forked from 99designs/aws-vault
-
Notifications
You must be signed in to change notification settings - Fork 0
/
login.go
99 lines (84 loc) · 2.25 KB
/
login.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
package main
import (
"encoding/json"
"fmt"
"io/ioutil"
"log"
"net/http"
"net/url"
"github.com/99designs/aws-vault/keyring"
"github.com/99designs/aws-vault/prompt"
"github.com/aws/aws-sdk-go/aws/awserr"
"github.com/aws/aws-sdk-go/aws/credentials"
"github.com/skratchdot/open-golang/open"
)
type LoginCommandInput struct {
Profile string
Keyring keyring.Keyring
MfaToken string
MfaPrompt prompt.PromptFunc
UseStdout bool
}
func LoginCommand(ui Ui, input LoginCommandInput) {
provider, err := NewVaultProvider(input.Keyring, input.Profile, VaultOptions{
AssumeRoleDuration: MaxAssumeRoleDuration,
MfaToken: input.MfaToken,
MfaPrompt: input.MfaPrompt,
})
if err != nil {
ui.Error.Fatal(err)
}
creds := credentials.NewCredentials(provider)
val, err := creds.Get()
if err != nil {
if awsErr, ok := err.(awserr.Error); ok && awsErr.Code() == "NoCredentialProviders" {
ui.Error.Fatalf("No credentials found for profile %q", input.Profile)
} else {
ui.Error.Fatal(err)
}
}
jsonBytes, err := json.Marshal(map[string]string{
"sessionId": val.AccessKeyID,
"sessionKey": val.SecretAccessKey,
"sessionToken": val.SessionToken,
})
if err != nil {
ui.Error.Fatal(err)
}
req, err := http.NewRequest("GET", "https://signin.aws.amazon.com/federation", nil)
if err != nil {
ui.Error.Fatal(err)
}
q := req.URL.Query()
q.Add("Action", "getSigninToken")
q.Add("Session", string(jsonBytes))
req.URL.RawQuery = q.Encode()
resp, err := http.DefaultClient.Do(req)
if err != nil {
ui.Error.Fatal(err)
}
defer resp.Body.Close()
body, err := ioutil.ReadAll(resp.Body)
if err != nil {
ui.Error.Fatal(err)
}
var respParsed map[string]string
if err = json.Unmarshal([]byte(body), &respParsed); err != nil {
ui.Error.Fatal(err)
}
signinToken, ok := respParsed["SigninToken"]
if !ok {
ui.Error.Fatal("Expected a response with SigninToken")
}
loginUrl := fmt.Sprintf(
"https://signin.aws.amazon.com/federation?Action=login&Issuer=aws-vault&Destination=%s&SigninToken=%s",
url.QueryEscape("https://console.aws.amazon.com/"),
url.QueryEscape(signinToken),
)
if input.UseStdout {
fmt.Println(loginUrl)
} else if err = open.Run(loginUrl); err != nil {
log.Println(err)
fmt.Println(loginUrl)
}
}