aboutsummaryrefslogtreecommitdiff
path: root/app/controllers/api_credentials.go
blob: 1cefc074ae54777ddd99cb7be5379fb1ecf7b46d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
package controllers

import (
	"net/http"
	"time"

	"code.crute.us/mcrute/cloud-identity-broker/cloud/aws"

	"code.crute.us/mcrute/golib/echo/controller"
	"github.com/labstack/echo/v4"
	"github.com/prometheus/client_golang/prometheus"
	"github.com/prometheus/client_golang/prometheus/promauto"
)

var credsAllowed = promauto.NewCounterVec(prometheus.CounterOpts{
	Namespace: "aws_access", // Legacy namespace
	Name:      "broker_cred_access_total",
	Help:      "Total number of credential accesses allowed by broker",
}, []string{"account", "region"})

type jsonCredential struct {
	AccessKeyId     *string    `json:"access_key"`
	SecretAccessKey *string    `json:"secret_key"`
	SessionToken    *string    `json:"session_token"`
	Expiration      *time.Time `json:"expiration"`
}

type APICredentialsHandler struct {
	*AWSAPI
}

func NewAPICredentialsHandler(a *AWSAPI) echo.HandlerFunc {
	al := &APICredentialsHandler{a}
	h := &controller.ContentTypeNegotiatingHandler{
		DefaultHandler: al.Handle,
		Handlers: map[string]echo.HandlerFunc{
			contentTypeV1: al.Handle,
		},
	}
	return h.Handle
}

func (h *APICredentialsHandler) Handle(c echo.Context) error {
	rc, err := h.GetContext(c) // Does authorization checks
	if err != nil {
		return err
	}

	region := c.Param("region")
	creds, err := rc.AWS.AssumeRole(rc.Principal.Username, &region)
	if err != nil {
		if aws.IsRegionNotExist(err) {
			return echo.NotFoundHandler(c)
		}
		c.Logger().Errorf("Error retrieving credentials: %w", err)
		return echo.ErrInternalServerError
	}

	c.Logger().Infof(
		"Allowing '%s' to access account credential '%s'",
		rc.Principal.Username, rc.Account.Name,
	)
	credsAllowed.With(prometheus.Labels{
		"account": rc.Account.ShortName,
		"region":  region,
	}).Inc()

	c.Response().Header().Set("Expires", creds.Expiration.Add(-5*time.Minute).Format(time.RFC1123))

	return c.JSON(http.StatusOK, &jsonCredential{
		AccessKeyId:     creds.AccessKeyId,
		SecretAccessKey: creds.SecretAccessKey,
		SessionToken:    creds.SessionToken,
		Expiration:      creds.Expiration,
	})
}