base.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206
  1. package integration
  2. import (
  3. "github.com/aliyun/alibaba-cloud-sdk-go/services/ram"
  4. "github.com/aliyun/alibaba-cloud-sdk-go/services/sts"
  5. "fmt"
  6. "os"
  7. "strings"
  8. )
  9. var role_doc = `{
  10. "Statement": [{
  11. "Action": "sts:AssumeRole",
  12. "Effect": "Allow",
  13. "Principal": {
  14. "RAM": [
  15. "acs:ram::%s:root"
  16. ]
  17. }
  18. }],
  19. "Version": "1"
  20. }`
  21. var (
  22. travisValue = strings.Split(os.Getenv("TRAVIS_JOB_NUMBER"), ".")
  23. username = "test-go-user" + travisValue[len(travisValue)-1]
  24. rolename = "test-go-role" + travisValue[len(travisValue)-1]
  25. rolearn = fmt.Sprintf("acs:ram::%s:role/%s", os.Getenv("USER_ID"), rolename)
  26. )
  27. func createRole(userid string) (string, string, error) {
  28. listRequest := ram.CreateListRolesRequest()
  29. listRequest.Scheme = "HTTPS"
  30. client, err := ram.NewClientWithAccessKey(os.Getenv("REGION_ID"), os.Getenv("ACCESS_KEY_ID"), os.Getenv("ACCESS_KEY_SECRET"))
  31. if err != nil {
  32. return "", "", err
  33. }
  34. listResponse, err := client.ListRoles(listRequest)
  35. if err != nil {
  36. return "", "", err
  37. }
  38. for _, role := range listResponse.Roles.Role {
  39. if strings.ToLower(role.RoleName) == rolename {
  40. return role.RoleName, role.Arn, nil
  41. }
  42. }
  43. createRequest := ram.CreateCreateRoleRequest()
  44. createRequest.Scheme = "HTTPS"
  45. createRequest.RoleName = rolename
  46. createRequest.AssumeRolePolicyDocument = fmt.Sprintf(role_doc, userid)
  47. res, err := client.CreateRole(createRequest)
  48. if err != nil {
  49. return "", "", err
  50. }
  51. return res.Role.RoleName, res.Role.Arn, nil
  52. }
  53. func createUser() error {
  54. listRequest := ram.CreateListUsersRequest()
  55. listRequest.Scheme = "HTTPS"
  56. client, err := ram.NewClientWithAccessKey(os.Getenv("REGION_ID"), os.Getenv("ACCESS_KEY_ID"), os.Getenv("ACCESS_KEY_SECRET"))
  57. if err != nil {
  58. return err
  59. }
  60. listResponse, err := client.ListUsers(listRequest)
  61. if err != nil {
  62. return err
  63. }
  64. for _, user := range listResponse.Users.User {
  65. if user.UserName == username {
  66. return nil
  67. }
  68. }
  69. createRequest := ram.CreateCreateUserRequest()
  70. createRequest.Scheme = "HTTPS"
  71. createRequest.UserName = username
  72. _, err = client.CreateUser(createRequest)
  73. if err != nil {
  74. return err
  75. }
  76. return nil
  77. }
  78. func createAttachPolicyToUser() error {
  79. listRequest := ram.CreateListPoliciesForUserRequest()
  80. listRequest.UserName = username
  81. listRequest.Scheme = "HTTPS"
  82. client, err := ram.NewClientWithAccessKey(os.Getenv("REGION_ID"), os.Getenv("ACCESS_KEY_ID"), os.Getenv("ACCESS_KEY_SECRET"))
  83. if err != nil {
  84. return err
  85. }
  86. listResponse, err := client.ListPoliciesForUser(listRequest)
  87. if err != nil {
  88. return err
  89. }
  90. for _, policy := range listResponse.Policies.Policy {
  91. if policy.PolicyName == "AliyunSTSAssumeRoleAccess" {
  92. return nil
  93. }
  94. }
  95. createRequest := ram.CreateAttachPolicyToUserRequest()
  96. createRequest.Scheme = "HTTPS"
  97. createRequest.PolicyName = "AliyunSTSAssumeRoleAccess"
  98. createRequest.UserName = username
