CredentialProvider.php 36 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991
  1. <?php
  2. namespace Aws\Credentials;
  3. use Aws;
  4. use Aws\Api\DateTimeResult;
  5. use Aws\CacheInterface;
  6. use Aws\Exception\CredentialsException;
  7. use Aws\Sts\StsClient;
  8. use GuzzleHttp\Promise;
  9. /**
  10. * Credential providers are functions that accept no arguments and return a
  11. * promise that is fulfilled with an {@see \Aws\Credentials\CredentialsInterface}
  12. * or rejected with an {@see \Aws\Exception\CredentialsException}.
  13. *
  14. * <code>
  15. * use Aws\Credentials\CredentialProvider;
  16. * $provider = CredentialProvider::defaultProvider();
  17. * // Returns a CredentialsInterface or throws.
  18. * $creds = $provider()->wait();
  19. * </code>
  20. *
  21. * Credential providers can be composed to create credentials using conditional
  22. * logic that can create different credentials in different environments. You
  23. * can compose multiple providers into a single provider using
  24. * {@see Aws\Credentials\CredentialProvider::chain}. This function accepts
  25. * providers as variadic arguments and returns a new function that will invoke
  26. * each provider until a successful set of credentials is returned.
  27. *
  28. * <code>
  29. * // First try an INI file at this location.
  30. * $a = CredentialProvider::ini(null, '/path/to/file.ini');
  31. * // Then try an INI file at this location.
  32. * $b = CredentialProvider::ini(null, '/path/to/other-file.ini');
  33. * // Then try loading from environment variables.
  34. * $c = CredentialProvider::env();
  35. * // Combine the three providers together.
  36. * $composed = CredentialProvider::chain($a, $b, $c);
  37. * // Returns a promise that is fulfilled with credentials or throws.
  38. * $promise = $composed();
  39. * // Wait on the credentials to resolve.
  40. * $creds = $promise->wait();
  41. * </code>
  42. */
  43. class CredentialProvider
  44. {
  45. const ENV_ARN = 'AWS_ROLE_ARN';
  46. const ENV_KEY = 'AWS_ACCESS_KEY_ID';
  47. const ENV_PROFILE = 'AWS_PROFILE';
  48. const ENV_ROLE_SESSION_NAME = 'AWS_ROLE_SESSION_NAME';
  49. const ENV_SECRET = 'AWS_SECRET_ACCESS_KEY';
  50. const ENV_SESSION = 'AWS_SESSION_TOKEN';
  51. const ENV_TOKEN_FILE = 'AWS_WEB_IDENTITY_TOKEN_FILE';
  52. const ENV_SHARED_CREDENTIALS_FILE = 'AWS_SHARED_CREDENTIALS_FILE';
  53. /**
  54. * Create a default credential provider that
  55. * first checks for environment variables,
  56. * then checks for assumed role via web identity,
  57. * then checks for cached SSO credentials from the CLI,
  58. * then check for credential_process in the "default" profile in ~/.aws/credentials,
  59. * then checks for the "default" profile in ~/.aws/credentials,
  60. * then for credential_process in the "default profile" profile in ~/.aws/config,
  61. * then checks for "profile default" profile in ~/.aws/config (which is
  62. * the default profile of AWS CLI),
  63. * then tries to make a GET Request to fetch credentials if ECS environment variable is presented,
  64. * finally checks for EC2 instance profile credentials.
  65. *
  66. * This provider is automatically wrapped in a memoize function that caches
  67. * previously provided credentials.
  68. *
  69. * @param array $config Optional array of ecs/instance profile credentials
  70. * provider options.
