aws.plugin.zsh 6.81 KB
Newer Older
1
function agp() {
2
  echo $AWS_PROFILE
3
}
4

5
# AWS profile selection
6
function asp() {
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
  if [[ -z "$1" ]]; then
    unset AWS_DEFAULT_PROFILE AWS_PROFILE AWS_EB_PROFILE
    echo AWS profile cleared.
    return
  fi

  local -a available_profiles
  available_profiles=($(aws_profiles))
  if [[ -z "${available_profiles[(r)$1]}" ]]; then
    echo "${fg[red]}Profile '$1' not found in '${AWS_CONFIG_FILE:-$HOME/.aws/config}'" >&2
    echo "Available profiles: ${(j:, :)available_profiles:-no profiles found}${reset_color}" >&2
    return 1
  fi

  export AWS_DEFAULT_PROFILE=$1
  export AWS_PROFILE=$1
  export AWS_EB_PROFILE=$1
}

# AWS profile switch
function acp() {
David Kane's avatar
David Kane committed
28
  if [[ -z "$1" ]]; then
29
30
    unset AWS_DEFAULT_PROFILE AWS_PROFILE AWS_EB_PROFILE
    unset AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY AWS_SESSION_TOKEN
David Kane's avatar
David Kane committed
31
    echo AWS profile cleared.
32
    return
David Kane's avatar
David Kane committed
33
  fi
34

35
36
  local -a available_profiles
  available_profiles=($(aws_profiles))
37
38
39
40
41
42
  if [[ -z "${available_profiles[(r)$1]}" ]]; then
    echo "${fg[red]}Profile '$1' not found in '${AWS_CONFIG_FILE:-$HOME/.aws/config}'" >&2
    echo "Available profiles: ${(j:, :)available_profiles:-no profiles found}${reset_color}" >&2
    return 1
  fi

43
44
45
46
47
48
49
  local profile="$1"

  # Get fallback credentials for if the aws command fails or no command is run
  local aws_access_key_id="$(aws configure get aws_access_key_id --profile $profile)"
  local aws_secret_access_key="$(aws configure get aws_secret_access_key --profile $profile)"
  local aws_session_token="$(aws configure get aws_session_token --profile $profile)"

50
51

  # First, if the profile has MFA configured, lets get the token and session duration
52
  local mfa_serial="$(aws configure get mfa_serial --profile $profile)"
53

54
55
56
57
  if [[ -n "$mfa_serial" ]]; then
    local -a mfa_opt
    local mfa_token sess_duration
    echo -n "Please enter your MFA token for $mfa_serial: "
58
    read -r mfa_token
59
    echo -n "Please enter the session duration in seconds (900-43200; default: 3600, which is the default maximum for a role): "
60
    read -r sess_duration
61
    mfa_opt=(--serial-number "$mfa_serial" --token-code "$mfa_token" --duration-seconds "${sess_duration:-3600}")
62

63
64
    # Now see whether we need to just MFA for the current role, or assume a different one
    local role_arn="$(aws configure get role_arn --profile $profile)"
65

66
67
68
69
70
71
72
73
74
75
76
77
78
    if [[ -n "$role_arn" ]]; then
      # Means we need to assume a specified role
      aws_command=(aws sts assume-role --role-arn "$role_arn" "${mfa_opt[@]}")

      # Check whether external_id is configured to use while assuming the role
      local external_id="$(aws configure get external_id --profile "$profile")"
      if [[ -n "$external_id" ]]; then
        aws_command+=(--external-id "$external_id")
      fi

      # Get source profile to use to assume role
      local source_profile="$(aws configure get source_profile --profile "$profile")"
      aws_command+=(--profile="${source_profile:-profile}" --role-session-name "${source_profile:-profile}")
79

80
81
82
83
84
      echo "Assuming role $role_arn using profile ${source_profile:-profile}"
    else
      # Means we only need to do MFA
      aws_command=(aws sts get-session-token --profile="$profile" "${mfa_opt[@]}")
      echo "Obtaining session token for profile $profile"
85
86
    fi

87
88
    # Format output of aws command for easier processing
    aws_command+=(--query '[Credentials.AccessKeyId,Credentials.SecretAccessKey,Credentials.SessionToken]' --output text)
89

90
91
92
93
94
95
96
97
98
    # Run the aws command to obtain credentials
    local -a credentials
    credentials=(${(ps:\t:)"$(${aws_command[@]})"})

    if [[ -n "$credentials" ]]; then
      aws_access_key_id="${credentials[1]}"
      aws_secret_access_key="${credentials[2]}"
      aws_session_token="${credentials[3]}"
    fi
99
100
  fi

