Skip to content

Commit

Permalink
Merge pull request #52 from ekristen/aws-auth-parity
Browse files Browse the repository at this point in the history
feat(aws-auth): finish parity with upstream
  • Loading branch information
ekristen authored Jan 31, 2024
2 parents 1d91380 + 245ade3 commit c4d38d1
Show file tree
Hide file tree
Showing 2 changed files with 53 additions and 13 deletions.
7 changes: 6 additions & 1 deletion pkg/awsutil/session.go
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,8 @@ type Credentials struct {
SecretAccessKey string
SessionToken string
AssumeRoleArn string
ExternalId string
RoleSessionName string

Credentials *credentials.Credentials

Expand Down Expand Up @@ -116,7 +118,10 @@ func (c *Credentials) rootSession() (*session.Session, error) {

// if given a role to assume, overwrite the session credentials with assume role credentials
if c.AssumeRoleArn != "" {
sess.Config.Credentials = stscreds.NewCredentials(sess, c.AssumeRoleArn)
sess.Config.Credentials = stscreds.NewCredentials(sess, c.AssumeRoleArn, func(p *stscreds.AssumeRoleProvider) {
p.RoleSessionName = c.RoleSessionName
p.ExternalID = aws.String(c.ExternalId)
})
}

c.session = sess
Expand Down
59 changes: 47 additions & 12 deletions pkg/commands/nuke/command.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ package nuke
import (
"context"
"fmt"
"os"
"slices"

"github.com/sirupsen/logrus"
Expand All @@ -23,22 +22,26 @@ import (
"github.com/ekristen/aws-nuke/pkg/nuke"
)

func configureCreds(c *cli.Context) (creds awsutil.Credentials) {
creds.Profile = c.String("profile")
creds.AccessKeyID = c.String("access-key-id")
creds.SecretAccessKey = c.String("secret-access-key")
creds.SessionToken = c.String("session-token")
creds.AssumeRoleArn = c.String("assume-role-arn")
creds.RoleSessionName = c.String("assume-role-session-name")
creds.ExternalId = c.String("assume-role-external-id")

return creds
}

func execute(c *cli.Context) error {
ctx, cancel := context.WithCancel(c.Context)
defer cancel()

var (
err error
creds awsutil.Credentials
defaultRegion string
)
defaultRegion := c.String("default-region")
creds := configureCreds(c)

if !creds.HasKeys() && !creds.HasProfile() && defaultRegion != "" {
creds.AccessKeyID = os.Getenv("AWS_ACCESS_KEY_ID")
creds.SecretAccessKey = os.Getenv("AWS_SECRET_ACCESS_KEY")
}
err = creds.Validate()
if err != nil {
if err := creds.Validate(); err != nil {
return err
}

Expand Down Expand Up @@ -207,6 +210,38 @@ func init() {
Name: "feature-flag",
Usage: "enable experimental behaviors that may not be fully tested or supported",
},
&cli.StringFlag{
Name: "default-region",
EnvVars: []string{"AWS_DEFAULT_REGION"},
},
&cli.StringFlag{
Name: "access-key-id",
EnvVars: []string{"AWS_ACCESS_KEY_ID"},
},
&cli.StringFlag{
Name: "secret-access-key",
EnvVars: []string{"AWS_SECRET_ACCESS_KEY"},
},
&cli.StringFlag{
Name: "session-token",
EnvVars: []string{"AWS_SESSION_TOKEN"},
},
&cli.StringFlag{
Name: "profile",
EnvVars: []string{"AWS_PROFILE"},
},
&cli.StringFlag{
Name: "assume-role-arn",
EnvVars: []string{"AWS_ASSUME_ROLE_ARN"},
},
&cli.StringFlag{
Name: "assume-role-session-name",
EnvVars: []string{"AWS_ASSUME_ROLE_SESSION_NAME"},
},
&cli.StringFlag{
Name: "assume-role-external-id",
EnvVars: []string{"AWS_ASSUME_ROLE_EXTERNAL_ID"},
},
}

cmd := &cli.Command{
Expand Down

0 comments on commit c4d38d1

Please sign in to comment.