summaryrefslogtreecommitdiffstats
path: root/fluent-bit/src/aws/flb_aws_credentials_sts.c
diff options
context:
space:
mode:
Diffstat (limited to 'fluent-bit/src/aws/flb_aws_credentials_sts.c')
-rw-r--r--fluent-bit/src/aws/flb_aws_credentials_sts.c958
1 files changed, 958 insertions, 0 deletions
diff --git a/fluent-bit/src/aws/flb_aws_credentials_sts.c b/fluent-bit/src/aws/flb_aws_credentials_sts.c
new file mode 100644
index 000000000..d992485cc
--- /dev/null
+++ b/fluent-bit/src/aws/flb_aws_credentials_sts.c
@@ -0,0 +1,958 @@
+/* -*- Mode: C; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
+
+/* Fluent Bit
+ * ==========
+ * Copyright (C) 2015-2022 The Fluent Bit Authors
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <fluent-bit/flb_info.h>
+#include <fluent-bit/flb_sds.h>
+#include <fluent-bit/flb_http_client.h>
+#include <fluent-bit/flb_aws_credentials.h>
+#include <fluent-bit/flb_aws_util.h>
+#include <fluent-bit/flb_random.h>
+#include <fluent-bit/flb_jsmn.h>
+
+#include <stdlib.h>
+#include <time.h>
+#include <string.h>
+
+#define STS_ASSUME_ROLE_URI_FORMAT "/?Version=2011-06-15&Action=%s\
+&RoleSessionName=%s&RoleArn=%s"
+#define STS_ASSUME_ROLE_URI_BASE_LEN 54
+
+/*
+ * The STS APIs return an XML document with credentials.
+ * The part of the document we care about looks like this:
+ * <Credentials>
+ * <AccessKeyId>akid</AccessKeyId>
+ * <SecretAccessKey>skid</SecretAccessKey>
+ * <SessionToken>token</SessionToken>
+ * <Expiration>2019-11-09T13:34:41Z</Expiration>
+ * </Credentials>
+ */
+#define CREDENTIALS_NODE "<Credentials>"
+#define CREDENTIALS_NODE_LEN 13
+#define ACCESS_KEY_NODE "<AccessKeyId>"
+#define ACCESS_KEY_NODE_LEN 13
+#define ACCESS_KEY_NODE_END "</AccessKeyId>"
+#define SECRET_KEY_NODE "<SecretAccessKey>"
+#define SECRET_KEY_NODE_LEN 17
+#define SECRET_KEY_NODE_END "</SecretAccessKey>"
+#define SESSION_TOKEN_NODE "<SessionToken>"
+#define SESSION_TOKEN_NODE_LEN 14
+#define SESSION_TOKEN_NODE_END "</SessionToken>"
+#define EXPIRATION_NODE "<Expiration>"
+#define EXPIRATION_NODE_LEN 12
+#define EXPIRATION_NODE_END "</Expiration>"
+
+#define TOKEN_FILE_ENV_VAR "AWS_WEB_IDENTITY_TOKEN_FILE"
+#define ROLE_ARN_ENV_VAR "AWS_ROLE_ARN"
+#define SESSION_NAME_ENV_VAR "AWS_ROLE_SESSION_NAME"
+
+#define SESSION_NAME_RANDOM_BYTE_LEN 32
+
+struct flb_aws_provider_eks;
+void bytes_to_string(unsigned char *data, char *buf, size_t len);
+static int assume_with_web_identity(struct flb_aws_provider_eks
+ *implementation);
+static int sts_assume_role_request(struct flb_aws_client *sts_client,
+ struct flb_aws_credentials **creds,
+ char *uri,
+ time_t *next_refresh);
+static flb_sds_t get_node(char *cred_node, char* node_name, int node_name_len, char* node_end);
+
+
+/*
+ * A provider that uses credentials from the base provider to call STS
+ * and assume an IAM Role.
