil, err
- }
- if token != "" {
- req.Header.Add(tokenRequestHeader, token)
- }
- resp, err := client.Do(req)
- if err != nil {
- return nil, err
- }
- defer resp.Body.Close()
- if resp.StatusCode != http.StatusOK {
- return nil, errors.New(resp.Status)
- }
- credsList := []string{}
- s := bufio.NewScanner(resp.Body)
- for s.Scan() {
- credsList = append(credsList, s.Text())
- }
- if err := s.Err(); err != nil {
- return nil, err
- }
- return credsList, nil
- }
- func getEcsTaskCredentials(client *http.Client, endpoint string, token string) (ec2RoleCredRespBody, error) {
- req, err := http.NewRequest(http.MethodGet, endpoint, nil)
- if err != nil {
- return ec2RoleCredRespBody{}, err
- }
- if token != "" {
- req.Header.Set("Authorization", token)
- }
- resp, err := client.Do(req)
- if err != nil {
- return ec2RoleCredRespBody{}, err
- }
- defer resp.Body.Close()
- if resp.StatusCode != http.StatusOK {
- return ec2RoleCredRespBody{}, errors.New(resp.Status)
- }
- respCreds := ec2RoleCredRespBody{}
- if err := jsoniter.NewDecoder(resp.Body).Decode(&respCreds); err != nil {
- return ec2RoleCredRespBody{}, err
- }
- return respCreds, nil
- }
- func fetchIMDSToken(client *http.Client, endpoint string) (string, error) {
- req, err := http.NewRequest(http.MethodPut, endpoint+tokenPath, nil)
- if err != nil {
- return "", err
- }
- req.Header.Add(tokenRequestTTLHeader, tokenTTL)
- resp, err := client.Do(req)
- if err != nil {
- return "", err
- }
- defer resp.Body.Close()
- data, err := ioutil.ReadAll(resp.Body)
- if err != nil {
- return "", err
- }
- if resp.StatusCode != http.StatusOK {
- return "", errors.New(resp.Status)
- }
- return string(data), nil
- }
- // getCredentials - obtains the credentials from the IAM role name associated with
- // the current EC2 service.
- //
- // If the credentials cannot be found, or there is an error
- // reading the response an error will be returned.
- func getCredentials(client *http.Client, endpoint string) (ec2RoleCredRespBody, error) {
- if endpoint == "" {
- endpoint = defaultIAMRoleEndpoint
- }
- // https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html
- token, _ := fetchIMDSToken(client, endpoint)
- // http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html
- u, err := getIAMRoleURL(endpoint)
- if err != nil {
- return ec2RoleCredRespBody{}, err
- }
- // http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html
- roleNames, err := listRoleNames(client, u, token)
- if err != nil {
- return ec2RoleCredRespBody{}, err
- }
- if len(roleNames) == 0 {
- return ec2RoleCredRespBody{}, errors.New("No IAM roles attached to this EC2 service")
- }
- // http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html
- // - An instance profile can contain only one IAM role. This limit cannot be increased.
- roleName := roleNames[0]
- // http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html
- // The following command retrieves the security credentials for an
- // IAM role named `s3access`.
- //
- // $ curl http://169.254.169.254/latest/meta-data/iam/security-credentials/s3access
- //
- u.Path = path.Join(u.Path, roleName)
- req, err := http.NewRequest(http.MethodGet, u.String(), nil)
- if err != nil {
- return ec2RoleCredRespBody{}, err
- }
- if token != "" {
- req.Header.Add(tokenRequestHeader, token)
- }
- resp, err := client.Do(req)
- if err != nil {
- return ec2RoleCredRespBody{}, err
- }
- defer resp.Body.Close()
- if resp.StatusCode != http.StatusOK {
- return ec2RoleCredRespBody{}, errors.New(resp.Status)
- }
- respCreds := ec2RoleCredRespBody{}
- if err := jsoniter.NewDecoder(resp.Body).Decode(&respCreds); err != nil {
- return ec2RoleCredRespBody{}, err
- }
- if respCreds.Code != "Success" {
- // If an error code was returned something failed requesting the role.
- return ec2RoleCredRespBody{}, errors.New(respCreds.Message)
- }
- return respCreds, nil
- }
- // isLoopback identifies if a uri's host is on a loopback address
- func isLoopback(uri string) (bool, error) {
- u, err := url.Parse(uri)
- if err != nil {
- return false, err
- }
- host := u.Hostname()
- if len(host) == 0 {
- return false, fmt.Errorf("can't parse host from uri: %s", uri)
- }
- ips, err := net.LookupHost(host)
- if err != nil {
- return false, err
- }
- for _, ip := range ips {
- if !net.ParseIP(ip).IsLoopback() {
- return false, nil
- }
- }
- return true, nil
- }
|