Vendor aws-sdk-go (dep ensure) (#178)
This commit is contained in:
70
vendor/github.com/aws/aws-sdk-go/service/rds/rdsutils/connect.go
generated
vendored
Normal file
70
vendor/github.com/aws/aws-sdk-go/service/rds/rdsutils/connect.go
generated
vendored
Normal file
@@ -0,0 +1,70 @@
|
||||
package rdsutils
|
||||
|
||||
import (
|
||||
"net/http"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/aws/aws-sdk-go/aws/credentials"
|
||||
"github.com/aws/aws-sdk-go/aws/signer/v4"
|
||||
)
|
||||
|
||||
// BuildAuthToken will return a authentication token for the database's connect
|
||||
// based on the RDS database endpoint, AWS region, IAM user or role, and AWS credentials.
|
||||
//
|
||||
// Endpoint consists of the hostname and port, IE hostname:port, of the RDS database.
|
||||
// Region is the AWS region the RDS database is in and where the authentication token
|
||||
// will be generated for. DbUser is the IAM user or role the request will be authenticated
|
||||
// for. The creds is the AWS credentials the authentication token is signed with.
|
||||
//
|
||||
// An error is returned if the authentication token is unable to be signed with
|
||||
// the credentials, or the endpoint is not a valid URL.
|
||||
//
|
||||
// The following example shows how to use BuildAuthToken to create an authentication
|
||||
// token for connecting to a MySQL database in RDS.
|
||||
//
|
||||
// authToken, err := BuildAuthToken(dbEndpoint, awsRegion, dbUser, awsCreds)
|
||||
//
|
||||
// // Create the MySQL DNS string for the DB connection
|
||||
// // user:password@protocol(endpoint)/dbname?<params>
|
||||
// dnsStr = fmt.Sprintf("%s:%s@tcp(%s)/%s?tls=true",
|
||||
// dbUser, authToken, dbEndpoint, dbName,
|
||||
// )
|
||||
//
|
||||
// // Use db to perform SQL operations on database
|
||||
// db, err := sql.Open("mysql", dnsStr)
|
||||
//
|
||||
// See http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.IAMDBAuth.html
|
||||
// for more information on using IAM database authentication with RDS.
|
||||
func BuildAuthToken(endpoint, region, dbUser string, creds *credentials.Credentials) (string, error) {
|
||||
// the scheme is arbitrary and is only needed because validation of the URL requires one.
|
||||
if !(strings.HasPrefix(endpoint, "http://") || strings.HasPrefix(endpoint, "https://")) {
|
||||
endpoint = "https://" + endpoint
|
||||
}
|
||||
|
||||
req, err := http.NewRequest("GET", endpoint, nil)
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
values := req.URL.Query()
|
||||
values.Set("Action", "connect")
|
||||
values.Set("DBUser", dbUser)
|
||||
req.URL.RawQuery = values.Encode()
|
||||
|
||||
signer := v4.Signer{
|
||||
Credentials: creds,
|
||||
}
|
||||
_, err = signer.Presign(req, nil, "rds-db", region, 15*time.Minute, time.Now())
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
|
||||
url := req.URL.String()
|
||||
if strings.HasPrefix(url, "http://") {
|
||||
url = url[len("http://"):]
|
||||
} else if strings.HasPrefix(url, "https://") {
|
||||
url = url[len("https://"):]
|
||||
}
|
||||
|
||||
return url, nil
|
||||
}
|
||||
Reference in New Issue
Block a user