+ */
+struct flb_aws_provider_sts {
+ int custom_endpoint;
+ struct flb_aws_provider *base_provider;
+
+ struct flb_aws_credentials *creds;
+ time_t next_refresh;
+
+ struct flb_aws_client *sts_client;
+
+ /* Fluent Bit uses regional STS endpoints; this is a best practice. */
+ char *endpoint;
+
+ flb_sds_t uri;
+};
+
+struct flb_aws_credentials *get_credentials_fn_sts(struct flb_aws_provider
+ *provider)
+{
+ struct flb_aws_credentials *creds;
+ int refresh = FLB_FALSE;
+ struct flb_aws_provider_sts *implementation = provider->implementation;
+
+ flb_debug("[aws_credentials] Requesting credentials from the "
+ "STS provider..");
+
+ /* a negative next_refresh means that auto-refresh is disabled */
+ if (implementation->next_refresh > 0
+ && time(NULL) > implementation->next_refresh) {
+ refresh = FLB_TRUE;
+ }
+ if (!implementation->creds || refresh == FLB_TRUE) {
+ /* credentials need to be refreshed/obtained */
+ if (try_lock_provider(provider)) {
+ flb_debug("[aws_credentials] STS Provider: Refreshing credential "
+ "cache.");
+ sts_assume_role_request(implementation->sts_client,
+ &implementation->creds,
+ implementation->uri,
+ &implementation->next_refresh);
+ unlock_provider(provider);
+ }
+ }
+
+ if (!implementation->creds) {
+ /*
+ * We failed to lock the provider and creds are unset. This means that
+ * another co-routine is performing the refresh.
+ */
+ flb_warn("[aws_credentials] No cached credentials are available and "
+ "a credential refresh is already in progress. The current "
+ "co-routine will retry.");
+
+ return NULL;
+ }
+
+ /* return a copy of the existing cached credentials */
+ creds = flb_calloc(1, sizeof(struct flb_aws_credentials));
+ if (!creds) {
+ goto error;
+ }
+
+ creds->access_key_id = flb_sds_create(implementation->creds->access_key_id);
+ if (!creds->access_key_id) {
+ goto error;
+ }
+
+ creds->secret_access_key = flb_sds_create(implementation->creds->
+ secret_access_key);
+ if (!creds->secret_access_key) {
+ goto error;
+ }
+
+ if (implementation->creds->session_token) {
+ creds->session_token = flb_sds_create(implementation->creds->
+ session_token);
+ if (!creds->session_token) {
+ goto error;
+ }
+
+ } else {
+ creds->session_token = NULL;
+ }
+
+ return creds;
+
+error:
+ flb_errno();
+ flb_aws_credentials_destroy(creds);
+ return NULL;
+}
+
+int refresh_fn_sts(struct flb_aws_provider *provider) {
+ int ret = -1;
+ struct flb_aws_provider_sts *implementation = provider->implementation;
+
+ flb_debug("[aws_credentials] Refresh called on the STS provider");
+
+ if (try_lock_provider(provider)) {
+ ret = sts_assume_role_request(implementation->sts_client,
+ &implementation->creds, implementation->uri,
+ &implementation->next_refresh);
+ unlock_provider(provider);
+ }
+ return ret;
+}
+
+int init_fn_sts(struct flb_aws_provider *provider) {
+ int ret = -1;
+ struct flb_aws_provider_sts *implementation = provider->implementation;
+
+ flb_debug("[aws_credentials] Init called on the STS provider");
+
+ /* Call Init on the base provider first */
+ implementation->base_provider->provider_vtable->
+ init(implementation->base_provider);
+
+ implementation->sts_client->debug_only = FLB_TRUE;
+
+ if (try_lock_provider(provider)) {
+ ret = sts_assume_role_request(implementation->sts_client,
+ &implementation->creds, implementation->uri,
+ &implementation->next_refresh);
+ unlock_provider(provider);
+ }
+
+ implementation->sts_client->debug_only = FLB_FALSE;
+ return ret;
+}
+
+void sync_fn_sts(struct flb_aws_provider *provider) {
+ struct flb_aws_provider_sts *implementation = provider->implementation;
+ struct flb_aws_provider *base_provider = implementation->base_provider;
+
+ flb_debug("[aws_credentials] Sync called on the STS provider");
+ /* Remove async flag */
+ flb_stream_disable_async_mode(&implementation->sts_client->upstream->base);
+
+ /* we also need to call sync on the base_provider */
+ base_provider->provider_vtable->sync(base_provider);
+}
+
+void async_fn_sts(struct flb_aws_provider *provider) {
+ struct flb_aws_provider_sts *implementation = provider->implementation;
+ struct flb_aws_provider *base_provider = implementation->base_provider;
+
+ flb_debug("[aws_credentials] Async called on the STS provider");
+ /* Add async flag */
+ flb_stream_enable_async_mode(&implementation->sts_client->upstream->base);
+
+ /* we also need to call async on the base_provider */
+ base_provider->provider_vtable->async(base_provider);
+}
+
+void upstream_set_fn_sts(struct flb_aws_provider *provider,
+ struct flb_output_instance *ins) {
+ struct flb_aws_provider_sts *implementation = provider->implementation;
+ struct flb_aws_provider *base_provider = implementation->base_provider;
+
+ flb_debug("[aws_credentials] upstream_set called on the STS provider");
+ /* associate output and upstream */
+ flb_output_upstream_set(implementation->sts_client->upstream, ins);
+
+ /* we also need to call upstream_set on the base_provider */
+ base_provider->provider_vtable->upstream_set(base_provider, ins);
+}
+
+void destroy_fn_sts(struct flb_aws_provider *provider) {
+ struct flb_aws_provider_sts *implementation;
+
+ implementation = provider->implementation;
+
+ if (implementation) {
+ if (implementation->creds) {
+ flb_aws_credentials_destroy(implementation->creds);
+ }
+
+ if (implementation->sts_client) {
+ flb_aws_client_destroy(implementation->sts_client);
+ }
+
+ if (implementation->uri) {
+ flb_sds_destroy(implementation->uri);
+ }
+
+ if (implementation->custom_endpoint == FLB_FALSE) {
+ flb_free(implementation->endpoint);
+ }
+
+ flb_free(implementation);
+ provider->implementation = NULL;
+ }
+
+ return;
+}
+
+static struct flb_aws_provider_vtable sts_provider_vtable = {
+ .get_credentials = get_credentials_fn_sts,
+ .init = init_fn_sts,
+ .refresh = refresh_fn_sts,
+ .destroy = destroy_fn_sts,
+ .sync = sync_fn_sts,
+ .async = async_fn_sts,
+ .upstream_set = upstream_set_fn_sts,
+};
+
+struct flb_aws_provider *flb_sts_provider_create(struct flb_config *config,
+ struct flb_tls *tls,
+ struct flb_aws_provider
+ *base_provider,
+ char *external_id,
+ char *role_arn,
+ char *session_name,
+ char *region,
+ char *sts_endpoint,
+ char *proxy,
+ struct
+ flb_aws_client_generator
+ *generator)
+{
+ struct flb_aws_provider_sts *implementation = NULL;
+ struct flb_aws_provider *provider = NULL;
+ struct flb_upstream *upstream = NULL;
+
+ provider = flb_calloc(1, sizeof(struct flb_aws_provider));
+ if (!provider) {
+ flb_errno();
+ return NULL;
+ }
+
+ pthread_mutex_init(&provider->lock, NULL);
+
+ implementation = flb_calloc(1, sizeof(struct flb_aws_provider_sts));
+ if (!implementation) {
+ goto error;
+ }
+
+ provider->provider_vtable = &sts_provider_vtable;
+ provider->implementation = implementation;
+