  71. *
  72. * @return callable
  73. */
  74. public static function defaultProvider(array $config = [])
  75. {
  76. $cacheable = [
  77. 'web_identity',
  78. 'sso',
  79. 'process_credentials',
  80. 'process_config',
  81. 'ecs',
  82. 'instance'
  83. ];
  84. $profileName = getenv(self::ENV_PROFILE) ?: 'default';
  85. $defaultChain = [
  86. 'env' => self::env(),
  87. 'web_identity' => self::assumeRoleWithWebIdentityCredentialProvider($config),
  88. ];
  89. if (
  90. !isset($config['use_aws_shared_config_files'])
  91. || $config['use_aws_shared_config_files'] !== false
  92. ) {
  93. $defaultChain['sso'] = self::sso(
  94. $profileName,
  95. self::getHomeDir() . '/.aws/config',
  96. $config
  97. );
  98. $defaultChain['process_credentials'] = self::process();
  99. $defaultChain['ini'] = self::ini();
  100. $defaultChain['process_config'] = self::process(
  101. 'profile ' . $profileName,
  102. self::getHomeDir() . '/.aws/config'
  103. );
  104. $defaultChain['ini_config'] = self::ini(
  105. 'profile '. $profileName,
  106. self::getHomeDir() . '/.aws/config'
  107. );
  108. }
  109. if (self::shouldUseEcs()) {
  110. $defaultChain['ecs'] = self::ecsCredentials($config);
  111. } else {
  112. $defaultChain['instance'] = self::instanceProfile($config);
  113. }
  114. if (isset($config['credentials'])
  115. && $config['credentials'] instanceof CacheInterface
  116. ) {
  117. foreach ($cacheable as $provider) {
  118. if (isset($defaultChain[$provider])) {
  119. $defaultChain[$provider] = self::cache(
  120. $defaultChain[$provider],
  121. $config['credentials'],
  122. 'aws_cached_' . $provider . '_credentials'
  123. );
  124. }
  125. }
  126. }
  127. return self::memoize(
  128. call_user_func_array(
  129. [CredentialProvider::class, 'chain'],
  130. array_values($defaultChain)
  131. )
  132. );
  133. }
  134. /**
  135. * Create a credential provider function from a set of static credentials.
  136. *
  137. * @param CredentialsInterface $creds
  138. *
  139. * @return callable
  140. */
  141. public static function fromCredentials(CredentialsInterface $creds)
  142. {
  143. $promise = Promise\Create::promiseFor($creds);
  144. return function () use ($promise) {
  145. return $promise;
  146. };
  147. }
  148. /**
  149. * Creates an aggregate credentials provider that invokes the provided
  150. * variadic providers one after the other until a provider returns
  151. * credentials.
  152. *
  153. * @return callable
  154. */
  155. public static function chain()
  156. {
  157. $links = func_get_args();
  158. if (empty($links)) {
  159. throw new \InvalidArgumentException('No providers in chain');
  160. }
  161. return function ($previousCreds = null) use ($links) {
  162. /** @var callable $parent */
  163. $parent = array_shift($links);
  164. $promise = $parent();
  165. while ($next = array_shift($links)) {
  166. if ($next instanceof InstanceProfileProvider
  167. && $previousCreds instanceof Credentials
  168. ) {
  169. $promise = $promise->otherwise(
  170. function () use ($next, $previousCreds) {return $next($previousCreds);}
  171. );
  172. } else {
  173. $promise = $promise->otherwise($next);
  174. }
  175. }
  176. return $promise;
  177. };
  178. }
  179. /**
  180. * Wraps a credential provider and caches previously provided credentials.
  181. *
  182. * Ensures that cached credentials are refreshed when they expire.
  183. *
  184. * @param callable $provider Credentials provider function to wrap.
  185. *
  186. * @return callable
  187. */
  188. public static function memoize(callable $provider)
  189. {
  190. return function () use ($provider) {
  191. static $result;
  192. static $isConstant;
  193. // Constant credentials will be returned constantly.
  194. if ($isConstant) {
  195. return $result;
  196. }
  197. // Create the initial promise that will be used as the cached value
  198. // until it expires.
  199. if (null === $result) {
  200. $result = $provider();
  201. }
  202. // Return credentials that could expire and refresh when needed.
  203. return $result
  204. ->then(function (CredentialsInterface $creds) use ($provider, &$isConstant, &$result) {
  205. // Determine if these are constant credentials.
  206. if (!$creds->getExpiration()) {
  207. $isConstant = true;
  208. return $creds;
  209. }
  210. // Refresh expired credentials.
  211. if (!$creds->isExpired()) {
  212. return $creds;
  213. }
  214. // Refresh the result and forward the promise.
  215. return $result = $provider($creds);
  216. })
  217. ->otherwise(function($reason) use (&$result) {
  218. // Cleanup rejected promise.
  219. $result = null;
  220. return new Promise\RejectedPromise($reason);
  221. });
  222. };
  223. }
  224. /**
  225. * Wraps a credential provider and saves provided credentials in an
  226. * instance of Aws\CacheInterface. Forwards calls when no credentials found
  227. * in cache and updates cache with the results.
