| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991 | 
							- <?php
 
- namespace Aws\Credentials;
 
- use Aws;
 
- use Aws\Api\DateTimeResult;
 
- use Aws\CacheInterface;
 
- use Aws\Exception\CredentialsException;
 
- use Aws\Sts\StsClient;
 
- use GuzzleHttp\Promise;
 
- /**
 
-  * Credential providers are functions that accept no arguments and return a
 
-  * promise that is fulfilled with an {@see \Aws\Credentials\CredentialsInterface}
 
-  * or rejected with an {@see \Aws\Exception\CredentialsException}.
 
-  *
 
-  * <code>
 
-  * use Aws\Credentials\CredentialProvider;
 
-  * $provider = CredentialProvider::defaultProvider();
 
-  * // Returns a CredentialsInterface or throws.
 
-  * $creds = $provider()->wait();
 
-  * </code>
 
-  *
 
-  * Credential providers can be composed to create credentials using conditional
 
-  * logic that can create different credentials in different environments. You
 
-  * can compose multiple providers into a single provider using
 
-  * {@see Aws\Credentials\CredentialProvider::chain}. This function accepts
 
-  * providers as variadic arguments and returns a new function that will invoke
 
-  * each provider until a successful set of credentials is returned.
 
-  *
 
-  * <code>
 
-  * // First try an INI file at this location.
 
-  * $a = CredentialProvider::ini(null, '/path/to/file.ini');
 
-  * // Then try an INI file at this location.
 
-  * $b = CredentialProvider::ini(null, '/path/to/other-file.ini');
 
-  * // Then try loading from environment variables.
 
-  * $c = CredentialProvider::env();
 
-  * // Combine the three providers together.
 
-  * $composed = CredentialProvider::chain($a, $b, $c);
 
-  * // Returns a promise that is fulfilled with credentials or throws.
 
-  * $promise = $composed();
 
-  * // Wait on the credentials to resolve.
 
-  * $creds = $promise->wait();
 
-  * </code>
 
-  */
 
- class CredentialProvider
 
- {
 
-     const ENV_ARN = 'AWS_ROLE_ARN';
 
-     const ENV_KEY = 'AWS_ACCESS_KEY_ID';
 
-     const ENV_PROFILE = 'AWS_PROFILE';
 
-     const ENV_ROLE_SESSION_NAME = 'AWS_ROLE_SESSION_NAME';
 
-     const ENV_SECRET = 'AWS_SECRET_ACCESS_KEY';
 
-     const ENV_SESSION = 'AWS_SESSION_TOKEN';
 
-     const ENV_TOKEN_FILE = 'AWS_WEB_IDENTITY_TOKEN_FILE';
 
-     const ENV_SHARED_CREDENTIALS_FILE = 'AWS_SHARED_CREDENTIALS_FILE';
 
-     /**
 
-      * Create a default credential provider that
 
-      * first checks for environment variables,
 
-      * then checks for assumed role via web identity,
 
-      * then checks for cached SSO credentials from the CLI,
 
-      * then check for credential_process in the "default" profile in ~/.aws/credentials,
 
-      * then checks for the "default" profile in ~/.aws/credentials,
 
-      * then for credential_process in the "default profile" profile in ~/.aws/config,
 
-      * then checks for "profile default" profile in ~/.aws/config (which is
 
-      * the default profile of AWS CLI),
 
-      * then tries to make a GET Request to fetch credentials if ECS environment variable is presented,
 
-      * finally checks for EC2 instance profile credentials.
 
-      *
 
-      * This provider is automatically wrapped in a memoize function that caches
 
-      * previously provided credentials.
 
-      *
 
-      * @param array $config Optional array of ecs/instance profile credentials
 
-      *                      provider options.
 
-      *
 
-      * @return callable
 
-      */
 
-     public static function defaultProvider(array $config = [])
 
-     {
 
-         $cacheable = [
 
-             'web_identity',
 
-             'sso',
 
-             'process_credentials',
 
-             'process_config',
 
-             'ecs',
 
-             'instance'
 
-         ];
 
-         $profileName = getenv(self::ENV_PROFILE) ?: 'default';
 
-         $defaultChain = [
 
-             'env' => self::env(),
 
-             'web_identity' => self::assumeRoleWithWebIdentityCredentialProvider($config),
 
-         ];
 
-         if (
 
-             !isset($config['use_aws_shared_config_files'])
 
-             || $config['use_aws_shared_config_files'] !== false
 
-         ) {
 
-             $defaultChain['sso'] = self::sso(
 
-                 $profileName,
 
-                 self::getHomeDir() . '/.aws/config',
 
-                 $config
 
-             );
 
-             $defaultChain['process_credentials'] = self::process();
 
-             $defaultChain['ini'] = self::ini();
 
