使用 Node.js 的 aws-sdk 包成功获取 AWS STS AssumeRole 的临时凭证,但使用 Golang 的 aws-sdk 获取相同凭证和角色 ARN 失败
来源:stackoverflow
时间:2024-02-06 08:21:25 376浏览 收藏
来到golang学习网的大家,相信都是编程学习爱好者,希望在这里学习Golang相关编程知识。下面本篇文章就来带大家聊聊《使用 Node.js 的 aws-sdk 包成功获取 AWS STS AssumeRole 的临时凭证,但使用 Golang 的 aws-sdk 获取相同凭证和角色 ARN 失败》,介绍一下,希望对大家的知识积累有所帮助,助力实战开发!
我有 golang 和 nodejs 代码来获取同一组凭据 accesskey、secretkey 和 rolearn 的临时凭据。 nodejs 代码给了我临时信用,而 go 代码给了我以下错误
操作错误 sts:assumerole,https 响应错误 statuscode:403,requestid:ebccfbf8-abed-4490-83ce-730d87d131,api 错误 accessdenied:用户:arn:aws:iam::
有人可以帮我解决这个问题吗?
下面是我的 go 代码的链接。
https://go.dev/play/p/txv2cttsitd
使用的软件包版本:
github.com/aws/aws-sdk-go-v2 v1.20.0 github.com/aws/aws-sdk-go-v2/config v1.18.29 github.com/aws/aws-sdk-go-v2 /service/sts v1.20.0
package main
import (
"context"
"errors"
"fmt"
"net/http"
"os"
"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/config"
"github.com/aws/aws-sdk-go-v2/credentials"
"github.com/aws/aws-sdk-go-v2/service/sts"
)
// awsprovider ...
type awsprovider struct{}
// newawsprovider ...
// var newawsprovider connection = &awsprovider{}
var (
defaultregion = "us-east-1"
defaultsessionname = "mcmp"
)
// connectionvalidation ...
type connectionvalidation struct {
connectionid string `json:"connectionid" bson:"connectionid"`
vaultconfigid string `json:"vaultconfigid,omitempty"`
provider provider `json:"provider,omitempty" bson:"provider"`
reference string `json:"reference,omitempty" bson:"reference"`
}
type provider struct {
type string `json:"type" bson:"type" validate:"required"`
configdata map[string]interface{} `json:"configdata,omitempty" bson:"configdata,omitempty"`
credentials []fields `json:"credentials,omitempty" bson:"credentials,omitempty"`
}
type fields struct {
key string `json:"key"`
value string `json:"value"`
}
// validate ...
func validate(connection *connectionvalidation) (err error) {
accesskey := "<accesskey>"
secretkey := "<secretkey>"
configdata := connection.provider.configdata
if configdata["delegatedaccess"] != nil {
delegatedaccess, ok := configdata["delegatedaccess"].(string)
if !ok || delegatedaccess == "" {
err = errors.new("invalid delegatedaccess")
return
}
err = validatedelegatedaccess(connection, accesskey, secretkey, delegatedaccess)
return
}
err = validateasset(accesskey, secretkey, defaultregion)
return
}
// checkandaddproxy ...