  228. *
  229. * @param callable $provider Credentials provider function to wrap
  230. * @param CacheInterface $cache Cache to store credentials
  231. * @param string|null $cacheKey (optional) Cache key to use
  232. *
  233. * @return callable
  234. */
  235. public static function cache(
  236. callable $provider,
  237. CacheInterface $cache,
  238. $cacheKey = null
  239. ) {
  240. $cacheKey = $cacheKey ?: 'aws_cached_credentials';
  241. return function () use ($provider, $cache, $cacheKey) {
  242. $found = $cache->get($cacheKey);
  243. if ($found instanceof CredentialsInterface && !$found->isExpired()) {
  244. return Promise\Create::promiseFor($found);
  245. }
  246. return $provider()
  247. ->then(function (CredentialsInterface $creds) use (
  248. $cache,
  249. $cacheKey
  250. ) {
  251. $cache->set(
  252. $cacheKey,
  253. $creds,
  254. null === $creds->getExpiration() ?
  255. 0 : $creds->getExpiration() - time()
  256. );
  257. return $creds;
  258. });
  259. };
  260. }
  261. /**
  262. * Provider that creates credentials from environment variables
  263. * AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, and AWS_SESSION_TOKEN.
  264. *
  265. * @return callable
  266. */
  267. public static function env()
  268. {
  269. return function () {
  270. // Use credentials from environment variables, if available
  271. $key = getenv(self::ENV_KEY);
  272. $secret = getenv(self::ENV_SECRET);
  273. if ($key && $secret) {
  274. return Promise\Create::promiseFor(
  275. new Credentials($key, $secret, getenv(self::ENV_SESSION) ?: NULL)
  276. );
  277. }
  278. return self::reject('Could not find environment variable '
  279. . 'credentials in ' . self::ENV_KEY . '/' . self::ENV_SECRET);
  280. };
  281. }
  282. /**
  283. * Credential provider that creates credentials using instance profile
  284. * credentials.
  285. *
  286. * @param array $config Array of configuration data.
  287. *
  288. * @return InstanceProfileProvider
  289. * @see Aws\Credentials\InstanceProfileProvider for $config details.
  290. */
  291. public static function instanceProfile(array $config = [])
  292. {
  293. return new InstanceProfileProvider($config);
  294. }
  295. /**
  296. * Credential provider that retrieves cached SSO credentials from the CLI
  297. *
  298. * @return callable
  299. */
  300. public static function sso($ssoProfileName = 'default',
  301. $filename = null,
  302. $config = []
  303. ) {
  304. $filename = $filename ?: (self::getHomeDir() . '/.aws/config');
  305. return function () use ($ssoProfileName, $filename, $config) {
  306. if (!@is_readable($filename)) {
  307. return self::reject("Cannot read credentials from $filename");
  308. }
  309. $profiles = self::loadProfiles($filename);
  310. if (isset($profiles[$ssoProfileName])) {
  311. $ssoProfile = $profiles[$ssoProfileName];
  312. } elseif (isset($profiles['profile ' . $ssoProfileName])) {
  313. $ssoProfileName = 'profile ' . $ssoProfileName;
  314. $ssoProfile = $profiles[$ssoProfileName];
  315. } else {
  316. return self::reject("Profile {$ssoProfileName} does not exist in {$filename}.");
  317. }
  318. if (!empty($ssoProfile['sso_session'])) {
  319. return CredentialProvider::getSsoCredentials($profiles, $ssoProfileName, $filename, $config);
  320. } else {
  321. return CredentialProvider::getSsoCredentialsLegacy($profiles, $ssoProfileName, $filename, $config);
  322. }
  323. };
  324. }
  325. /**
  326. * Credential provider that creates credentials using
  327. * ecs credentials by a GET request, whose uri is specified
  328. * by environment variable
  329. *
  330. * @param array $config Array of configuration data.
  331. *
  332. * @return EcsCredentialProvider
  333. * @see Aws\Credentials\EcsCredentialProvider for $config details.
  334. */
  335. public static function ecsCredentials(array $config = [])
  336. {
  337. return new EcsCredentialProvider($config);
  338. }
  339. /**
  340. * Credential provider that creates credentials using assume role
  341. *
  342. * @param array $config Array of configuration data
  343. * @return callable
  344. * @see Aws\Credentials\AssumeRoleCredentialProvider for $config details.
  345. */
  346. public static function assumeRole(array $config=[])
  347. {
  348. return new AssumeRoleCredentialProvider($config);
  349. }
  350. /**
  351. * Credential provider that creates credentials by assuming role from a
  352. * Web Identity Token
  353. *
  354. * @param array $config Array of configuration data
  355. * @return callable
  356. * @see Aws\Credentials\AssumeRoleWithWebIdentityCredentialProvider for
  357. * $config details.