-             $defaultChain['process_config'] = self::process(
 
-                 'profile ' . $profileName,
 
-                 self::getHomeDir() . '/.aws/config'
 
-             );
 
-             $defaultChain['ini_config'] = self::ini(
 
-                 'profile '. $profileName,
 
-                 self::getHomeDir() . '/.aws/config'
 
-             );
 
-         }
 
-         if (self::shouldUseEcs()) {
 
-             $defaultChain['ecs'] = self::ecsCredentials($config);
 
-         } else {
 
-             $defaultChain['instance'] = self::instanceProfile($config);
 
-         }
 
-         if (isset($config['credentials'])
 
-             && $config['credentials'] instanceof CacheInterface
 
-         ) {
 
-             foreach ($cacheable as $provider) {
 
-                 if (isset($defaultChain[$provider])) {
 
-                     $defaultChain[$provider] = self::cache(
 
-                         $defaultChain[$provider],
 
-                         $config['credentials'],
 
-                         'aws_cached_' . $provider . '_credentials'
 
-                     );
 
-                 }
 
-             }
 
-         }
 
-         return self::memoize(
 
-             call_user_func_array(
 
-                 [CredentialProvider::class, 'chain'],
 
-                 array_values($defaultChain)
 
-             )
 
-         );
 
-     }
 
-     /**
 
-      * Create a credential provider function from a set of static credentials.
 
-      *
 
-      * @param CredentialsInterface $creds
 
-      *
 
-      * @return callable
 
-      */
 
-     public static function fromCredentials(CredentialsInterface $creds)
 
-     {
 
-         $promise = Promise\Create::promiseFor($creds);
 
-         return function () use ($promise) {
 
-             return $promise;
 
-         };
 
-     }
 
-     /**
 
-      * Creates an aggregate credentials provider that invokes the provided
 
-      * variadic providers one after the other until a provider returns
 
-      * credentials.
 
-      *
 
-      * @return callable
 
-      */
 
-     public static function chain()
 
-     {
 
-         $links = func_get_args();
 
-         if (empty($links)) {
 
-             throw new \InvalidArgumentException('No providers in chain');
 
-         }
 
-         return function ($previousCreds = null) use ($links) {
 
-             /** @var callable $parent */
 
-             $parent = array_shift($links);
 
-             $promise = $parent();
 
-             while ($next = array_shift($links)) {
 
-                 if ($next instanceof InstanceProfileProvider
 
-                     && $previousCreds instanceof Credentials
 
-                 ) {
 
-                     $promise = $promise->otherwise(
 
-                         function () use ($next, $previousCreds) {return $next($previousCreds);}
 
-                     );
 
-                 } else {
 
-                     $promise = $promise->otherwise($next);
 
-                 }
 
-             }
 
-             return $promise;
 
-         };
 
-     }
 
-     /**
 
-      * Wraps a credential provider and caches previously provided credentials.
 
-      *
 
-      * Ensures that cached credentials are refreshed when they expire.
 
-      *
 
-      * @param callable $provider Credentials provider function to wrap.
 
-      *
 
-      * @return callable
 
-      */
 
-     public static function memoize(callable $provider)
 
-     {
 
-         return function () use ($provider) {
 
-             static $result;
 
-             static $isConstant;
 
-             // Constant credentials will be returned constantly.
 
-             if ($isConstant) {
 
-                 return $result;
 
-             }
 
-             // Create the initial promise that will be used as the cached value
 
-             // until it expires.
 
-             if (null === $result) {
 
-                 $result = $provider();
 
-             }
 
-             // Return credentials that could expire and refresh when needed.
 
-             return $result
 
-                 ->then(function (CredentialsInterface $creds) use ($provider, &$isConstant, &$result) {
 
-                     // Determine if these are constant credentials.
 
-                     if (!$creds->getExpiration()) {
 
-                         $isConstant = true;
 
-                         return $creds;
 
-                     }
 
-                     // Refresh expired credentials.
 
-                     if (!$creds->isExpired()) {
 
-                         return $creds;
 
-                     }
 
-                     // Refresh the result and forward the promise.
 
-                     return $result = $provider($creds);
 
-                 })
 
-                 ->otherwise(function($reason) use (&$result) {
 
-                     // Cleanup rejected promise.
 
-                     $result = null;
 
-                     return new Promise\RejectedPromise($reason);
 
-                 });
 
-         };
 
-     }
 
-     /**
 
-      * Wraps a credential provider and saves provided credentials in an
 
-      * instance of Aws\CacheInterface. Forwards calls when no credentials found
 
-      * in cache and updates cache with the results.
 