func checkandaddproxy(config aws.config) aws.config {
if os.getenv("https_proxy") != "" {
httpclient := &http.client{
transport: &http.transport{
proxy: http.proxyfromenvironment,
},
}
config.httpclient = httpclient
}
return config
}
func validatedelegatedaccess(connection *connectionvalidation, accesskey, secretkey, delegatedaccess string) (err error) {
config, err := config.loaddefaultconfig(context.todo(), config.withregion(defaultregion))
if err != nil {
panic("configuration error validatedelegatedaccess, " + err.error())
}
config = checkandaddproxy(config)
config.region = defaultregion
config.credentials = aws.newcredentialscache(credentials.newstaticcredentialsprovider(accesskey, secretkey, ""))
client := sts.newfromconfig(config)
params := &sts.assumeroleinput{
rolearn: &delegatedaccess,
rolesessionname: &defaultsessionname,
}
configdata := connection.provider.configdata
if configdata["externalid"] != nil {
externalid, ok := configdata["externalid"].(string)
if !ok || externalid == "" {
err = errors.new("invalid externalid")
return
}
params.externalid = &externalid
}
_, err = client.assumerole(context.todo(), params)
return
}
func validateasset(accesskey, secretkey, region string) (err error) {
config := *aws.newconfig()
config.region = defaultregion
config.credentials = aws.newcredentialscache(credentials.newstaticcredentialsprovider(accesskey, secretkey, ""))
config = checkandaddproxy(config)
client := sts.newfromconfig(config)
input := &sts.getcalleridentityinput{}
_, err = client.getcalleridentity(context.todo(), input)
if err != nil {
return err
}
return
}
func main() {
fmt.println("---validate aws creds---")
conn := connectionvalidation{
connectionid: "id",
provider: provider{type: "aws",
configdata: map[string]interface{}{"accountnumber": "<accountnumber>",
"delegatedaccess": "<arn>",
"externalid": "12345"},
},
}
err := validate(&conn)
if err != nil {
fmt.printf("\n --- error validate aws creds---%+v", err)
} else {
fmt.println("validate creds success")
}
}
这是 nodejs 代码
软件包版本:
"aws-sdk": "^2.1429.0"
var AWSClient = require('aws-sdk');
var proxy = require('proxy-agent');
var checkForProxy = function () {
if (process.env.https_proxy !== undefined) {
console.log("Configuring AWS client to use https proxy");
AWSClient.config.update({
httpOptions: { agent: proxy(process.env.https_proxy) }
});
}
}
async function getTempCredentials(result) {
console.log('-- Inside credential-validator-service/getTempCredentials... --');
try {
return new Promise(function (resolve, reject) {
if (result['delegatedAccess'] && result['accessKey'] && result['secretKey']) {
AWSClient.config.update({
accessKeyId: result['accessKey'],
secretAccessKey: result['secretKey'],
region:"us-east-1"
});
checkForProxy()
console.log("AWSClient config-----")
console.log(AWSClient.config)
var sts = new AWSClient.STS();
var params = {
RoleArn: result['delegatedAccess'],
RoleSessionName: "MCMP"
};
if (result['externalId']) {
console.log("Found externalId in payload, validating ARN with externalId")
params['ExternalId'] = result['externalId']
}
sts.assumeRole(params, function (err, result) {
if (err) {
console.log("Error occured " + JSON.stringify(err));
reject(err);
} else {
console.log("Temporary credential retrieved successfully");
resolve({
"message": "Delegated Credentials fetched successfully",
"delegatedcredentials": result['Credentials'],
"translateCode": "CO200_FETCH_SUCCESS",
"translateParameters": [],
"statusCode": 200
});
}
});
} else {
reject({
"message": "Required credential details not found to fetch role, please provide arn, accessKey and secretKey",
"translateCode": "CO400_FETCH_FAIL",