  358. */
  359. public static function assumeRoleWithWebIdentityCredentialProvider(array $config = [])
  360. {
  361. return function () use ($config) {
  362. $arnFromEnv = getenv(self::ENV_ARN);
  363. $tokenFromEnv = getenv(self::ENV_TOKEN_FILE);
  364. $stsClient = isset($config['stsClient'])
  365. ? $config['stsClient']
  366. : null;
  367. $region = isset($config['region'])
  368. ? $config['region']
  369. : null;
  370. if ($tokenFromEnv && $arnFromEnv) {
  371. $sessionName = getenv(self::ENV_ROLE_SESSION_NAME)
  372. ? getenv(self::ENV_ROLE_SESSION_NAME)
  373. : null;
  374. $provider = new AssumeRoleWithWebIdentityCredentialProvider([
  375. 'RoleArn' => $arnFromEnv,
  376. 'WebIdentityTokenFile' => $tokenFromEnv,
  377. 'SessionName' => $sessionName,
  378. 'client' => $stsClient,
  379. 'region' => $region
  380. ]);
  381. return $provider();
  382. }
  383. $profileName = getenv(self::ENV_PROFILE) ?: 'default';
  384. if (isset($config['filename'])) {
  385. $profiles = self::loadProfiles($config['filename']);
  386. } else {
  387. $profiles = self::loadDefaultProfiles();
  388. }
  389. if (isset($profiles[$profileName])) {
  390. $profile = $profiles[$profileName];
  391. if (isset($profile['region'])) {
  392. $region = $profile['region'];
  393. }
  394. if (isset($profile['web_identity_token_file'])
  395. && isset($profile['role_arn'])
  396. ) {
  397. $sessionName = isset($profile['role_session_name'])
  398. ? $profile['role_session_name']
  399. : null;
  400. $provider = new AssumeRoleWithWebIdentityCredentialProvider([
  401. 'RoleArn' => $profile['role_arn'],
  402. 'WebIdentityTokenFile' => $profile['web_identity_token_file'],
  403. 'SessionName' => $sessionName,
  404. 'client' => $stsClient,
  405. 'region' => $region
  406. ]);
  407. return $provider();
  408. }
  409. } else {
  410. return self::reject("Unknown profile: $profileName");
  411. }
  412. return self::reject("No RoleArn or WebIdentityTokenFile specified");
  413. };
  414. }
  415. /**
  416. * Credentials provider that creates credentials using an ini file stored
  417. * in the current user's home directory. A source can be provided
  418. * in this file for assuming a role using the credential_source config option.
  419. *
  420. * @param string|null $profile Profile to use. If not specified will use
  421. * the "default" profile in "~/.aws/credentials".
  422. * @param string|null $filename If provided, uses a custom filename rather
  423. * than looking in the home directory.
  424. * @param array|null $config If provided, may contain the following:
  425. * preferStaticCredentials: If true, prefer static
  426. * credentials to role_arn if both are present
  427. * disableAssumeRole: If true, disable support for
  428. * roles that assume an IAM role. If true and role profile
  429. * is selected, an error is raised.
  430. * stsClient: StsClient used to assume role specified in profile
  431. *
  432. * @return callable
  433. */
  434. public static function ini($profile = null, $filename = null, array $config = [])
  435. {
  436. $filename = self::getFileName($filename);
  437. $profile = $profile ?: (getenv(self::ENV_PROFILE) ?: 'default');
  438. return function () use ($profile, $filename, $config) {
  439. $preferStaticCredentials = isset($config['preferStaticCredentials'])
  440. ? $config['preferStaticCredentials']
  441. : false;
  442. $disableAssumeRole = isset($config['disableAssumeRole'])
  443. ? $config['disableAssumeRole']
  444. : false;
  445. $stsClient = isset($config['stsClient']) ? $config['stsClient'] : null;
  446. if (!@is_readable($filename)) {
  447. return self::reject("Cannot read credentials from $filename");
  448. }
  449. $data = self::loadProfiles($filename);
  450. if ($data === false) {
  451. return self::reject("Invalid credentials file: $filename");
  452. }
  453. if (!isset($data[$profile])) {
  454. return self::reject("'$profile' not found in credentials file");
  455. }
  456. /*
  457. In the CLI, the presence of both a role_arn and static credentials have
  458. different meanings depending on how many profiles have been visited. For
  459. the first profile processed, role_arn takes precedence over any static
  460. credentials, but for all subsequent profiles, static credentials are
  461. used if present, and only in their absence will the profile's
  462. source_profile and role_arn keys be used to load another set of
  463. credentials. This bool is intended to yield compatible behaviour in this
  464. sdk.