-      *
 
-      * @param callable $provider Credentials provider function to wrap
 
-      * @param CacheInterface $cache Cache to store credentials
 
-      * @param string|null $cacheKey (optional) Cache key to use
 
-      *
 
-      * @return callable
 
-      */
 
-     public static function cache(
 
-         callable $provider,
 
-         CacheInterface $cache,
 
-         $cacheKey = null
 
-     ) {
 
-         $cacheKey = $cacheKey ?: 'aws_cached_credentials';
 
-         return function () use ($provider, $cache, $cacheKey) {
 
-             $found = $cache->get($cacheKey);
 
-             if ($found instanceof CredentialsInterface && !$found->isExpired()) {
 
-                 return Promise\Create::promiseFor($found);
 
-             }
 
-             return $provider()
 
-                 ->then(function (CredentialsInterface $creds) use (
 
-                     $cache,
 
-                     $cacheKey
 
-                 ) {
 
-                     $cache->set(
 
-                         $cacheKey,
 
-                         $creds,
 
-                         null === $creds->getExpiration() ?
 
-                             0 : $creds->getExpiration() - time()
 
-                     );
 
-                     return $creds;
 
-                 });
 
-         };
 
-     }
 
-     /**
 
-      * Provider that creates credentials from environment variables
 
-      * AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, and AWS_SESSION_TOKEN.
 
-      *
 
-      * @return callable
 
-      */
 
-     public static function env()
 
-     {
 
-         return function () {
 
-             // Use credentials from environment variables, if available
 
-             $key = getenv(self::ENV_KEY);
 
-             $secret = getenv(self::ENV_SECRET);
 
-             if ($key && $secret) {
 
-                 return Promise\Create::promiseFor(
 
-                     new Credentials($key, $secret, getenv(self::ENV_SESSION) ?: NULL)
 
-                 );
 
-             }
 
-             return self::reject('Could not find environment variable '
 
-                 . 'credentials in ' . self::ENV_KEY . '/' . self::ENV_SECRET);
 
-         };
 
-     }
 
-     /**
 
-      * Credential provider that creates credentials using instance profile
 
-      * credentials.
 
-      *
 
-      * @param array $config Array of configuration data.
 
-      *
 
-      * @return InstanceProfileProvider
 
-      * @see Aws\Credentials\InstanceProfileProvider for $config details.
 
-      */
 
-     public static function instanceProfile(array $config = [])
 
-     {
 
-         return new InstanceProfileProvider($config);
 
-     }
 
-     /**
 
-      * Credential provider that retrieves cached SSO credentials from the CLI
 
-      *
 
-      * @return callable
 
-      */
 
-     public static function sso($ssoProfileName = 'default',
 
-                                $filename = null,
 
-                                $config = []
 
-     ) {
 
-         $filename = $filename ?: (self::getHomeDir() . '/.aws/config');
 
-         return function () use ($ssoProfileName, $filename, $config) {
 
-             if (!@is_readable($filename)) {
 
-                 return self::reject("Cannot read credentials from $filename");
 
-             }
 
-             $profiles = self::loadProfiles($filename);
 
-             if (isset($profiles[$ssoProfileName])) {
 
-                 $ssoProfile = $profiles[$ssoProfileName];
 
-             } elseif (isset($profiles['profile ' . $ssoProfileName])) {
 
-                 $ssoProfileName = 'profile ' . $ssoProfileName;
 
-                 $ssoProfile = $profiles[$ssoProfileName];
 
-             } else {
 
-                 return self::reject("Profile {$ssoProfileName} does not exist in {$filename}.");
 
-             }
 
-             if (!empty($ssoProfile['sso_session'])) {
 
-                 return CredentialProvider::getSsoCredentials($profiles, $ssoProfileName, $filename, $config);
 
-             } else {
 
-                 return CredentialProvider::getSsoCredentialsLegacy($profiles, $ssoProfileName, $filename, $config);
 
-             }
 
-         };
 
-     }
 
-     /**
 
-      * Credential provider that creates credentials using
 
-      * ecs credentials by a GET request, whose uri is specified
 
-      * by environment variable
 
-      *
 
-      * @param array $config Array of configuration data.
 
-      *
 
-      * @return EcsCredentialProvider
 
-      * @see Aws\Credentials\EcsCredentialProvider for $config details.
 
-      */
 
-     public static function ecsCredentials(array $config = [])
 
-     {
 
-         return new EcsCredentialProvider($config);
 
-     }
 
-     /**
 
-      * Credential provider that creates credentials using assume role
 
-      *
 
-      * @param array $config Array of configuration data
 
-      * @return callable
 
-      * @see Aws\Credentials\AssumeRoleCredentialProvider for $config details.
 
-      */
 
-     public static function assumeRole(array $config=[])
 
-     {
 
-         return new AssumeRoleCredentialProvider($config);
 
-     }
 
-     /**
 
-      * Credential provider that creates credentials by assuming role from a
 
-      * Web Identity Token
 
-      *
 
-      * @param array $config Array of configuration data
 
-      * @return callable
 
-      * @see Aws\Credentials\AssumeRoleWithWebIdentityCredentialProvider for
 
-      * $config details.
 