"translateParameters": [],
"statusCode": 400
});
}
});
} catch (error) {
console.log.error("error while calling assume role of aws : " + JSON.stringify(error));
return {
"message": "System Failure. Due to: " + error.message,
"translateCode": "CO500_ERR",
"translateParameters": [error.message],
"statusCode": 500
}
}
}
const checkDelegateAndUpdate = (body, callback) => {
if (body.credentials.delegatedAccess) {
const payload = {
accessKey: body.credentials.passwordFields.accessKey,
secretKey: body.credentials.passwordFields.secretKey,
delegatedAccess: body.credentials.delegatedAccess,
externalId: body.credentials.externalId
};
getTempCredentials(payload).then(({
delegatedcredentials
}) => {
AWSClient.config.update({
accessKeyId: delegatedcredentials.AccessKeyId,
secretAccessKey: delegatedcredentials.SecretAccessKey,
sessionToken: delegatedcredentials.SessionToken
});
callback(null, "Success");
}).catch(err => {
console.log("Error occured while fetching temporary credentials ", err.message);
callback(err);
});
} else {
AWSClient.config.update({
accessKeyId: body.credentials.passwordFields.accessKey,
secretAccessKey: body.credentials.passwordFields.secretKey
});
callback(null, "Success");
}
}
var testAccount = function (asset_payload, callback) {
if (!asset_payload.credentials.passwordFields.accessKey ||
!asset_payload.credentials.passwordFields.secretKey) {
return callback(Error, null);
} else {
checkDelegateAndUpdate(asset_payload, (err, _res) => {
if (err) {
return callback(err, null);
} else {
AWSClient.config.update({
accessKeyId: asset_payload.credentials.passwordFields.accessKey,
secretAccessKey: asset_payload.credentials.passwordFields.secretKey
});
checkForProxy()
var sts = new AWSClient.STS();
sts.getCallerIdentity({}, function (err, response) {
if (err) {
return callback(err, null);
} else {
return callback(null, response);
}
});
}
});
}
};
var requestPayload = {
"basicInfo": {
"accountName": "camaws",
"serviceProviderType": "aws",
"serviceProviderCode": "aws",
"isActive": "Active",
"accountType": "subaccount",
"userType": "asset"
},
"advancedInfo": {
"accountNumber": "<accountumber>"
},
"credentials": {
"credentialName": "awscred",
"purpose": ["assetIngestion"],
"status": true,
"externalId": "12345",
"delegatedAccess": "<ARN>",
"passwordFields": {
"accessKey": "<accessKey>",
"secretKey": "<secretKey>",
"additionalInfo": ""
}
}
}
testAccount(requestPayload, function (err, result) {
if (err) {
console.log(err)
}else{
console.log("success*********")
console.log(result)
}
});正确答案
访问被拒绝意味着访问被拒绝。 因此,您的 IAM 策略可能不允许您担任该角色。 检查 sts 假设调用的参数。 可以在这里找到 go 承担角色的工作示例:https://www.go-on-aws.com/aws-go-sdk-v2/sts/crossaccount/ 出于安全原因,请确保永远不要将访问密钥和访问秘密直接放入代码中。
今天关于《使用 Node.js 的 aws-sdk 包成功获取 AWS STS AssumeRole 的临时凭证,但使用 Golang 的 aws-sdk 获取相同凭证和角色 ARN 失败》的内容介绍就到此结束,如果有什么疑问或者建议,可以在golang学习网公众号下多多回复交流;文中若有不正之处,也希望回复留言以告知!
-
502 收藏
-
502 收藏
-
501 收藏
-
501 收藏
-
501 收藏
-
139 收藏
-
204 收藏
-
325 收藏
-
478 收藏
-
486 收藏
-
439 收藏
-
357 收藏
-
352 收藏
-
101 收藏
-
440 收藏
-
212 收藏
-
143 收藏
-
- 前端进阶之JavaScript设计模式
- 设计模式是开发人员在软件开发过程中面临一般问题时的解决方案,代表了最佳的实践。本课程的主打内容包括JS常见设计模式以及具体应用场景,打造一站式知识长龙服务,适合有JS基础的同学学习。
- 立即学习 543次学习
-
- GO语言核心编程课程
- 本课程采用真实案例,全面具体可落地,从理论到实践,一步一步将GO核心编程技术、编程思想、底层实现融会贯通,使学习者贴近时代脉搏,做IT互联网时代的弄潮儿。
- 立即学习 516次学习
-
- 简单聊聊mysql8与网络通信
- 如有问题加微信:Le-studyg;在课程中,我们将首先介绍MySQL8的新特性,包括性能优化、安全增强、新数据类型等,帮助学生快速熟悉MySQL8的最新功能。接着,我们将深入解析MySQL的网络通信机制,包括协议、连接管理、数据传输等,让
- 立即学习 500次学习
-
- JavaScript正则表达式基础与实战
- 在任何一门编程语言中,正则表达式,都是一项重要的知识,它提供了高效的字符串匹配与捕获机制,可以极大的简化程序设计。
- 立即学习 487次学习
-
- 从零制作响应式网站—Grid布局
- 本系列教程将展示从零制作一个假想的网络科技公司官网,分为导航,轮播,关于我们,成功案例,服务流程,团队介绍,数据部分,公司动态,底部信息等内容区块。网站整体采用CSSGrid布局,支持响应式,有流畅过渡和展现动画。
- 立即学习 485次学习