  99. createRequest.PolicyType = "System"
  100. _, err = client.AttachPolicyToUser(createRequest)
  101. if err != nil {
  102. return err
  103. }
  104. return nil
  105. }
  106. func createAttachPolicyToRole() error {
  107. listRequest := ram.CreateListPoliciesForRoleRequest()
  108. listRequest.RoleName = rolename
  109. listRequest.Scheme = "HTTPS"
  110. client, err := ram.NewClientWithAccessKey(os.Getenv("REGION_ID"), os.Getenv("ACCESS_KEY_ID"), os.Getenv("ACCESS_KEY_SECRET"))
  111. if err != nil {
  112. return err
  113. }
  114. listResponse, err := client.ListPoliciesForRole(listRequest)
  115. if err != nil {
  116. return err
  117. }
  118. for _, policy := range listResponse.Policies.Policy {
  119. if policy.PolicyName == "AdministratorAccess" {
  120. return nil
  121. }
  122. }
  123. createRequest := ram.CreateAttachPolicyToRoleRequest()
  124. createRequest.Scheme = "HTTPS"
  125. createRequest.PolicyName = "AdministratorAccess"
  126. createRequest.RoleName = rolename
  127. createRequest.PolicyType = "System"
  128. _, err = client.AttachPolicyToRole(createRequest)
  129. if err != nil {
  130. return err
  131. }
  132. return nil
  133. }
  134. func createAccessKey() (string, string, error) {
  135. client, err := ram.NewClientWithAccessKey(os.Getenv("REGION_ID"), os.Getenv("ACCESS_KEY_ID"), os.Getenv("ACCESS_KEY_SECRET"))
  136. if err != nil {
  137. return "", "", err
  138. }
  139. listrequest := ram.CreateListAccessKeysRequest()
  140. listrequest.UserName = username
  141. listrequest.Scheme = "HTTPS"
  142. listresponse, err := client.ListAccessKeys(listrequest)
  143. if err != nil {
  144. return "", "", err
  145. }
  146. if listresponse.AccessKeys.AccessKey != nil {
  147. if len(listresponse.AccessKeys.AccessKey) >= 2 {
  148. accesskey := listresponse.AccessKeys.AccessKey[0]
  149. deleterequest := ram.CreateDeleteAccessKeyRequest()
  150. deleterequest.UserAccessKeyId = accesskey.AccessKeyId
  151. deleterequest.UserName = username
  152. deleterequest.Scheme = "HTTPS"
  153. _, err := client.DeleteAccessKey(deleterequest)
  154. if err != nil {
  155. return "", "", err
  156. }
  157. }
  158. }
  159. request := ram.CreateCreateAccessKeyRequest()
  160. request.Scheme = "HTTPS"
  161. request.UserName = username
  162. response, err := client.CreateAccessKey(request)
  163. if err != nil {
  164. return "", "", err
  165. }
  166. return response.AccessKey.AccessKeyId, response.AccessKey.AccessKeySecret, nil
  167. }
  168. func createAssumeRole() (*sts.AssumeRoleResponse, error) {
  169. err := createUser()
  170. if err != nil {
  171. return nil, err
  172. }
  173. _, _, err = createRole(os.Getenv("USER_ID"))
  174. if err != nil {
  175. return nil, err
  176. }
  177. err = createAttachPolicyToUser()
  178. if err != nil {
  179. return nil, err
  180. }
  181. subaccesskeyid, subaccesskeysecret, err := createAccessKey()
  182. if err != nil {
  183. return nil, err
  184. }
  185. request := sts.CreateAssumeRoleRequest()
  186. request.RoleArn = rolearn
  187. request.RoleSessionName = "alice_test"
  188. request.Scheme = "HTTPS"
  189. client, err := sts.NewClientWithAccessKey(os.Getenv("REGION_ID"), subaccesskeyid, subaccesskeysecret)
  190. response, err := client.AssumeRole(request)
  191. if err != nil {
  192. return nil, err
  193. }
  194. return response, nil
  195. }