bstopp/aws_session_token

View on GitHub
lib/aws_session_token/cli.rb

Summary

Maintainability
A
0 mins
Test Coverage
# frozen_string_literal: true

#
# AWS Session Token Gem - Tool to wrap AWS API to create and store Session tokens
# so that other commands/tools (e.g. Terraform) can function as necessary.
#
# Copyright 2018 Bryan Stopp <bryan.stopp@gmail.com>
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#   http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#

module AwsSessionToken

  # Execute the process for getting & updating the session token.
  class CLI
    attr_accessor :options

    def initialize
      @options = Options.new
      @creds_file = CredentialsFile.new
      @console = Console.new
    end

    def run
      @options.parse(ARGV)
      validate_creds_file
      set_aws_creds
      mfa = mfa_device
      token = @options.token || token_prompt
      creds = session_token(mfa, token)
      @creds_file.write(@options.credentials_file, @options.session_profile, creds) if @options.session_profile
      @console.write(creds) if @options.console
    end

    def validate_creds_file
      return if File.exist?(@options.credentials_file) && File.writable?(@options.credentials_file)
      unless File.exist?(@options.credentials_file)
        raise(
          ArgumentError, "Specified credentials file is missing: #{@options.credentials_file}"
        )
      end
      raise(
        ArgumentError,
        "Specified credentials file cannot be modified by current user: #{@options.credentials_file}"
      )
    end

    def set_aws_creds
      credentials = Aws::SharedCredentials.new(path: @options.credentials_file, profile_name: @options.profile)
      Aws.config.update(credentials: credentials)
    rescue Aws::Errors::NoSuchProfileError
      warn "\nSpecified AWS Profile doesn't exist: #{@options.profile}"
      exit 1
    end

    def mfa_device
      iam_client = Aws::IAM::Client.new
      params = { max_items: 1 }
      params[:user_name] = @options.user if @options.user
      response = iam_client.list_mfa_devices(params)
      list = response.mfa_devices
      return list[0].serial_number unless list.nil? || list.empty?
      warn "\nSpecified profile/user doesn't have MFA device."
      warn "\nScript execution unnecessary."
      exit
    end

    def token_prompt
      cli = HighLine.new
      cli.ask "Specify the OTP Token for the profile #{@options.profile}:"
    end

    def session_token(mfa_device, otp)
      @sts_client = Aws::STS::Client.new
      resp = @sts_client.get_session_token(
        duration_seconds: @options.duration,
        serial_number: mfa_device,
        token_code: otp.to_s
      )
      resp.credentials
    end

  end
end