+ implementation->uri = flb_sts_uri("AssumeRole", role_arn, session_name,
+ external_id, NULL);
+ if (!implementation->uri) {
+ goto error;
+ }
+
+ if (sts_endpoint) {
+ implementation->endpoint = removeProtocol(sts_endpoint, "https://");
+ implementation->custom_endpoint = FLB_TRUE;
+ }
+ else {
+ implementation->endpoint = flb_aws_endpoint("sts", region);
+ implementation->custom_endpoint = FLB_FALSE;
+ }
+
+ if(!implementation->endpoint) {
+ goto error;
+ }
+
+ implementation->base_provider = base_provider;
+ implementation->sts_client = generator->create();
+ if (!implementation->sts_client) {
+ goto error;
+ }
+ implementation->sts_client->name = "sts_client_assume_role_provider";
+ implementation->sts_client->has_auth = FLB_TRUE;
+ implementation->sts_client->provider = base_provider;
+ implementation->sts_client->region = region;
+ implementation->sts_client->service = "sts";
+ implementation->sts_client->port = 443;
+ implementation->sts_client->flags = 0;
+ implementation->sts_client->proxy = proxy;
+
+ upstream = flb_upstream_create(config, implementation->endpoint, 443,
+ FLB_IO_TLS, tls);
+ if (!upstream) {
+ flb_error("[aws_credentials] Connection initialization error");
+ goto error;
+ }
+
+ upstream->base.net.connect_timeout = FLB_AWS_CREDENTIAL_NET_TIMEOUT;
+
+ implementation->sts_client->upstream = upstream;
+ implementation->sts_client->host = implementation->endpoint;
+
+ return provider;
+
+error:
+ flb_errno();
+ flb_aws_provider_destroy(provider);
+ return NULL;
+}
+
+/*
+ * A provider that uses OIDC tokens provided by kubernetes to obtain
+ * AWS credentials.
+ *
+ * The AWS SDKs have defined a spec for an OIDC provider that obtains tokens
+ * from environment variables or the shared config file.
+ * This provider only contains the functionality needed for EKS- obtaining the
+ * location of the OIDC token from an environment variable.
+ */
+struct flb_aws_provider_eks {
+ int custom_endpoint;
+ struct flb_aws_credentials *creds;
+ /*
+ * Time to auto-refresh creds before they expire. A negative value disables
+ * auto-refresh. Client code can always force a refresh.
+ */
+ time_t next_refresh;
+
+ struct flb_aws_client *sts_client;
+
+ /* Fluent Bit uses regional STS endpoints; this is a best practice. */
+ char *endpoint;
+
+ char *session_name;
+ /* session name can come from env or be generated by the provider */
+ int free_session_name;
+ char *role_arn;
+
+ char *token_file;
+};
+
+
+struct flb_aws_credentials *get_credentials_fn_eks(struct flb_aws_provider
+ *provider)
+{
+ struct flb_aws_credentials *creds = NULL;
+ int refresh = FLB_FALSE;
+ struct flb_aws_provider_eks *implementation = provider->implementation;
+
+ flb_debug("[aws_credentials] Requesting credentials from the "
+ "EKS provider..");
+
+ /* a negative next_refresh means that auto-refresh is disabled */
+ if (implementation->next_refresh > 0
+ && time(NULL) > implementation->next_refresh) {
+ refresh = FLB_TRUE;
+ }
+ if (!implementation->creds || refresh == FLB_TRUE) {
+ if (try_lock_provider(provider)) {
+ flb_debug("[aws_credentials] EKS Provider: Refreshing credential "
+ "cache.");
+ assume_with_web_identity(implementation);
+ unlock_provider(provider);
+ }
+ }
+
+ if (!implementation->creds) {
+ /*
+ * We failed to lock the provider and creds are unset. This means that
+ * another co-routine is performing the refresh.
