All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.netflix.dynomitemanager.dualAccount.AwsRoleAssumptionCredential Maven / Gradle / Ivy

There is a newer version: 2.0.36
Show newest version
package com.netflix.dynomitemanager.dualAccount;


import com.amazonaws.auth.AWSCredentialsProvider;
import com.amazonaws.auth.STSAssumeRoleSessionCredentialsProvider;
import com.google.inject.Inject;
import com.netflix.nfsidecar.aws.ICredential;
import com.netflix.nfsidecar.config.AWSCommonConfig;
import com.netflix.nfsidecar.identity.InstanceEnvIdentity;

public class AwsRoleAssumptionCredential implements ICredential {
    private static final String AWS_ROLE_ASSUMPTION_SESSION_NAME = "AwsRoleAssumptionSession";
    private ICredential cred;
    private InstanceEnvIdentity insEnvIdentity;
    private AWSCredentialsProvider stsSessionCredentialsProvider;
    private AWSCommonConfig config;

    @Inject
    public AwsRoleAssumptionCredential(ICredential cred, AWSCommonConfig config, InstanceEnvIdentity insEnvIdentity) {
        this.cred = cred;
        this.config = config;
        this.insEnvIdentity = insEnvIdentity;
    }

    @Override
    public AWSCredentialsProvider getAwsCredentialProvider() {
        if (this.stsSessionCredentialsProvider == null) {
            synchronized (this) {
                if (this.config.isDualAccount() || this.stsSessionCredentialsProvider == null) {

                    String roleArn = null;
                    /**
                     * Create the assumed IAM role based on the environment. For
                     * example, if the current environment is VPC, then the
                     * assumed role is for EC2 classic, and vice versa.
                     */
                    if (this.insEnvIdentity.isClassic()) {
                        roleArn = this.config.getVpcAWSRoleAssumptionArn(); // Env
                                                                            // is
                                                                            // EC2
                                                                            // classic
                                                                            // -->
                                                                            // IAM
                                                                            // assumed
                                                                            // role
                                                                            // for
                                                                            // VPC
                                                                            // created
                    } else {
                        roleArn = this.config.getClassicAWSRoleAssumptionArn(); // Env
                                                                                // is
                                                                                // VPC
                                                                                // -->
                                                                                // IAM
                                                                                // assumed
                                                                                // role
                                                                                // for
                                                                                // EC2
                                                                                // classic
                                                                                // created
                    }

                    //
                    if (roleArn == null || roleArn.isEmpty())
                        throw new NullPointerException(
                                "Role ARN is null or empty probably due to missing config entry");

                    /**
                     * Get handle to an implementation that uses AWS Security
                     * Token Service (STS) to create temporary, short-lived
                     * session with explicit refresh for session/token
                     * expiration.
                     */
                    try {
                        this.stsSessionCredentialsProvider = new STSAssumeRoleSessionCredentialsProvider(
                                this.cred.getAwsCredentialProvider(), roleArn, AWS_ROLE_ASSUMPTION_SESSION_NAME);

                    } catch (Exception ex) {
                        throw new IllegalStateException(
                                "Exception in getting handle to AWS Security Token Service (STS).  Msg: "
                                        + ex.getLocalizedMessage(),
                                ex);
                    }

                }

            }
        }

        return this.stsSessionCredentialsProvider;

    }
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy