forked from gruntwork-io/terragrunt
/
config.go
83 lines (69 loc) · 2.78 KB
/
config.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
package aws_helper
import (
"fmt"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/credentials/stscreds"
"github.com/aws/aws-sdk-go/aws/endpoints"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/sts"
"github.com/gruntwork-io/terragrunt/errors"
"github.com/gruntwork-io/terragrunt/options"
"time"
)
// Returns an AWS session object for the given region (required), profile name (optional), and IAM role to assume
// (optional), ensuring that the credentials are available
func CreateAwsSession(awsRegion, customS3Endpoint string, awsProfile string, iamRoleArn string, terragruntOptions *options.TerragruntOptions) (*session.Session, error) {
defaultResolver := endpoints.DefaultResolver()
s3CustResolverFn := func(service, region string, optFns ...func(*endpoints.Options)) (endpoints.ResolvedEndpoint, error) {
if service == "s3" && customS3Endpoint != "" {
return endpoints.ResolvedEndpoint{
URL: customS3Endpoint,
SigningRegion: awsRegion,
}, nil
}
return defaultResolver.EndpointFor(service, region, optFns...)
}
var awsConfig = aws.Config{
Region: aws.String(awsRegion),
EndpointResolver: endpoints.ResolverFunc(s3CustResolverFn),
}
sess, err := session.NewSessionWithOptions(session.Options{
Config: awsConfig,
Profile: awsProfile,
SharedConfigState: session.SharedConfigEnable,
})
if err != nil {
return nil, errors.WithStackTraceAndPrefix(err, "Error initializing session")
}
if iamRoleArn != "" {
sess.Config.Credentials = stscreds.NewCredentials(sess, iamRoleArn)
} else if terragruntOptions.IamRole != "" {
sess.Config.Credentials = stscreds.NewCredentials(sess, terragruntOptions.IamRole)
}
_, err = sess.Config.Credentials.Get()
if err != nil {
return nil, errors.WithStackTraceAndPrefix(err, "Error finding AWS credentials (did you set the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY environment variables?)")
}
return sess, nil
}
// Make API calls to AWS to assume the IAM role specified and return the temporary AWS credentials to use that role
func AssumeIamRole(iamRoleArn string) (*sts.Credentials, error) {
sess, err := session.NewSession()
if err != nil {
return nil, errors.WithStackTrace(err)
}
_, err = sess.Config.Credentials.Get()
if err != nil {
return nil, errors.WithStackTraceAndPrefix(err, "Error finding AWS credentials (did you set the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY environment variables?)")
}
stsClient := sts.New(sess)
input := sts.AssumeRoleInput{
RoleArn: aws.String(iamRoleArn),
RoleSessionName: aws.String(fmt.Sprintf("terragrunt-%d", time.Now().UTC().UnixNano())),
}
output, err := stsClient.AssumeRole(&input)
if err != nil {
return nil, errors.WithStackTrace(err)
}
return output.Credentials, nil
}