+ */
+ flb_warn("[aws_credentials] No cached credentials are available and "
+ "a credential refresh is already in progress. The current "
+ "co-routine will retry.");
+
+ return NULL;
+ }
+
+ creds = flb_calloc(1, sizeof(struct flb_aws_credentials));
+ if (!creds) {
+ goto error;
+ }
+
+ creds->access_key_id = flb_sds_create(implementation->creds->access_key_id);
+ if (!creds->access_key_id) {
+ goto error;
+ }
+
+ creds->secret_access_key = flb_sds_create(implementation->creds->
+ secret_access_key);
+ if (!creds->secret_access_key) {
+ goto error;
+ }
+
+ if (implementation->creds->session_token) {
+ creds->session_token = flb_sds_create(implementation->creds->
+ session_token);
+ if (!creds->session_token) {
+ goto error;
+ }
+
+ }
+ else {
+ creds->session_token = NULL;
+ }
+
+ return creds;
+
+error:
+ flb_errno();
+ flb_aws_credentials_destroy(creds);
+ return NULL;
+}
+
+int refresh_fn_eks(struct flb_aws_provider *provider) {
+ int ret = -1;
+ struct flb_aws_provider_eks *implementation = provider->implementation;
+
+ flb_debug("[aws_credentials] Refresh called on the EKS provider");
+ if (try_lock_provider(provider)) {
+ ret = assume_with_web_identity(implementation);
+ unlock_provider(provider);
+ }
+ return ret;
+}
+
+int init_fn_eks(struct flb_aws_provider *provider) {
+ int ret = -1;
+ struct flb_aws_provider_eks *implementation = provider->implementation;
+
+ implementation->sts_client->debug_only = FLB_TRUE;
+
+ flb_debug("[aws_credentials] Init called on the EKS provider");
+ if (try_lock_provider(provider)) {
+ ret = assume_with_web_identity(implementation);
+ unlock_provider(provider);
+ }
+
+ implementation->sts_client->debug_only = FLB_FALSE;
+ return ret;
+}
+
+void sync_fn_eks(struct flb_aws_provider *provider) {
+ struct flb_aws_provider_eks *implementation = provider->implementation;
+ flb_debug("[aws_credentials] Sync called on the EKS provider");
+ /* remove async flag */
+ flb_stream_disable_async_mode(&implementation->sts_client->upstream->base);
+}
+
+void async_fn_eks(struct flb_aws_provider *provider) {
+ struct flb_aws_provider_eks *implementation = provider->implementation;
+ flb_debug("[aws_credentials] Async called on the EKS provider");
+ /* add async flag */
+ flb_stream_enable_async_mode(&implementation->sts_client->upstream->base);
+}
+
+void upstream_set_fn_eks(struct flb_aws_provider *provider,
+ struct flb_output_instance *ins) {
+ struct flb_aws_provider_eks *implementation = provider->implementation;
+ flb_debug("[aws_credentials] upstream_set called on the EKS provider");
+ /* set upstream on output */
+ flb_output_upstream_set(implementation->sts_client->upstream, ins);
+}
+
+void destroy_fn_eks(struct flb_aws_provider *provider) {
+ struct flb_aws_provider_eks *implementation = provider->
+ implementation;
+ if (implementation) {
+ if (implementation->creds) {
+ flb_aws_credentials_destroy(implementation->creds);
+ }
+
+ if (implementation->sts_client) {
+ flb_aws_client_destroy(implementation->sts_client);
+ }
+
+ if (implementation->custom_endpoint == FLB_FALSE) {
+ flb_free(implementation->endpoint);
+ }
+ if (implementation->free_session_name == FLB_TRUE) {
+ flb_free(implementation->session_name);
+ }
+
+ flb_free(implementation);
+ provider->implementation = NULL;
+ }
+
+ return;
+}
+
+static struct flb_aws_provider_vtable eks_provider_vtable = {
+ .get_credentials = get_credentials_fn_eks,
+ .init = init_fn_eks,