  465. */
  466. $preferStaticCredentialsToRoleArn = ($preferStaticCredentials
  467. && isset($data[$profile]['aws_access_key_id'])
  468. && isset($data[$profile]['aws_secret_access_key']));
  469. if (isset($data[$profile]['role_arn'])
  470. && !$preferStaticCredentialsToRoleArn
  471. ) {
  472. if ($disableAssumeRole) {
  473. return self::reject(
  474. "Role assumption profiles are disabled. "
  475. . "Failed to load profile " . $profile);
  476. }
  477. return self::loadRoleProfile(
  478. $data,
  479. $profile,
  480. $filename,
  481. $stsClient,
  482. $config
  483. );
  484. }
  485. if (!isset($data[$profile]['aws_access_key_id'])
  486. || !isset($data[$profile]['aws_secret_access_key'])
  487. ) {
  488. return self::reject("No credentials present in INI profile "
  489. . "'$profile' ($filename)");
  490. }
  491. if (empty($data[$profile]['aws_session_token'])) {
  492. $data[$profile]['aws_session_token']
  493. = isset($data[$profile]['aws_security_token'])
  494. ? $data[$profile]['aws_security_token']
  495. : null;
  496. }
  497. return Promise\Create::promiseFor(
  498. new Credentials(
  499. $data[$profile]['aws_access_key_id'],
  500. $data[$profile]['aws_secret_access_key'],
  501. $data[$profile]['aws_session_token']
  502. )
  503. );
  504. };
  505. }
  506. /**
  507. * Credentials provider that creates credentials using a process configured in
  508. * ini file stored in the current user's home directory.
  509. *
  510. * @param string|null $profile Profile to use. If not specified will use
  511. * the "default" profile in "~/.aws/credentials".
  512. * @param string|null $filename If provided, uses a custom filename rather
  513. * than looking in the home directory.
  514. *
  515. * @return callable
  516. */
  517. public static function process($profile = null, $filename = null)
  518. {
  519. $filename = self::getFileName($filename);
  520. $profile = $profile ?: (getenv(self::ENV_PROFILE) ?: 'default');
  521. return function () use ($profile, $filename) {
  522. if (!@is_readable($filename)) {
  523. return self::reject("Cannot read process credentials from $filename");
  524. }
  525. $data = \Aws\parse_ini_file($filename, true, INI_SCANNER_RAW);
  526. if ($data === false) {
  527. return self::reject("Invalid credentials file: $filename");
  528. }
  529. if (!isset($data[$profile])) {
  530. return self::reject("'$profile' not found in credentials file");
  531. }
  532. if (!isset($data[$profile]['credential_process'])) {
  533. return self::reject("No credential_process present in INI profile "
  534. . "'$profile' ($filename)");
  535. }
  536. $credentialProcess = $data[$profile]['credential_process'];
  537. $json = shell_exec($credentialProcess);
  538. $processData = json_decode($json, true);
  539. // Only support version 1
  540. if (isset($processData['Version'])) {
  541. if ($processData['Version'] !== 1) {
  542. return self::reject("credential_process does not return Version == 1");
  543. }
  544. }
  545. if (!isset($processData['AccessKeyId'])
  546. || !isset($processData['SecretAccessKey']))
  547. {
  548. return self::reject("credential_process does not return valid credentials");
  549. }
  550. if (isset($processData['Expiration'])) {
  551. try {
  552. $expiration = new DateTimeResult($processData['Expiration']);
  553. } catch (\Exception $e) {
  554. return self::reject("credential_process returned invalid expiration");
  555. }
  556. $now = new DateTimeResult();
  557. if ($expiration < $now) {
  558. return self::reject("credential_process returned expired credentials");
  559. }
  560. $expires = $expiration->getTimestamp();
  561. } else {
  562. $expires = null;
  563. }
  564. if (empty($processData['SessionToken'])) {
  565. $processData['SessionToken'] = null;
  566. }
  567. return Promise\Create::promiseFor(
  568. new Credentials(
  569. $processData['AccessKeyId'],
  570. $processData['SecretAccessKey'],
  571. $processData['SessionToken'],
  572. $expires
  573. )
  574. );
  575. };
  576. }
  577. /**
  578. * Assumes role for profile that includes role_arn
  579. *
  580. * @return callable
  581. */
  582. private static function loadRoleProfile(
  583. $profiles,
  584. $profileName,
  585. $filename,
  586. $stsClient,
  587. $config = []
  588. ) {
  589. $roleProfile = $profiles[$profileName];
  590. $roleArn = isset($roleProfile['role_arn']) ? $roleProfile['role_arn'] : '';
  591. $roleSessionName = isset($roleProfile['role_session_name'])
  592. ? $roleProfile['role_session_name']
  593. : 'aws-sdk-php-' . round(microtime(true) * 1000);
  594. if (
  595. empty($roleProfile['source_profile'])
  596. == empty($roleProfile['credential_source'])
  597. ) {
  598. return self::reject("Either source_profile or credential_source must be set " .
