| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205 | 
							- /*
 
-    Copyright 2020 Docker, Inc.
 
-    Licensed under the Apache License, Version 2.0 (the "License");
 
-    you may not use this file except in compliance with the License.
 
-    You may obtain a copy of the License at
 
-        http://www.apache.org/licenses/LICENSE-2.0
 
-    Unless required by applicable law or agreed to in writing, software
 
-    distributed under the License is distributed on an "AS IS" BASIS,
 
-    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 
-    See the License for the specific language governing permissions and
 
-    limitations under the License.
 
- */
 
- package ecs
 
- import (
 
- 	"context"
 
- 	"fmt"
 
- 	"os"
 
- 	"reflect"
 
- 	"strings"
 
- 	"github.com/AlecAivazis/survey/v2/terminal"
 
- 	"github.com/aws/aws-sdk-go/aws/awserr"
 
- 	"github.com/aws/aws-sdk-go/aws/credentials"
 
- 	"github.com/aws/aws-sdk-go/aws/defaults"
 
- 	"gopkg.in/ini.v1"
 
- 	"github.com/docker/compose-cli/context/store"
 
- 	"github.com/docker/compose-cli/prompt"
 
- )
 
- type contextCreateAWSHelper struct {
 
- 	user prompt.UI
 
- }
 
- func newContextCreateHelper() contextCreateAWSHelper {
 
- 	return contextCreateAWSHelper{
 
- 		user: prompt.User{},
 
- 	}
 
- }
 
- func (h contextCreateAWSHelper) createContextData(_ context.Context, opts ContextParams) (interface{}, string, error) {
 
- 	accessKey := opts.AwsID
 
- 	secretKey := opts.AwsSecret
 
- 	ecsCtx := store.EcsContext{
 
- 		Profile: opts.Profile,
 
- 		Region:  opts.Region,
 
- 	}
 
- 	if h.missingRequiredFlags(ecsCtx) {
 
- 		profilesList, err := h.getProfiles()
 
- 		if err != nil {
 
- 			return nil, "", err
 
- 		}
 
- 		// get profile
 
- 		_, ok := profilesList[ecsCtx.Profile]
 
- 		if !ok {
 
- 			profile, err := h.chooseProfile(profilesList)
 
- 			if err != nil {
 
- 				return nil, "", err
 
- 			}
 
- 			ecsCtx.Profile = profile
 
- 		}
 
- 		// set region
 
- 		region, err := h.chooseRegion(ecsCtx.Region, profilesList[ecsCtx.Profile])
 
- 		if err != nil {
 
- 			return nil, "", err
 
- 		}
 
- 		ecsCtx.Region = region
 
- 		accessKey, secretKey, err = h.askCredentials()
 
- 		if err != nil {
 
- 			return nil, "", err
 
- 		}
 
- 	}
 
- 	if accessKey != "" && secretKey != "" {
 
- 		if err := h.saveCredentials(ecsCtx.Profile, accessKey, secretKey); err != nil {
 
- 			return nil, "", err
 
- 		}
 
- 	}
 
- 	description := ecsCtx.Region
 
- 	if opts.Description != "" {
 
- 		description = fmt.Sprintf("%s (%s)", opts.Description, description)
 
- 	}
 
- 	return ecsCtx, description, nil
 
- }
 
- func (h contextCreateAWSHelper) missingRequiredFlags(ctx store.EcsContext) bool {
 
- 	if ctx.Profile == "" || ctx.Region == "" {
 
- 		return true
 
- 	}
 
- 	return false
 
- }
 
- func (h contextCreateAWSHelper) saveCredentials(profile string, accessKeyID string, secretAccessKey string) error {
 
- 	p := credentials.SharedCredentialsProvider{Profile: profile}
 
- 	_, err := p.Retrieve()
 
- 	if err == nil {
 
- 		return fmt.Errorf("credentials already exist")
 
- 	}
 
- 	if err.(awserr.Error).Code() == "SharedCredsLoad" && err.(awserr.Error).Message() == "failed to load shared credentials file" {
 
- 		_, err := os.Create(p.Filename)
 
- 		if err != nil {
 
- 			return err
 
- 		}
 
- 	}
 
- 	credIni, err := ini.Load(p.Filename)
 
- 	if err != nil {
 
- 		return err
 
- 	}
 
- 	section, err := credIni.NewSection(profile)
 
- 	if err != nil {
 
- 		return err
 
- 	}
 
- 	_, err = section.NewKey("aws_access_key_id", accessKeyID)
 
- 	if err != nil {
 
- 		return err
 
- 	}
 
- 	_, err = section.NewKey("aws_secret_access_key", secretAccessKey)
 
- 	if err != nil {
 
- 		return err
 
- 	}
 
- 	return credIni.SaveTo(p.Filename)
 
- }
 
- func (h contextCreateAWSHelper) getProfiles() (map[string]ini.Section, error) {
 
- 	profiles := map[string]ini.Section{"new profile": {}}
 
- 	credIni, err := ini.Load(defaults.SharedConfigFilename())
 
- 	if err != nil {
 
- 		return nil, err
 
- 	}
 
- 	for _, section := range credIni.Sections() {
 
- 		if strings.HasPrefix(section.Name(), "profile") {
 
- 			profiles[section.Name()[len("profile "):]] = *section
 
- 		}
 
- 	}
 
- 	return profiles, nil
 
- }
 
- func (h contextCreateAWSHelper) chooseProfile(section map[string]ini.Section) (string, error) {
 
- 	keys := reflect.ValueOf(section).MapKeys()
 
- 	profiles := make([]string, len(keys))
 
- 	for i := 0; i < len(keys); i++ {
 
- 		profiles[i] = keys[i].String()
 
- 	}
 
- 	selected, err := h.user.Select("Select AWS Profile", profiles)
 
- 	if err != nil {
 
- 		if err == terminal.InterruptErr {
 
- 			os.Exit(-1)
 
- 		}
 
- 		return "", err
 
- 	}
 
- 	profile := profiles[selected]
 
- 	if profiles[selected] == "new profile" {
 
- 		return h.user.Input("profile name", "")
 
- 	}
 
- 	return profile, nil
 
- }
 
- func (h contextCreateAWSHelper) chooseRegion(region string, section ini.Section) (string, error) {
 
- 	defaultRegion := region
 
- 	if defaultRegion == "" && section.Name() != "" {
 
- 		reg, err := section.GetKey("region")
 
- 		if err == nil {
 
- 			defaultRegion = reg.Value()
 
- 		}
 
- 	}
 
- 	result, err := h.user.Input("Region", defaultRegion)
 
- 	if err != nil {
 
- 		return "", err
 
- 	}
 
- 	return result, nil
 
- }
 
- func (h contextCreateAWSHelper) askCredentials() (string, string, error) {
 
- 	confirm, err := h.user.Confirm("Enter credentials", false)
 
- 	if err != nil {
 
- 		return "", "", err
 
- 	}
 
- 	if confirm {
 
- 		accessKeyID, err := h.user.Input("AWS Access Key ID", "")
 
- 		if err != nil {
 
- 			return "", "", err
 
- 		}
 
- 		secretAccessKey, err := h.user.Password("Enter AWS Secret Access Key")
 
- 		if err != nil {
 
- 			return "", "", err
 
- 		}
 
- 		// validate password
 
- 		if len(secretAccessKey) < 3 {
 
- 			return "", "", fmt.Errorf("AWS Secret Access Key must have more than 3 characters")
 
- 		}
 
- 		return accessKeyID, secretAccessKey, nil
 
- 	}
 
- 	return "", "", nil
 
- }
 
 
  |