101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
  # Switch to AWS profile
  if [[ -n "${aws_access_key_id}" && -n "$aws_secret_access_key" ]]; then
    export AWS_DEFAULT_PROFILE="$profile"
    export AWS_PROFILE="$profile"
    export AWS_EB_PROFILE="$profile"
    export AWS_ACCESS_KEY_ID="$aws_access_key_id"
    export AWS_SECRET_ACCESS_KEY="$aws_secret_access_key"

    if [[ -n "$aws_session_token" ]]; then
      export AWS_SESSION_TOKEN="$aws_session_token"
    else
      unset AWS_SESSION_TOKEN
    fi

    echo "Switched to AWS Profile: $profile"
116
  fi
117
}
118

119
function aws_change_access_key() {
120
  if [[ -z "$1" ]]; then
121
    echo "usage: $0 <profile>"
122
123
    return 1
  fi
124
125

  echo Insert the credentials when asked.
126
  asp "$1" || return 1
127
128
  AWS_PAGER="" aws iam create-access-key
  AWS_PAGER="" aws configure --profile "$1"
129
130
131

  echo You can now safely delete the old access key running \`aws iam delete-access-key --access-key-id ID\`
  echo Your current keys are:
132
  AWS_PAGER="" aws iam list-access-keys
133
134
}

135
function aws_profiles() {
136
  [[ -r "${AWS_CONFIG_FILE:-$HOME/.aws/config}" ]] || return 1
137
  grep --color=never -Eo '\[.*\]' "${AWS_CONFIG_FILE:-$HOME/.aws/config}" | sed -E 's/^[[:space:]]*\[(profile)?[[:space:]]*([-_[:alnum:]\.@]+)\][[:space:]]*$/\2/g'
138
}
139

140
function _aws_profiles() {
141
142
  reply=($(aws_profiles))
}
143
compctl -K _aws_profiles asp acp aws_change_access_key
144

David Kane's avatar
David Kane committed
145
# AWS prompt
146
function aws_prompt_info() {
David Kane's avatar
David Kane committed
147
148
149
150
  [[ -z $AWS_PROFILE ]] && return
  echo "${ZSH_THEME_AWS_PREFIX:=<aws:}${AWS_PROFILE}${ZSH_THEME_AWS_SUFFIX:=>}"
}

151
if [[ "$SHOW_AWS_PROMPT" != false && "$RPROMPT" != *'$(aws_prompt_info)'* ]]; then
152
  RPROMPT='$(aws_prompt_info)'"$RPROMPT"
David Kane's avatar
David Kane committed
153
154
155
fi


156
157
# Load awscli completions

158
# AWS CLI v2 comes with its own autocompletion. Check if that is there, otherwise fall back
159
if command -v aws_completer &> /dev/null; then
160
  autoload -Uz bashcompinit && bashcompinit
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
  complete -C aws_completer aws
else
  function _awscli-homebrew-installed() {
    # check if Homebrew is installed
    (( $+commands[brew] )) || return 1

    # speculatively check default brew prefix
    if [ -h /usr/local/opt/awscli ]; then
      _brew_prefix=/usr/local/opt/awscli
    else
      # ok, it is not in the default prefix
      # this call to brew is expensive (about 400 ms), so at least let's make it only once
      _brew_prefix=$(brew --prefix awscli)
    fi
  }

  # get aws_zsh_completer.sh location from $PATH
  _aws_zsh_completer_path="$commands[aws_zsh_completer.sh]"

  # otherwise check common locations
  if [[ -z $_aws_zsh_completer_path ]]; then
    # Homebrew
    if _awscli-homebrew-installed; then
      _aws_zsh_completer_path=$_brew_prefix/libexec/bin/aws_zsh_completer.sh
    # Ubuntu
    elif [[ -e /usr/share/zsh/vendor-completions/_awscli ]]; then
      _aws_zsh_completer_path=/usr/share/zsh/vendor-completions/_awscli
188
189
190
    # NixOS
    elif [[ -e "${commands[aws]:P:h:h}/share/zsh/site-functions/aws_zsh_completer.sh" ]]; then
      _aws_zsh_completer_path="${commands[aws]:P:h:h}/share/zsh/site-functions/aws_zsh_completer.sh"
191
192
193
194
    # RPM
    else
      _aws_zsh_completer_path=/usr/share/zsh/site-functions/aws_zsh_completer.sh
    fi
195
196
  fi

197
198
  [[ -r $_aws_zsh_completer_path ]] && source $_aws_zsh_completer_path
  unset _aws_zsh_completer_path _brew_prefix
199
fi