  599. "using profile " . $profileName . ", but not both."
  600. );
  601. }
  602. $sourceProfileName = "";
  603. if (!empty($roleProfile['source_profile'])) {
  604. $sourceProfileName = $roleProfile['source_profile'];
  605. if (!isset($profiles[$sourceProfileName])) {
  606. return self::reject("source_profile " . $sourceProfileName
  607. . " using profile " . $profileName . " does not exist"
  608. );
  609. }
  610. if (isset($config['visited_profiles']) &&
  611. in_array($roleProfile['source_profile'], $config['visited_profiles'])
  612. ) {
  613. return self::reject("Circular source_profile reference found.");
  614. }
  615. $config['visited_profiles'] [] = $roleProfile['source_profile'];
  616. } else {
  617. if (empty($roleArn)) {
  618. return self::reject(
  619. "A role_arn must be provided with credential_source in " .
  620. "file {$filename} under profile {$profileName} "
  621. );
  622. }
  623. }
  624. if (empty($stsClient)) {
  625. $sourceRegion = isset($profiles[$sourceProfileName]['region'])
  626. ? $profiles[$sourceProfileName]['region']
  627. : 'us-east-1';
  628. $config['preferStaticCredentials'] = true;
  629. $sourceCredentials = null;
  630. if (!empty($roleProfile['source_profile'])){
  631. $sourceCredentials = call_user_func(
  632. CredentialProvider::ini($sourceProfileName, $filename, $config)
  633. )->wait();
  634. } else {
  635. $sourceCredentials = self::getCredentialsFromSource(
  636. $profileName,
  637. $filename
  638. );
  639. }
  640. $stsClient = new StsClient([
  641. 'credentials' => $sourceCredentials,
  642. 'region' => $sourceRegion,
  643. 'version' => '2011-06-15',
  644. ]);
  645. }
  646. $result = $stsClient->assumeRole([
  647. 'RoleArn' => $roleArn,
  648. 'RoleSessionName' => $roleSessionName
  649. ]);
  650. $credentials = $stsClient->createCredentials($result);
  651. return Promise\Create::promiseFor($credentials);
  652. }
  653. /**
  654. * Gets the environment's HOME directory if available.
  655. *
  656. * @return null|string
  657. */
  658. private static function getHomeDir()
  659. {
  660. // On Linux/Unix-like systems, use the HOME environment variable
  661. if ($homeDir = getenv('HOME')) {
  662. return $homeDir;
  663. }
  664. // Get the HOMEDRIVE and HOMEPATH values for Windows hosts
  665. $homeDrive = getenv('HOMEDRIVE');
  666. $homePath = getenv('HOMEPATH');
  667. return ($homeDrive && $homePath) ? $homeDrive . $homePath : null;
  668. }
  669. /**
  670. * Gets profiles from specified $filename, or default ini files.