-      */
 
-     public static function assumeRoleWithWebIdentityCredentialProvider(array $config = [])
 
-     {
 
-         return function () use ($config) {
 
-             $arnFromEnv = getenv(self::ENV_ARN);
 
-             $tokenFromEnv = getenv(self::ENV_TOKEN_FILE);
 
-             $stsClient = isset($config['stsClient'])
 
-                 ? $config['stsClient']
 
-                 : null;
 
-             $region = isset($config['region'])
 
-                 ? $config['region']
 
-                 : null;
 
-             if ($tokenFromEnv && $arnFromEnv) {
 
-                 $sessionName = getenv(self::ENV_ROLE_SESSION_NAME)
 
-                     ? getenv(self::ENV_ROLE_SESSION_NAME)
 
-                     : null;
 
-                 $provider = new AssumeRoleWithWebIdentityCredentialProvider([
 
-                     'RoleArn' => $arnFromEnv,
 
-                     'WebIdentityTokenFile' => $tokenFromEnv,
 
-                     'SessionName' => $sessionName,
 
-                     'client' => $stsClient,
 
-                     'region' => $region
 
-                 ]);
 
-                 return $provider();
 
-             }
 
-             $profileName = getenv(self::ENV_PROFILE) ?: 'default';
 
-             if (isset($config['filename'])) {
 
-                 $profiles = self::loadProfiles($config['filename']);
 
-             } else {
 
-                 $profiles = self::loadDefaultProfiles();
 
-             }
 
-             if (isset($profiles[$profileName])) {
 
-                 $profile = $profiles[$profileName];
 
-                 if (isset($profile['region'])) {
 
-                     $region = $profile['region'];
 
-                 }
 
-                 if (isset($profile['web_identity_token_file'])
 
-                     && isset($profile['role_arn'])
 
-                 ) {
 
-                     $sessionName = isset($profile['role_session_name'])
 
-                         ? $profile['role_session_name']
 
-                         : null;
 
-                     $provider = new AssumeRoleWithWebIdentityCredentialProvider([
 
-                         'RoleArn' => $profile['role_arn'],
 
-                         'WebIdentityTokenFile' => $profile['web_identity_token_file'],
 
-                         'SessionName' => $sessionName,
 
-                         'client' => $stsClient,
 
-                         'region' => $region
 
-                     ]);
 
-                     return $provider();
 
-                 }
 
-             } else {
 
-                 return self::reject("Unknown profile: $profileName");
 
-             }
 
-             return self::reject("No RoleArn or WebIdentityTokenFile specified");
 
-         };
 
-     }
 
-     /**
 
-      * Credentials provider that creates credentials using an ini file stored
 
-      * in the current user's home directory.  A source can be provided
 
-      * in this file for assuming a role using the credential_source config option.
 
-      *
 
-      * @param string|null $profile  Profile to use. If not specified will use
 
-      *                              the "default" profile in "~/.aws/credentials".
 
-      * @param string|null $filename If provided, uses a custom filename rather
 
-      *                              than looking in the home directory.
 
-      * @param array|null $config If provided, may contain the following:
 
-      *                           preferStaticCredentials: If true, prefer static
 
-      *                           credentials to role_arn if both are present
 
-      *                           disableAssumeRole: If true, disable support for
 
-      *                           roles that assume an IAM role. If true and role profile
 
-      *                           is selected, an error is raised.
 
-      *                           stsClient: StsClient used to assume role specified in profile
 
-      *
 
-      * @return callable
 
-      */
 
-     public static function ini($profile = null, $filename = null, array $config = [])
 
-     {
 
-         $filename = self::getFileName($filename);
 
-         $profile = $profile ?: (getenv(self::ENV_PROFILE) ?: 'default');
 
-         return function () use ($profile, $filename, $config) {
 
-             $preferStaticCredentials = isset($config['preferStaticCredentials'])
 
-                 ? $config['preferStaticCredentials']
 
-                 : false;
 
-             $disableAssumeRole = isset($config['disableAssumeRole'])
 
-                 ? $config['disableAssumeRole']
 
-                 : false;
 
-             $stsClient = isset($config['stsClient']) ? $config['stsClient'] : null;
 
-             if (!@is_readable($filename)) {
 
-                 return self::reject("Cannot read credentials from $filename");
 
-             }
 
-             $data = self::loadProfiles($filename);
 
-             if ($data === false) {
 
-                 return self::reject("Invalid credentials file: $filename");
 
-             }
 
-             if (!isset($data[$profile])) {
 
-                 return self::reject("'$profile' not found in credentials file");
 
-             }
 
-             /*
 
-             In the CLI, the presence of both a role_arn and static credentials have
 
-             different meanings depending on how many profiles have been visited. For
 
-             the first profile processed, role_arn takes precedence over any static
 
-             credentials, but for all subsequent profiles, static credentials are
 
-             used if present, and only in their absence will the profile's
 
-             source_profile and role_arn keys be used to load another set of
 
-             credentials. This bool is intended to yield compatible behaviour in this
 
-             sdk.
 