+ .refresh = refresh_fn_eks,
+ .destroy = destroy_fn_eks,
+ .sync = sync_fn_eks,
+ .async = async_fn_eks,
+ .upstream_set = upstream_set_fn_eks,
+};
+
+struct flb_aws_provider *flb_eks_provider_create(struct flb_config *config,
+ struct flb_tls *tls,
+ char *region,
+ char *sts_endpoint,
+ char *proxy,
+ struct
+ flb_aws_client_generator
+ *generator)
+{
+ struct flb_aws_provider_eks *implementation = NULL;
+ struct flb_aws_provider *provider = NULL;
+ struct flb_upstream *upstream = NULL;
+
+ provider = flb_calloc(1, sizeof(struct flb_aws_provider));
+
+ if (!provider) {
+ flb_errno();
+ return NULL;
+ }
+
+ pthread_mutex_init(&provider->lock, NULL);
+
+ implementation = flb_calloc(1, sizeof(struct flb_aws_provider_eks));
+
+ if (!implementation) {
+ goto error;
+ }
+
+ provider->provider_vtable = &eks_provider_vtable;
+ provider->implementation = implementation;
+
+ /* session name either comes from the env var or is a random uuid */
+ implementation->session_name = getenv(SESSION_NAME_ENV_VAR);
+ implementation->free_session_name = FLB_FALSE;
+ if (!implementation->session_name ||
+ strlen(implementation->session_name) == 0) {
+ implementation->session_name = flb_sts_session_name();
+ if (!implementation->session_name) {
+ goto error;
+ }
+ implementation->free_session_name = FLB_TRUE;
+ }
+
+ implementation->role_arn = getenv(ROLE_ARN_ENV_VAR);
+ if (!implementation->role_arn || strlen(implementation->role_arn) == 0) {
+ flb_debug("[aws_credentials] Not initializing EKS provider because"
+ " %s was not set", ROLE_ARN_ENV_VAR);
+ flb_aws_provider_destroy(provider);
+ return NULL;
+ }
+
+ implementation->token_file = getenv(TOKEN_FILE_ENV_VAR);
+ if (!implementation->token_file || strlen(implementation->token_file) == 0)
+ {
+ flb_debug("[aws_credentials] Not initializing EKS provider because"
+ " %s was not set", TOKEN_FILE_ENV_VAR);
+ flb_aws_provider_destroy(provider);
+ return NULL;
+ }
+
+ if (sts_endpoint) {
+ implementation->endpoint = removeProtocol(sts_endpoint, "https://");
+ implementation->custom_endpoint = FLB_TRUE;
+ }
+ else {
+ implementation->endpoint = flb_aws_endpoint("sts", region);
+ implementation->custom_endpoint = FLB_FALSE;
+ }
+
+ if(!implementation->endpoint) {
+ goto error;
+ }
+
+ implementation->sts_client = generator->create();
+ if (!implementation->sts_client) {
+ goto error;
+ }
+ implementation->sts_client->name = "sts_client_eks_provider";
+ /* AssumeRoleWithWebIdentity does not require sigv4 */
+ implementation->sts_client->has_auth = FLB_FALSE;
+ implementation->sts_client->provider = NULL;
+ implementation->sts_client->region = region;
+ implementation->sts_client->service = "sts";
+ implementation->sts_client->port = 443;
+ implementation->sts_client->flags = 0;
+ implementation->sts_client->proxy = proxy;
+
+ upstream = flb_upstream_create(config, implementation->endpoint, 443,
+ FLB_IO_TLS, tls);
+
+ if (!upstream) {
+ goto error;
+ }
+
+ upstream->base.net.connect_timeout = FLB_AWS_CREDENTIAL_NET_TIMEOUT;
+
+ implementation->sts_client->upstream = upstream;
+ implementation->sts_client->host = implementation->endpoint;
+
+ return provider;
+
+error:
+ flb_errno();
+ flb_aws_provider_destroy(provider);
+ return NULL;
+}
+
+/* Generates string which can serve as a unique session name */
+char *flb_sts_session_name() {
+ unsigned char random_data[SESSION_NAME_RANDOM_BYTE_LEN];
+ char *session_name = NULL;
+ int ret;
+