  671. */
  672. private static function loadProfiles($filename)
  673. {
  674. $profileData = \Aws\parse_ini_file($filename, true, INI_SCANNER_RAW);
  675. // If loading .aws/credentials, also load .aws/config when AWS_SDK_LOAD_NONDEFAULT_CONFIG is set
  676. if ($filename === self::getHomeDir() . '/.aws/credentials'
  677. && getenv('AWS_SDK_LOAD_NONDEFAULT_CONFIG')
  678. ) {
  679. $configFilename = self::getHomeDir() . '/.aws/config';
  680. $configProfileData = \Aws\parse_ini_file($configFilename, true, INI_SCANNER_RAW);
  681. foreach ($configProfileData as $name => $profile) {
  682. // standardize config profile names
  683. $name = str_replace('profile ', '', $name);
  684. if (!isset($profileData[$name])) {
  685. $profileData[$name] = $profile;
  686. }
  687. }
  688. }
  689. return $profileData;
  690. }
  691. /**
  692. * Gets profiles from ~/.aws/credentials and ~/.aws/config ini files
  693. */
  694. private static function loadDefaultProfiles() {
  695. $profiles = [];
  696. $credFile = self::getHomeDir() . '/.aws/credentials';
  697. $configFile = self::getHomeDir() . '/.aws/config';
  698. if (file_exists($credFile)) {
  699. $profiles = \Aws\parse_ini_file($credFile, true, INI_SCANNER_RAW);
  700. }
  701. if (file_exists($configFile)) {
  702. $configProfileData = \Aws\parse_ini_file($configFile, true, INI_SCANNER_RAW);
  703. foreach ($configProfileData as $name => $profile) {
  704. // standardize config profile names
  705. $name = str_replace('profile ', '', $name);
  706. if (!isset($profiles[$name])) {
  707. $profiles[$name] = $profile;
  708. }
  709. }
  710. }
  711. return $profiles;
  712. }
  713. public static function getCredentialsFromSource(
  714. $profileName = '',
  715. $filename = '',
  716. $config = []
  717. ) {
  718. $data = self::loadProfiles($filename);
  719. $credentialSource = !empty($data[$profileName]['credential_source'])
  720. ? $data[$profileName]['credential_source']
  721. : null;
  722. $credentialsPromise = null;
  723. switch ($credentialSource) {
  724. case 'Environment':
  725. $credentialsPromise = self::env();
  726. break;
  727. case 'Ec2InstanceMetadata':
  728. $credentialsPromise = self::instanceProfile($config);
  729. break;
  730. case 'EcsContainer':
  731. $credentialsPromise = self::ecsCredentials($config);
  732. break;
  733. default:
  734. throw new CredentialsException(
  735. "Invalid credential_source found in config file: {$credentialSource}. Valid inputs "
  736. . "include Environment, Ec2InstanceMetadata, and EcsContainer."
  737. );
  738. }
  739. $credentialsResult = null;
  740. try {
  741. $credentialsResult = $credentialsPromise()->wait();
  742. } catch (\Exception $reason) {
  743. return self::reject(
  744. "Unable to successfully retrieve credentials from the source specified in the"
  745. . " credentials file: {$credentialSource}; failure message was: "
  746. . $reason->getMessage()
  747. );
  748. }
  749. return function () use ($credentialsResult) {
  750. return Promise\Create::promiseFor($credentialsResult);
  751. };
  752. }
  753. private static function reject($msg)
  754. {
  755. return new Promise\RejectedPromise(new CredentialsException($msg));
  756. }
  757. /**
  758. * @param $filename
  759. * @return string
  760. */
  761. private static function getFileName($filename)
  762. {
  763. if (!isset($filename)) {
  764. $filename = getenv(self::ENV_SHARED_CREDENTIALS_FILE) ?:
  765. (self::getHomeDir() . '/.aws/credentials');
  766. }
  767. return $filename;
  768. }
  769. /**
  770. * @return boolean
  771. */
  772. public static function shouldUseEcs()
  773. {
  774. //Check for relative uri. if not, then full uri.
  775. //fall back to server for each as getenv is not thread-safe.