-             */
 
-             $preferStaticCredentialsToRoleArn = ($preferStaticCredentials
 
-                 && isset($data[$profile]['aws_access_key_id'])
 
-                 && isset($data[$profile]['aws_secret_access_key']));
 
-             if (isset($data[$profile]['role_arn'])
 
-                 && !$preferStaticCredentialsToRoleArn
 
-             ) {
 
-                 if ($disableAssumeRole) {
 
-                     return self::reject(
 
-                         "Role assumption profiles are disabled. "
 
-                         . "Failed to load profile " . $profile);
 
-                 }
 
-                 return self::loadRoleProfile(
 
-                     $data,
 
-                     $profile,
 
-                     $filename,
 
-                     $stsClient,
 
-                     $config
 
-                 );
 
-             }
 
-             if (!isset($data[$profile]['aws_access_key_id'])
 
-                 || !isset($data[$profile]['aws_secret_access_key'])
 
-             ) {
 
-                 return self::reject("No credentials present in INI profile "
 
-                     . "'$profile' ($filename)");
 
-             }
 
-             if (empty($data[$profile]['aws_session_token'])) {
 
-                 $data[$profile]['aws_session_token']
 
-                     = isset($data[$profile]['aws_security_token'])
 
-                     ? $data[$profile]['aws_security_token']
 
-                     : null;
 
-             }
 
-             return Promise\Create::promiseFor(
 
-                 new Credentials(
 
-                     $data[$profile]['aws_access_key_id'],
 
-                     $data[$profile]['aws_secret_access_key'],
 
-                     $data[$profile]['aws_session_token']
 
-                 )
 
-             );
 
-         };
 
-     }
 
-     /**
 
-      * Credentials provider that creates credentials using a process configured in
 
-      * ini file stored in the current user's home directory.
 
-      *
 
-      * @param string|null $profile  Profile to use. If not specified will use
 
-      *                              the "default" profile in "~/.aws/credentials".
 
-      * @param string|null $filename If provided, uses a custom filename rather
 
-      *                              than looking in the home directory.
 
-      *
 
-      * @return callable
 
-      */
 
-     public static function process($profile = null, $filename = null)
 
-     {
 
-         $filename = self::getFileName($filename);
 
-         $profile = $profile ?: (getenv(self::ENV_PROFILE) ?: 'default');
 
-         return function () use ($profile, $filename) {
 
-             if (!@is_readable($filename)) {
 
-                 return self::reject("Cannot read process credentials from $filename");
 
-             }
 
-             $data = \Aws\parse_ini_file($filename, true, INI_SCANNER_RAW);
 
-             if ($data === false) {
 
-                 return self::reject("Invalid credentials file: $filename");
 
-             }
 
-             if (!isset($data[$profile])) {
 
-                 return self::reject("'$profile' not found in credentials file");
 
-             }
 
-             if (!isset($data[$profile]['credential_process'])) {
 
-                 return self::reject("No credential_process present in INI profile "
 
-                     . "'$profile' ($filename)");
 
-             }
 
-             $credentialProcess = $data[$profile]['credential_process'];
 
-             $json = shell_exec($credentialProcess);
 
-             $processData = json_decode($json, true);
 
-             // Only support version 1
 
-             if (isset($processData['Version'])) {
 
-                 if ($processData['Version'] !== 1) {
 
-                     return self::reject("credential_process does not return Version == 1");
 
-                 }
 
-             }
 
-             if (!isset($processData['AccessKeyId'])
 
-                 || !isset($processData['SecretAccessKey']))
 
-             {
 
-                 return self::reject("credential_process does not return valid credentials");
 
-             }
 
-             if (isset($processData['Expiration'])) {
 
-                 try {
 
-                     $expiration = new DateTimeResult($processData['Expiration']);
 
-                 } catch (\Exception $e) {
 
-                     return self::reject("credential_process returned invalid expiration");
 
-                 }
 
-                 $now = new DateTimeResult();
 
-                 if ($expiration < $now) {
 
-                     return self::reject("credential_process returned expired credentials");
 
-                 }
 
-                 $expires = $expiration->getTimestamp();
 
-             } else {
 
-                 $expires = null;
 
-             }
 
-             if (empty($processData['SessionToken'])) {
 
-                 $processData['SessionToken'] = null;
 
-             }
 
-             return Promise\Create::promiseFor(
 
-                 new Credentials(
 
-                     $processData['AccessKeyId'],
 
-                     $processData['SecretAccessKey'],
 
-                     $processData['SessionToken'],
 
-                     $expires
 
-                 )
 