+ ret = flb_random_bytes(random_data, SESSION_NAME_RANDOM_BYTE_LEN);
+
+ if (ret != 0) {
+ flb_errno();
+
+ return NULL;
+ }
+
+ session_name = flb_calloc(SESSION_NAME_RANDOM_BYTE_LEN + 1,
+ sizeof(char));
+ if (session_name == NULL) {
+ flb_errno();
+
+ return NULL;
+ }
+
+ bytes_to_string(random_data, session_name, SESSION_NAME_RANDOM_BYTE_LEN);
+
+ return session_name;
+}
+
+/* converts random bytes to a string we can safely put in a URL */
+void bytes_to_string(unsigned char *data, char *buf, size_t len) {
+ int index;
+ char charset[] = "0123456789"
+ "abcdefghijklmnopqrstuvwxyz"
+ "ABCDEFGHIJKLMNOPQRSTUVWXYZ";
+
+ while (len-- > 0) {
+ index = (int) data[len];
+ index = index % (sizeof(charset) - 1);
+ buf[len] = charset[index];
+ }
+}
+
+static int assume_with_web_identity(struct flb_aws_provider_eks
+ *implementation)
+{
+ int ret;
+ char *web_token = NULL;
+ size_t web_token_size;
+ flb_sds_t uri = NULL;
+ int init_mode = implementation->sts_client->debug_only;
+
+ ret = flb_read_file(implementation->token_file, &web_token,
+ &web_token_size);
+ if (ret < 0) {
+ if (init_mode == FLB_TRUE) {
+ flb_debug("[aws_credentials] Could not read web identify token file");
+ } else {
+ flb_error("[aws_credentials] Could not read web identify token file");
+ }
+ return -1;
+ }
+
+ uri = flb_sts_uri("AssumeRoleWithWebIdentity", implementation->role_arn,
+ implementation->session_name, NULL, web_token);
+ if (!uri) {
+ flb_free(web_token);
+ return -1;
+ }
+
+ ret = sts_assume_role_request(implementation->sts_client,
+ &implementation->creds, uri,
+ &implementation->next_refresh);
+ flb_free(web_token);
+ flb_sds_destroy(uri);
+ return ret;
+}
+
+static int sts_assume_role_request(struct flb_aws_client *sts_client,
+ struct flb_aws_credentials **creds,
+ char *uri,
+ time_t *next_refresh)
+{
+ time_t expiration;
+ struct flb_aws_credentials *credentials = NULL;
+ struct flb_http_client *c = NULL;
+ flb_sds_t error_type;
+ int init_mode = sts_client->debug_only;
+
+ flb_debug("[aws_credentials] Calling STS..");
+
+ c = sts_client->client_vtable->request(sts_client, FLB_HTTP_GET,
+ uri, NULL, 0, NULL, 0);
+
+ if (c && c->resp.status == 200) {
+ credentials = flb_parse_sts_resp(c->resp.payload, &expiration);
+ if (!credentials) {
+ if (init_mode == FLB_TRUE) {
+ flb_debug("[aws_credentials] Failed to parse response from STS");
+ }
+ else {
+ flb_error("[aws_credentials] Failed to parse response from STS");
+ }
+ flb_http_client_destroy(c);
+ return -1;
+ }
+
+ /* unset and free existing credentials first */
+ flb_aws_credentials_destroy(*creds);
+ *creds = NULL;
+
+ *next_refresh = expiration - FLB_AWS_REFRESH_WINDOW;
+ *creds = credentials;
+ flb_http_client_destroy(c);
+ return 0;
+ }
+
+ if (c && c->resp.payload_size > 0) {
+ error_type = flb_aws_error(c->resp.payload, c->resp.payload_size);
+ if (error_type) {
+ if (init_mode == FLB_TRUE) {
+ flb_debug("[aws_credentials] STS API responded with %s", error_type);
+ }
+ else {
+ flb_error("[aws_credentials] STS API responded with %s", error_type);
+ }
+ } else {
+ flb_debug("[aws_credentials] STS raw response: \n%s",
+ c->resp.payload);
+ }
+ }
+
+ if (c) {
+ flb_http_client_destroy(c);
+ }
+ if (init_mode == FLB_TRUE) {
+ flb_debug("[aws_credentials] STS assume role request failed");
+ }
+ else {
+ flb_error("[aws_credentials] STS assume role request failed");
+ }
+ return -1;
+
+}
+
+/*
+ * The STS APIs return an XML document with credentials.
