-
Notifications
You must be signed in to change notification settings - Fork 14
/
api.go
112 lines (95 loc) · 3.84 KB
/
api.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
/*
Package aws_role may be used by service code to obtain Keymaster-issued identity
certificates. The identity certificate will contain the AWS IAM role that the
service code is able to assume (i.e. EC2 instance profile, EKS IRSA, Lambda
role). The full AWS Role ARN is stored in a certificate URI SAN extension and a
simplified form of the ARN is stored in the certificate CN.
The full AWS Role ARN will reflect the actual role ARN, rather than an ARN
showing how the credentials were obtained. This mirrors the way AWS policy
documents are written. The ARN will have the form:
arn:aws:iam::$AccountId:role/$RoleName
The service code does not require any extra permissions. It uses the
sts:GetCallerIdentity permission that is available to all AWS identities. Thus,
no policy configuration is required.
This code uses the AWS IAM credentials to request a pre-signed URL from the AWS
Security Token Service (STS). This pre-signed URL is passed to Keymaster which
can make a request using the URL to verify the identity of the caller. No
credentials are sent.
The protocol is a simple HTTPS/REST interface, typically located on the path:
/aws/requestRoleCertificate/v1
The client issues a POST request with the following headers:
Claimed-Arn: the full AWS Role ARN
Presigned-Method: the method type specified in the pre-signing response
Presigned-URL: the URL specified in the pre-signing response
The body of the request must contain a PEM-encoded Public Key DER.
On success, the response body will contain a signed, PEM-encoded X.509
Certificate.
*/
package aws_role
import (
"context"
"crypto"
"crypto/tls"
"net/http"
"sync"
"github.com/Cloud-Foundations/golib/pkg/awsutil/presignauth/presigner"
"github.com/Cloud-Foundations/golib/pkg/log"
"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/service/sts"
)
type Params struct {
// Required parameters.
KeymasterServer string
Logger log.DebugLogger
// Optional parameters.
AwsConfig *aws.Config
Context context.Context
HttpClient *http.Client
Signer crypto.Signer
StsClient *sts.Client
StsPresignClient *sts.PresignClient
derPubKey []byte
isSetup bool
pemPubKey []byte
presigner presigner.Presigner
}
type Manager struct {
params Params
mutex sync.RWMutex // Protect everything below.
certError error
certPEM []byte
certTLS *tls.Certificate
waiters map[chan<- struct{}]struct{}
}
// GetRoleCertificate requests an AWS role identify certificate from the
// Keymaster server specified in params. It returns the certificate PEM.
func GetRoleCertificate(params Params) ([]byte, error) {
return params.getRoleCertificate()
}
// GetRoleCertificateTLS requests an AWS role identify certificate from the
// Keymaster server specified in params. It returns the certificate.
func GetRoleCertificateTLS(params Params) (*tls.Certificate, error) {
_, certTLS, err := params.getRoleCertificateTLS()
return certTLS, err
}
// NewManager returns a certificate manager which provides AWS role identity
// certificates from the Keymaster server specified in params. Certificates
// are refreshed in the background.
func NewManager(params Params) (*Manager, error) {
return newManager(params)
}
// GetClientCertificate returns a valid, cached certificate. The method
// value may be assigned to the crypto/tls.Config.GetClientCertificate field.
func (m *Manager) GetClientCertificate(cri *tls.CertificateRequestInfo) (
*tls.Certificate, error) {
return m.getClientCertificate(cri)
}
// GetRoleCertificate returns a valid, cached certificate. It returns the
// certificate PEM, TLS certificate and error.
func (m *Manager) GetRoleCertificate() ([]byte, *tls.Certificate, error) {
return m.getRoleCertificate()
}
// WaitForRefresh waits until a successful certificate refresh.
func (m *Manager) WaitForRefresh() {
m.waitForRefresh()
}