Skip to content

Commit

Permalink
aws: Use new STS endpoint to validate creds (#6536)
Browse files Browse the repository at this point in the history
  • Loading branch information
radeksimko authored Jun 20, 2016
1 parent a2dcb44 commit 6fed5eb
Showing 1 changed file with 3 additions and 19 deletions.
22 changes: 3 additions & 19 deletions builtin/providers/aws/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -182,7 +182,7 @@ func (c *Config) Client() (interface{}, error) {
log.Println("[INFO] Initializing STS connection")
client.stsconn = sts.New(sess)

err = c.ValidateCredentials(client.iamconn)
err = c.ValidateCredentials(client.stsconn)
if err != nil {
errs = append(errs, err)
return nil, &multierror.Error{Errors: errs}
Expand Down Expand Up @@ -336,24 +336,8 @@ func (c *Config) ValidateRegion() error {
}

// Validate credentials early and fail before we do any graph walking.
// In the case of an IAM role/profile with insuffecient privileges, fail
// silently
func (c *Config) ValidateCredentials(iamconn *iam.IAM) error {
_, err := iamconn.GetUser(nil)

if awsErr, ok := err.(awserr.Error); ok {
if awsErr.Code() == "AccessDenied" || awsErr.Code() == "ValidationError" {
log.Printf("[WARN] AccessDenied Error with iam.GetUser, assuming IAM role")
// User may be an IAM instance profile, or otherwise IAM role without the
// GetUser permissions, so fail silently
return nil
}

if awsErr.Code() == "SignatureDoesNotMatch" {
return fmt.Errorf("Failed authenticating with AWS: please verify credentials")
}
}

func (c *Config) ValidateCredentials(stsconn *sts.STS) error {
_, err := stsconn.GetCallerIdentity(&sts.GetCallerIdentityInput{})
return err
}

Expand Down

0 comments on commit 6fed5eb

Please sign in to comment.