+ * The part of the document we care about looks like this:
+ * <Credentials>
+ * <AccessKeyId>akid</AccessKeyId>
+ * <SecretAccessKey>skid</SecretAccessKey>
+ * <SessionToken>token</SessionToken>
+ * <Expiration>2019-11-09T13:34:41Z</Expiration>
+ * </Credentials>
+ */
+struct flb_aws_credentials *flb_parse_sts_resp(char *response,
+ time_t *expiration)
+{
+ struct flb_aws_credentials *creds = NULL;
+ char *cred_node = NULL;
+ flb_sds_t tmp = NULL;
+
+ cred_node = strstr(response, CREDENTIALS_NODE);
+ if (!cred_node) {
+ flb_error("[aws_credentials] Could not find '%s' node in sts response",
+ CREDENTIALS_NODE);
+ return NULL;
+ }
+ cred_node += CREDENTIALS_NODE_LEN;
+
+ creds = flb_calloc(1, sizeof(struct flb_aws_credentials));
+ if (!creds) {
+ flb_errno();
+ return NULL;
+ }
+
+ creds->access_key_id = get_node(cred_node, ACCESS_KEY_NODE,
+ ACCESS_KEY_NODE_LEN, ACCESS_KEY_NODE_END);
+ if (!creds->access_key_id) {
+ goto error;
+ }
+
+ creds->secret_access_key = get_node(cred_node, SECRET_KEY_NODE,
+ SECRET_KEY_NODE_LEN, SECRET_KEY_NODE_END);
+ if (!creds->secret_access_key) {
+ goto error;
+ }
+
+ creds->session_token = get_node(cred_node, SESSION_TOKEN_NODE,
+ SESSION_TOKEN_NODE_LEN, SESSION_TOKEN_NODE_END);
+ if (!creds->session_token) {
+ goto error;
+ }
+
+ tmp = get_node(cred_node, EXPIRATION_NODE, EXPIRATION_NODE_LEN, EXPIRATION_NODE_END);
+ if (!tmp) {
+ goto error;
+ }
+ *expiration = flb_aws_cred_expiration(tmp);
+
+ flb_sds_destroy(tmp);
+ return creds;
+
+error:
+ flb_aws_credentials_destroy(creds);
+ if (tmp) {
+ flb_sds_destroy(tmp);
+ }
+ return NULL;
+}
+
+/*
+ * Constructs the STS request uri.
+ * external_id can be NULL.
+ */
+flb_sds_t flb_sts_uri(char *action, char *role_arn, char *session_name,
+ char *external_id, char *identity_token)
+{
+ flb_sds_t tmp;
+ flb_sds_t uri = NULL;
+ size_t len = STS_ASSUME_ROLE_URI_BASE_LEN;
+
+ if (external_id) {
+ len += 12; /* will add "&ExternalId=" */
+ len += strlen(external_id);
+ }
+
+ if (identity_token) {
+ len += 18; /* will add "&WebIdentityToken=" */
+ len += strlen(identity_token);
+ }
+
+
+ len += strlen(session_name);
+ len += strlen(role_arn);
+ len += strlen(action);
+ len++; /* null char */
+
+ uri = flb_sds_create_size(len);
+ if (!uri) {
+ return NULL;
+ }
+
+ tmp = flb_sds_printf(&uri, STS_ASSUME_ROLE_URI_FORMAT, action, session_name,
+ role_arn);
+ if (!tmp) {
+ flb_sds_destroy(uri);
+ return NULL;
+ }
+
+ if (external_id) {
+ flb_sds_printf(&uri, "&ExternalId=%s", external_id);
+ }
+
+ if (identity_token) {
+ flb_sds_printf(&uri, "&WebIdentityToken=%s", identity_token);
+ }
+
+ return uri;
+}
+
+static flb_sds_t get_node(char *cred_node, char* node_name, int node_name_len, char* node_end)
+{
+ char *node = NULL;
+ char *end = NULL;
+ flb_sds_t val = NULL;
+ int len;
+
+ node = strstr(cred_node, node_name);
+ if (!node) {
+ flb_error("[aws_credentials] Could not find '%s' node in sts response",
+ node_name);
+ return NULL;
+ }
+ node += node_name_len;
+ end = strstr(node, node_end);
+ if (!end) {
+ flb_error("[aws_credentials] Could not find end of '%s' node in "
+ "sts response", node_name);
+ return NULL;
+ }
+ len = end - node;
+ val = flb_sds_create_len(node, len);
+ if (!val) {
+ flb_errno();
+ return NULL;
+ }
+
+ return val;
+}