  776. return !empty(getenv(EcsCredentialProvider::ENV_URI))
  777. || !empty($_SERVER[EcsCredentialProvider::ENV_URI])
  778. || !empty(getenv(EcsCredentialProvider::ENV_FULL_URI))
  779. || !empty($_SERVER[EcsCredentialProvider::ENV_FULL_URI]);
  780. }
  781. /**
  782. * @param $profiles
  783. * @param $ssoProfileName
  784. * @param $filename
  785. * @param $config
  786. * @return Promise\PromiseInterface
  787. */
  788. private static function getSsoCredentials($profiles, $ssoProfileName, $filename, $config)
  789. {
  790. if (empty($config['ssoOidcClient'])) {
  791. $ssoProfile = $profiles[$ssoProfileName];
  792. $sessionName = $ssoProfile['sso_session'];
  793. if (empty($profiles['sso-session ' . $sessionName])) {
  794. return self::reject(
  795. "Could not find sso-session {$sessionName} in {$filename}"
  796. );
  797. }
  798. $ssoSession = $profiles['sso-session ' . $ssoProfile['sso_session']];
  799. $ssoOidcClient = new Aws\SSOOIDC\SSOOIDCClient([
  800. 'region' => $ssoSession['sso_region'],
  801. 'version' => '2019-06-10',
  802. 'credentials' => false
  803. ]);
  804. } else {
  805. $ssoOidcClient = $config['ssoClient'];
  806. }
  807. $tokenPromise = new Aws\Token\SsoTokenProvider(
  808. $ssoProfileName,
  809. $filename,
  810. $ssoOidcClient
  811. );
  812. $token = $tokenPromise()->wait();
  813. $ssoCredentials = CredentialProvider::getCredentialsFromSsoService(
  814. $ssoProfile,
  815. $ssoSession['sso_region'],
  816. $token->getToken(),
  817. $config
  818. );
  819. $expiration = $ssoCredentials['expiration'];
  820. return Promise\Create::promiseFor(
  821. new Credentials(
  822. $ssoCredentials['accessKeyId'],
  823. $ssoCredentials['secretAccessKey'],
  824. $ssoCredentials['sessionToken'],
  825. $expiration
  826. )
  827. );
  828. }
  829. /**
  830. * @param $profiles
  831. * @param $ssoProfileName
  832. * @param $filename
  833. * @param $config
  834. * @return Promise\PromiseInterface
  835. */
  836. private static function getSsoCredentialsLegacy($profiles, $ssoProfileName, $filename, $config)
  837. {
  838. $ssoProfile = $profiles[$ssoProfileName];
  839. if (empty($ssoProfile['sso_start_url'])
  840. || empty($ssoProfile['sso_region'])
  841. || empty($ssoProfile['sso_account_id'])
  842. || empty($ssoProfile['sso_role_name'])
  843. ) {
  844. return self::reject(
  845. "Profile {$ssoProfileName} in {$filename} must contain the following keys: "
  846. . "sso_start_url, sso_region, sso_account_id, and sso_role_name."
  847. );
  848. }
  849. $tokenLocation = self::getHomeDir()
  850. . '/.aws/sso/cache/'
  851. . sha1($ssoProfile['sso_start_url'])
  852. . ".json";
  853. if (!@is_readable($tokenLocation)) {
  854. return self::reject("Unable to read token file at $tokenLocation");
  855. }
  856. $tokenData = json_decode(file_get_contents($tokenLocation), true);
  857. if (empty($tokenData['accessToken']) || empty($tokenData['expiresAt'])) {
  858. return self::reject(
  859. "Token file at {$tokenLocation} must contain an access token and an expiration"
  860. );
  861. }
  862. try {
  863. $expiration = (new DateTimeResult($tokenData['expiresAt']))->getTimestamp();
  864. } catch (\Exception $e) {
  865. return self::reject("Cached SSO credentials returned an invalid expiration");
  866. }
  867. $now = time();
  868. if ($expiration < $now) {
  869. return self::reject("Cached SSO credentials returned expired credentials");
  870. }
  871. $ssoCredentials = CredentialProvider::getCredentialsFromSsoService(
  872. $ssoProfile,
  873. $ssoProfile['sso_region'],
  874. $tokenData['accessToken'],
  875. $config
  876. );
  877. return Promise\Create::promiseFor(
  878. new Credentials(
  879. $ssoCredentials['accessKeyId'],
  880. $ssoCredentials['secretAccessKey'],
  881. $ssoCredentials['sessionToken'],
  882. $expiration
  883. )
  884. );
  885. }
  886. /**
  887. * @param array $ssoProfile
  888. * @param string $clientRegion
  889. * @param string $accessToken
  890. * @param array $config
  891. * @return array|null
  892. */
  893. private static function getCredentialsFromSsoService($ssoProfile, $clientRegion, $accessToken, $config)
  894. {
  895. if (empty($config['ssoClient'])) {
  896. $ssoClient = new Aws\SSO\SSOClient([
  897. 'region' => $clientRegion,
  898. 'version' => '2019-06-10',
  899. 'credentials' => false
  900. ]);
  901. } else {
  902. $ssoClient = $config['ssoClient'];
  903. }
  904. $ssoResponse = $ssoClient->getRoleCredentials([
  905. 'accessToken' => $accessToken,
  906. 'accountId' => $ssoProfile['sso_account_id'],
  907. 'roleName' => $ssoProfile['sso_role_name']
  908. ]);
  909. $ssoCredentials = $ssoResponse['roleCredentials'];
  910. return $ssoCredentials;
  911. }
  912. }