-             );
 
-         };
 
-     }
 
-     /**
 
-      * Assumes role for profile that includes role_arn
 
-      *
 
-      * @return callable
 
-      */
 
-     private static function loadRoleProfile(
 
-         $profiles,
 
-         $profileName,
 
-         $filename,
 
-         $stsClient,
 
-         $config = []
 
-     ) {
 
-         $roleProfile = $profiles[$profileName];
 
-         $roleArn = isset($roleProfile['role_arn']) ? $roleProfile['role_arn'] : '';
 
-         $roleSessionName = isset($roleProfile['role_session_name'])
 
-             ? $roleProfile['role_session_name']
 
-             : 'aws-sdk-php-' . round(microtime(true) * 1000);
 
-         if (
 
-             empty($roleProfile['source_profile'])
 
-             == empty($roleProfile['credential_source'])
 
-         ) {
 
-             return self::reject("Either source_profile or credential_source must be set " .
 
-                 "using profile " . $profileName . ", but not both."
 
-             );
 
-         }
 
-         $sourceProfileName = "";
 
-         if (!empty($roleProfile['source_profile'])) {
 
-             $sourceProfileName = $roleProfile['source_profile'];
 
-             if (!isset($profiles[$sourceProfileName])) {
 
-                 return self::reject("source_profile " . $sourceProfileName
 
-                     . " using profile " . $profileName . " does not exist"
 
-                 );
 
-             }
 
-             if (isset($config['visited_profiles']) &&
 
-                 in_array($roleProfile['source_profile'], $config['visited_profiles'])
 
-             ) {
 
-                 return self::reject("Circular source_profile reference found.");
 
-             }
 
-             $config['visited_profiles'] [] = $roleProfile['source_profile'];
 
-         } else {
 
-             if (empty($roleArn)) {
 
-                 return self::reject(
 
-                     "A role_arn must be provided with credential_source in " .
 
-                     "file {$filename} under profile {$profileName} "
 
-                 );
 
-             }
 
-         }
 
-         if (empty($stsClient)) {
 
-             $sourceRegion = isset($profiles[$sourceProfileName]['region'])
 
-                 ? $profiles[$sourceProfileName]['region']
 
-                 : 'us-east-1';
 
-             $config['preferStaticCredentials'] = true;
 
-             $sourceCredentials = null;
 
-             if (!empty($roleProfile['source_profile'])){
 
-                 $sourceCredentials = call_user_func(
 
-                     CredentialProvider::ini($sourceProfileName, $filename, $config)
 
-                 )->wait();
 
-             } else {
 
-                 $sourceCredentials = self::getCredentialsFromSource(
 
-                     $profileName,
 
-                     $filename
 
-                 );
 
-             }
 
-             $stsClient = new StsClient([
 
-                 'credentials' => $sourceCredentials,
 
-                 'region' => $sourceRegion,
 
-                 'version' => '2011-06-15',
 
-             ]);
 
-         }
 
-         $result = $stsClient->assumeRole([
 
-             'RoleArn' => $roleArn,
 
-             'RoleSessionName' => $roleSessionName
 
-         ]);
 
-         $credentials = $stsClient->createCredentials($result);
 
-         return Promise\Create::promiseFor($credentials);
 
-     }
 
-     /**
 
-      * Gets the environment's HOME directory if available.
 
-      *
 
-      * @return null|string
 
-      */
 
-     private static function getHomeDir()
 
-     {
 
-         // On Linux/Unix-like systems, use the HOME environment variable
 
-         if ($homeDir = getenv('HOME')) {
 
-             return $homeDir;
 
-         }
 
-         // Get the HOMEDRIVE and HOMEPATH values for Windows hosts
 
-         $homeDrive = getenv('HOMEDRIVE');
 
-         $homePath = getenv('HOMEPATH');
 
-         return ($homeDrive && $homePath) ? $homeDrive . $homePath : null;
 
-     }
 
-     /**
 
-      * Gets profiles from specified $filename, or default ini files.
 
-      */
 
-     private static function loadProfiles($filename)
 
-     {
 
-         $profileData = \Aws\parse_ini_file($filename, true, INI_SCANNER_RAW);
 
-         // If loading .aws/credentials, also load .aws/config when AWS_SDK_LOAD_NONDEFAULT_CONFIG is set
 
-         if ($filename === self::getHomeDir() . '/.aws/credentials'
 
-             && getenv('AWS_SDK_LOAD_NONDEFAULT_CONFIG')
 
-         ) {
 
-             $configFilename = self::getHomeDir() . '/.aws/config';
 
-             $configProfileData = \Aws\parse_ini_file($configFilename, true, INI_SCANNER_RAW);
 
-             foreach ($configProfileData as $name => $profile) {
 
-                 // standardize config profile names
 
-                 $name = str_replace('profile ', '', $name);
 
