Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Initial commit of assume role cred provider #990

Merged
merged 2 commits into from
Nov 8, 2014
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
276 changes: 276 additions & 0 deletions awscli/customizations/assumerole.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,276 @@
import os
import time
import json
import logging

from dateutil.parser import parse
from datetime import datetime
from dateutil.tz import tzlocal

from botocore import credentials
from botocore.compat import total_seconds
from botocore.exceptions import PartialCredentialsError


LOG = logging.getLogger(__name__)


class InvalidConfigError(Exception):
pass


def register_assume_role_provider(event_handlers):
event_handlers.register('building-command-table.*',
inject_assume_role_provider,
unique_id='inject_assume_role_cred_provider')


def inject_assume_role_provider(session, event_name, **kwargs):
if event_name.endswith('.main'):
# Register the assume role provider only when we're not building the
# top level command table. We want all the top level args processed
# before we start injecting things into the session.
return
provider = create_assume_role_provider(session)
session.get_component('credential_provider').insert_before(
'config-file', provider)


def create_assume_role_provider(session):
profile_name = session.get_config_variable('profile') or 'default'
load_config = lambda: session.full_config
return AssumeRoleProvider(
load_config=load_config,
client_creator=session.create_client,
cache=JSONFileCache(AssumeRoleProvider.CACHE_DIR),
profile_name=profile_name,
)


def create_refresher_function(client, params):
def refresh():
role_session_name = 'AWS-CLI-session-%s' % (int(time.time()))
params['RoleSessionName'] = role_session_name
response = client.assume_role(**params)
credentials = response['Credentials']
# We need to normalize the credential names to
# the values expected by the refresh creds.
return {
'access_key': credentials['AccessKeyId'],
'secret_key': credentials['SecretAccessKey'],
'token': credentials['SessionToken'],
'expiry_time': credentials['Expiration'],
}
return refresh


class JSONFileCache(object):
"""JSON file cache.

This provides a dict like interface that stores JSON serializable
objects.

The objects are serialized to JSON and stored in a file. These
values can be retrieved at a later time.

"""
def __init__(self, working_dir):
self._working_dir = working_dir

def __contains__(self, cache_key):
actual_key = self._convert_cache_key(cache_key)
return os.path.isfile(actual_key)

def __getitem__(self, cache_key):
"""Retrieve value from a cache key."""
actual_key = self._convert_cache_key(cache_key)
try:
with open(actual_key) as f:
return json.load(f)
except (OSError, ValueError, IOError):
raise KeyError(cache_key)

def __setitem__(self, cache_key, value):
full_key = self._convert_cache_key(cache_key)
try:
file_content = json.dumps(value)
except (TypeError, ValueError):
raise ValueError("Value cannot be cached, must be "
"JSON serializable: %s" % value)
if not os.path.isdir(self._working_dir):
os.makedirs(self._working_dir)
with open(full_key, 'w') as f:
f.write(file_content)

def _convert_cache_key(self, cache_key):
full_path = os.path.join(self._working_dir, cache_key + '.json')
return full_path


class AssumeRoleProvider(credentials.CredentialProvider):

METHOD = 'assume-role'
CACHE_DIR = os.path.expanduser(os.path.join('~', '.aws', 'cli', 'cache'))
ROLE_CONFIG_VAR = 'role_arn'
# Credentials are considered expired (and will be refreshed) once the total
# remaining time left until the credentials expires is less than the
# EXPIRY_WINDOW.
EXPIRY_WINDOW_SECONDS = 60 * 5

def __init__(self, load_config, client_creator, cache, profile_name):
"""

:type load_config: callable
:param load_config: A function that accepts no arguments, and
when called, will return the full configuration dictionary
for the session (``session.full_config``).

:type client_creator: callable
:param client_creator: A factory function that will create
a client when called. Has the same interface as
``botocore.session.Session.create_client``.

:type cache: JSONFileCache
:param cache: An object that supports ``__getitem__``,
``__setitem__``, and ``__contains__``. An example
of this is the ``JSONFileCache`` class.

:type profile_name: str
:param profile_name: The name of the profile.

