mirror of
https://github.com/Luzifer/cloudkeys-go.git
synced 2024-11-14 17:02:43 +00:00
71 lines
2.4 KiB
Go
71 lines
2.4 KiB
Go
|
package rdsutils
|
||
|
|
||
|
import (
|
||
|
"net/http"
|
||
|
"strings"
|
||
|
"time"
|
||
|
|
||
|
"github.com/aws/aws-sdk-go/aws/credentials"
|
||
|
"github.com/aws/aws-sdk-go/aws/signer/v4"
|
||
|
)
|
||
|
|
||
|
// BuildAuthToken will return a authentication token for the database's connect
|
||
|
// based on the RDS database endpoint, AWS region, IAM user or role, and AWS credentials.
|
||
|
//
|
||
|
// Endpoint consists of the hostname and port, IE hostname:port, of the RDS database.
|
||
|
// Region is the AWS region the RDS database is in and where the authentication token
|
||
|
// will be generated for. DbUser is the IAM user or role the request will be authenticated
|
||
|
// for. The creds is the AWS credentials the authentication token is signed with.
|
||
|
//
|
||
|
// An error is returned if the authentication token is unable to be signed with
|
||
|
// the credentials, or the endpoint is not a valid URL.
|
||
|
//
|
||
|
// The following example shows how to use BuildAuthToken to create an authentication
|
||
|
// token for connecting to a MySQL database in RDS.
|
||
|
//
|
||
|
// authToken, err := BuildAuthToken(dbEndpoint, awsRegion, dbUser, awsCreds)
|
||
|
//
|
||
|
// // Create the MySQL DNS string for the DB connection
|
||
|
// // user:password@protocol(endpoint)/dbname?<params>
|
||
|
// dnsStr = fmt.Sprintf("%s:%s@tcp(%s)/%s?tls=true",
|
||
|
// dbUser, authToken, dbEndpoint, dbName,
|
||
|
// )
|
||
|
//
|
||
|
// // Use db to perform SQL operations on database
|
||
|
// db, err := sql.Open("mysql", dnsStr)
|
||
|
//
|
||
|
// See http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.IAMDBAuth.html
|
||
|
// for more information on using IAM database authentication with RDS.
|
||
|
func BuildAuthToken(endpoint, region, dbUser string, creds *credentials.Credentials) (string, error) {
|
||
|
// the scheme is arbitrary and is only needed because validation of the URL requires one.
|
||
|
if !(strings.HasPrefix(endpoint, "http://") || strings.HasPrefix(endpoint, "https://")) {
|
||
|
endpoint = "https://" + endpoint
|
||
|
}
|
||
|
|
||
|
req, err := http.NewRequest("GET", endpoint, nil)
|
||
|
if err != nil {
|
||
|
return "", err
|
||
|
}
|
||
|
values := req.URL.Query()
|
||
|
values.Set("Action", "connect")
|
||
|
values.Set("DBUser", dbUser)
|
||
|
req.URL.RawQuery = values.Encode()
|
||
|
|
||
|
signer := v4.Signer{
|
||
|
Credentials: creds,
|
||
|
}
|
||
|
_, err = signer.Presign(req, nil, "rds-db", region, 15*time.Minute, time.Now())
|
||
|
if err != nil {
|
||
|
return "", err
|
||
|
}
|
||
|
|
||
|
url := req.URL.String()
|
||
|
if strings.HasPrefix(url, "http://") {
|
||
|
url = url[len("http://"):]
|
||
|
} else if strings.HasPrefix(url, "https://") {
|
||
|
url = url[len("https://"):]
|
||
|
}
|
||
|
|
||
|
return url, nil
|
||
|
}
|