-                 if (!isset($profileData[$name])) {
 
-                     $profileData[$name] = $profile;
 
-                 }
 
-             }
 
-         }
 
-         return $profileData;
 
-     }
 
-     /**
 
-      * Gets profiles from ~/.aws/credentials and ~/.aws/config ini files
 
-      */
 
-     private static function loadDefaultProfiles() {
 
-         $profiles = [];
 
-         $credFile = self::getHomeDir() . '/.aws/credentials';
 
-         $configFile = self::getHomeDir() . '/.aws/config';
 
-         if (file_exists($credFile)) {
 
-             $profiles = \Aws\parse_ini_file($credFile, true, INI_SCANNER_RAW);
 
-         }
 
-         if (file_exists($configFile)) {
 
-             $configProfileData = \Aws\parse_ini_file($configFile, true, INI_SCANNER_RAW);
 
-             foreach ($configProfileData as $name => $profile) {
 
-                 // standardize config profile names
 
-                 $name = str_replace('profile ', '', $name);
 
-                 if (!isset($profiles[$name])) {
 
-                     $profiles[$name] = $profile;
 
-                 }
 
-             }
 
-         }
 
-         return $profiles;
 
-     }
 
-     public static function getCredentialsFromSource(
 
-         $profileName = '',
 
-         $filename = '',
 
-         $config = []
 
-     ) {
 
-         $data = self::loadProfiles($filename);
 
-         $credentialSource = !empty($data[$profileName]['credential_source'])
 
-             ? $data[$profileName]['credential_source']
 
-             : null;
 
-         $credentialsPromise = null;
 
-         switch ($credentialSource) {
 
-             case 'Environment':
 
-                 $credentialsPromise = self::env();
 
-                 break;
 
-             case 'Ec2InstanceMetadata':
 
-                 $credentialsPromise = self::instanceProfile($config);
 
-                 break;
 
-             case 'EcsContainer':
 
-                 $credentialsPromise = self::ecsCredentials($config);
 
-                 break;
 
-             default:
 
-                 throw new CredentialsException(
 
-                     "Invalid credential_source found in config file: {$credentialSource}. Valid inputs "
 
-                     . "include Environment, Ec2InstanceMetadata, and EcsContainer."
 
-                 );
 
-         }
 
-         $credentialsResult = null;
 
-         try {
 
-             $credentialsResult = $credentialsPromise()->wait();
 
-         } catch (\Exception $reason) {
 
-             return self::reject(
 
-                 "Unable to successfully retrieve credentials from the source specified in the"
 
-                 . " credentials file: {$credentialSource}; failure message was: "
 
-                 . $reason->getMessage()
 
-             );
 
-         }
 
-         return function () use ($credentialsResult) {
 
-             return Promise\Create::promiseFor($credentialsResult);
 
-         };
 
-     }
 
-     private static function reject($msg)
 
-     {
 
-         return new Promise\RejectedPromise(new CredentialsException($msg));
 
-     }
 
-     /**
 
-      * @param $filename
 
-      * @return string
 
-      */
 
-     private static function getFileName($filename)
 
-     {
 
-         if (!isset($filename)) {
 
-             $filename = getenv(self::ENV_SHARED_CREDENTIALS_FILE) ?:
 
-                 (self::getHomeDir() . '/.aws/credentials');
 
-         }
 
-         return $filename;
 
-     }
 
-     /**
 
-      * @return boolean
 
-      */
 
-     public static function shouldUseEcs()
 
-     {
 
-         //Check for relative uri. if not, then full uri.
 
-         //fall back to server for each as getenv is not thread-safe.
 
-         return !empty(getenv(EcsCredentialProvider::ENV_URI))
 
-             || !empty($_SERVER[EcsCredentialProvider::ENV_URI])
 
-             || !empty(getenv(EcsCredentialProvider::ENV_FULL_URI))
 
-             || !empty($_SERVER[EcsCredentialProvider::ENV_FULL_URI]);
 
-     }
 
-     /**
 
-      * @param $profiles
 
-      * @param $ssoProfileName
 
-      * @param $filename
 
-      * @param $config
 
-      * @return Promise\PromiseInterface
 
-      */
 
-     private static function getSsoCredentials($profiles, $ssoProfileName, $filename, $config)
 
-     {
 
-         if (empty($config['ssoOidcClient'])) {
 
-             $ssoProfile = $profiles[$ssoProfileName];
 
-             $sessionName = $ssoProfile['sso_session'];
 
-             if (empty($profiles['sso-session ' . $sessionName])) {
 
-                 return self::reject(
 
-                     "Could not find sso-session {$sessionName} in {$filename}"
 
-                 );
 
-             }
 
-             $ssoSession = $profiles['sso-session ' . $ssoProfile['sso_session']];
 