"""
self._load_config = load_config
# client_creator is a callable that creates function.
# It's basically session.create_client
self._client_creator = client_creator
self._profile_name = profile_name
self._cache = cache
# The _loaded_config attribute will be populated from the
# load_config() function once the configuration is actually
# loaded. The reason we go through all this instead of just
# requiring that the loaded_config be passed to us is to that
# we can defer configuration loaded until we actually try
# to load credentials (as opposed to when the object is
# instantiated).
self._loaded_config = {}

def load(self):
self._loaded_config = self._load_config()
if self._has_assume_role_config_vars():
return self._load_creds_via_assume_role()

def _has_assume_role_config_vars(self):
profiles = self._loaded_config.get('profiles', {})
return self.ROLE_CONFIG_VAR in profiles.get(self._profile_name, {})

def _load_creds_via_assume_role(self):
# We can get creds in one of two ways:
# * It can either be cached on disk from an pre-existing session
# * Cache doesn't have the creds (or is expired) so we need to make
# an assume role call to get temporary creds, which we then cache
# for subsequent requests.
creds = self._load_creds_from_cache()
if creds is not None:
LOG.debug("Credentials for role retrieved from cache.")
return creds
else:
# We get the Credential used by botocore as well
# as the original parsed response from the server.
creds, response = self._retrieve_temp_credentials()
cache_key = self._create_cache_key()
self._write_cached_credentials(response, cache_key)
return creds

def _load_creds_from_cache(self):
cache_key = self._create_cache_key()
try:
from_cache = self._cache[cache_key]
if self._is_expired(from_cache):
# Don't need to delete the cache entry,
# when we refresh via AssumeRole, we'll
# update the cache with the new entry.
LOG.debug("Credentials were found in cache, but they are expired.")
return None
else:
return self._create_creds_from_response(from_cache)
except KeyError:
return None

def _is_expired(self, credentials):
end_time = parse(credentials['Credentials']['Expiration'])
now = datetime.now(tzlocal())
seconds = total_seconds(end_time - now)
return seconds < self.EXPIRY_WINDOW_SECONDS

def _create_cache_key(self):
role_config = self._get_role_config_values()
cache_key = '%s--%s' % (self._profile_name, role_config['role_arn'])
return cache_key.replace('/', '-')

def _write_cached_credentials(self, creds, cache_key):
self._cache[cache_key] = creds

def _get_role_config_values(self):
# This returns the role related configuration.
profiles = self._loaded_config.get('profiles', {})
try:
source_profile = profiles[self._profile_name]['source_profile']
role_arn = profiles[self._profile_name]['role_arn']
except KeyError as e:
raise PartialCredentialsError(provider=self.METHOD,
cred_var=str(e))
external_id = profiles[self._profile_name].get('external_id')
if source_profile not in profiles:
raise InvalidConfigError(
'The source_profile "%s" referenced in '
'the profile "%s" does not exist.' % (
source_profile, self._profile_name))
source_cred_values = profiles[source_profile]
return {
'role_arn': role_arn,
'external_id': external_id,
'source_profile': source_profile,
'source_cred_values': source_cred_values,
}


def _create_creds_from_response(self, response):
config = self._get_role_config_values()
return credentials.RefreshableCredentials(
access_key=response['Credentials']['AccessKeyId'],
secret_key=response['Credentials']['SecretAccessKey'],
token=response['Credentials']['SessionToken'],
method=self.METHOD,
expiry_time=parse(response['Credentials']['Expiration']),
refresh_using=create_refresher_function(
self._create_client_from_config(config),
self._assume_role_base_kwargs(config)),
)

def _create_client_from_config(self, config):
source_cred_values = config['source_cred_values']
client = self._client_creator(
'sts', aws_access_key_id=source_cred_values['aws_access_key_id'],
aws_secret_access_key=source_cred_values['aws_secret_access_key'],
aws_session_token=source_cred_values.get('aws_session_token'),
)
return client

def _assume_role_base_kwargs(self, config):
assume_role_kwargs = {'RoleArn': config['role_arn']}
if config['external_id'] is not None:
assume_role_kwargs['ExternalId'] = config['external_id']
return assume_role_kwargs

def _retrieve_temp_credentials(self):
LOG.debug("Retrieving credentials via AssumeRole.")
config = self._get_role_config_values()
client = self._create_client_from_config(config)

assume_role_kwargs = self._assume_role_base_kwargs(config)
role_session_name = 'AWS-CLI-session-%s' % (int(time.time()))
assume_role_kwargs['RoleSessionName'] = role_session_name

response = client.assume_role(**assume_role_kwargs)
creds = self._create_creds_from_response(response)
return creds, response
2 changes: 2 additions & 0 deletions awscli/handlers.py
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,7 @@
from awscli.customizations.cliinputjson import register_cli_input_json
from awscli.customizations.generatecliskeleton import \
register_generate_cli_skeleton
from awscli.customizations.assumerole import register_assume_role_provider


def awscli_initialize(event_handlers):
Expand Down Expand Up @@ -105,3 +106,4 @@ def awscli_initialize(event_handlers):
register_cloudsearchdomain(event_handlers)
register_s3_endpoint(event_handlers)
register_generate_cli_skeleton(event_handlers)
register_assume_role_provider(event_handlers)
Loading