/
aws.go
56 lines (47 loc) · 1.8 KB
/
aws.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
// Copyright 2019 Aporeto Inc.
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
// http://www.apache.org/licenses/LICENSE-2.0
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package providers
import (
"fmt"
"io/ioutil"
"net/http"
)
var (
metadataPath = "http://169.254.169.254/latest/meta-data/"
)
// AWSServiceRoleToken gets the service role data of the VM.
func AWSServiceRoleToken() (roleData string, err error) {
resp1, err := http.Get(fmt.Sprintf("%siam/security-credentials/", metadataPath))
if err != nil {
return "", fmt.Errorf("unable to retrieve role from magic url: %s", err)
}
if resp1.StatusCode != http.StatusOK {
return "", fmt.Errorf("unable to retrieve role from magic url: %s", resp1.Status)
}
defer resp1.Body.Close() // nolint: errcheck
role, err := ioutil.ReadAll(resp1.Body)
if err != nil {
return "", fmt.Errorf("unable to read role from aws magic ip: %s", err)
}
resp2, err := http.Get(fmt.Sprintf("%siam/security-credentials/%s", metadataPath, role))
if err != nil {
return "", fmt.Errorf("unable to retrieve token from magic url: %s", err)
}
if resp2.StatusCode != http.StatusOK {
return "", fmt.Errorf("unable to retrieve token from magic url: %s", resp2.Status)
}
defer resp2.Body.Close() // nolint errcheck
token, err := ioutil.ReadAll(resp2.Body)
if err != nil {
return "", fmt.Errorf("unable to read service token information: %s", err)
}
return string(token), nil
}