-             $ssoOidcClient = new Aws\SSOOIDC\SSOOIDCClient([
 
-                 'region' => $ssoSession['sso_region'],
 
-                 'version' => '2019-06-10',
 
-                 'credentials' => false
 
-             ]);
 
-         } else {
 
-             $ssoOidcClient = $config['ssoClient'];
 
-         }
 
-         $tokenPromise = new Aws\Token\SsoTokenProvider(
 
-             $ssoProfileName,
 
-             $filename,
 
-             $ssoOidcClient
 
-         );
 
-         $token = $tokenPromise()->wait();
 
-         $ssoCredentials = CredentialProvider::getCredentialsFromSsoService(
 
-             $ssoProfile,
 
-             $ssoSession['sso_region'],
 
-             $token->getToken(),
 
-             $config
 
-         );
 
-         $expiration = $ssoCredentials['expiration'];
 
-         return Promise\Create::promiseFor(
 
-             new Credentials(
 
-                 $ssoCredentials['accessKeyId'],
 
-                 $ssoCredentials['secretAccessKey'],
 
-                 $ssoCredentials['sessionToken'],
 
-                 $expiration
 
-             )
 
-         );
 
-     }
 
-     /**
 
-      * @param $profiles
 
-      * @param $ssoProfileName
 
-      * @param $filename
 
-      * @param $config
 
-      * @return Promise\PromiseInterface
 
-      */
 
-     private static function getSsoCredentialsLegacy($profiles, $ssoProfileName, $filename, $config)
 
-     {
 
-         $ssoProfile = $profiles[$ssoProfileName];
 
-         if (empty($ssoProfile['sso_start_url'])
 
-             || empty($ssoProfile['sso_region'])
 
-             || empty($ssoProfile['sso_account_id'])
 
-             || empty($ssoProfile['sso_role_name'])
 
-         ) {
 
-             return self::reject(
 
-                 "Profile {$ssoProfileName} in {$filename} must contain the following keys: "
 
-                 . "sso_start_url, sso_region, sso_account_id, and sso_role_name."
 
-             );
 
-         }
 
-         $tokenLocation = self::getHomeDir()
 
-             . '/.aws/sso/cache/'
 
-             . sha1($ssoProfile['sso_start_url'])
 
-             . ".json";
 
-         if (!@is_readable($tokenLocation)) {
 
-             return self::reject("Unable to read token file at $tokenLocation");
 
-         }
 
-         $tokenData = json_decode(file_get_contents($tokenLocation), true);
 
-         if (empty($tokenData['accessToken']) || empty($tokenData['expiresAt'])) {
 
-             return self::reject(
 
-                 "Token file at {$tokenLocation} must contain an access token and an expiration"
 
-             );
 
-         }
 
-         try {
 
-             $expiration = (new DateTimeResult($tokenData['expiresAt']))->getTimestamp();
 
-         } catch (\Exception $e) {
 
-             return self::reject("Cached SSO credentials returned an invalid expiration");
 
-         }
 
-         $now = time();
 
-         if ($expiration < $now) {
 
-             return self::reject("Cached SSO credentials returned expired credentials");
 
-         }
 
-         $ssoCredentials = CredentialProvider::getCredentialsFromSsoService(
 
-             $ssoProfile,
 
-             $ssoProfile['sso_region'],
 
-             $tokenData['accessToken'],
 
-             $config
 
-         );
 
-         return Promise\Create::promiseFor(
 
-             new Credentials(
 
-                 $ssoCredentials['accessKeyId'],
 
-                 $ssoCredentials['secretAccessKey'],
 
-                 $ssoCredentials['sessionToken'],
 
-                 $expiration
 
-             )
 
-         );
 
-     }
 
-     /**
 
-      * @param array $ssoProfile
 
-      * @param string $clientRegion
 
-      * @param string $accessToken
 
-      * @param array $config
 
-      * @return array|null
 
-      */
 
-     private static function getCredentialsFromSsoService($ssoProfile, $clientRegion, $accessToken, $config)
 
-     {
 
-         if (empty($config['ssoClient'])) {
 
-             $ssoClient = new Aws\SSO\SSOClient([
 
-                 'region' => $clientRegion,
 
-                 'version' => '2019-06-10',
 
-                 'credentials' => false
 
-             ]);
 
-         } else {
 
-             $ssoClient = $config['ssoClient'];
 
-         }
 
-         $ssoResponse = $ssoClient->getRoleCredentials([
 
-             'accessToken' => $accessToken,
 
-             'accountId' => $ssoProfile['sso_account_id'],
 
-             'roleName' => $ssoProfile['sso_role_name']
 
-         ]);
 
-         $ssoCredentials = $ssoResponse['roleCredentials'];
 
-         return $ssoCredentials;
 
-     }
 
- }
 
 
  |