Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 16 additions & 0 deletions documentation/provider/route53.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,22 @@ Example:
```
{% endcode %}

Alternatively, this provider also supports `RoleArn` with an optional `ExternalId`

Example:

{% code title="creds.json" %}
```json
{
"r53_main": {
"TYPE": "ROUTE53",
"RoleArn": "arn:aws:iam::123456789012:role/ExampleRole",
"ExternalId": "123456789012"
}
}
```
{% endcode %}

You can find some other ways to authenticate to Route53 in the [go sdk configuration](https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html).

## Metadata
Expand Down
1 change: 1 addition & 0 deletions go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,7 @@ require (
require (
github.com/Azure/azure-sdk-for-go/sdk/azcore v1.19.1
github.com/G-Core/gcore-dns-sdk-go v0.3.3
github.com/aws/aws-sdk-go-v2/service/sts v1.38.6
github.com/centralnicgroup-opensource/rtldev-middleware-go-sdk/v5 v5.0.18
github.com/containrrr/shoutrrr v0.8.0
github.com/failsafe-go/failsafe-go v0.9.1
Expand Down
18 changes: 17 additions & 1 deletion providers/route53/route53Provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,10 +20,12 @@ import (
"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/config"
"github.com/aws/aws-sdk-go-v2/credentials"
"github.com/aws/aws-sdk-go-v2/credentials/stscreds"
r53 "github.com/aws/aws-sdk-go-v2/service/route53"
r53Types "github.com/aws/aws-sdk-go-v2/service/route53/types"
r53d "github.com/aws/aws-sdk-go-v2/service/route53domains"
r53dTypes "github.com/aws/aws-sdk-go-v2/service/route53domains/types"
"github.com/aws/aws-sdk-go-v2/service/sts"
)

type route53Provider struct {
Expand All @@ -50,7 +52,7 @@ func newRoute53(m map[string]string, _ json.RawMessage) (*route53Provider, error
config.WithRegion("us-east-1"),
}

keyID, secretKey, tokenID := m["KeyId"], m["SecretKey"], m["Token"]
keyID, secretKey, tokenID, roleArn, externalId := m["KeyId"], m["SecretKey"], m["Token"], m["RoleArn"], m["ExternalId"]
// Token is optional and left empty unless required
if keyID != "" || secretKey != "" {
optFns = append(optFns, config.WithCredentialsProvider(credentials.NewStaticCredentialsProvider(keyID, secretKey, tokenID)))
Expand All @@ -61,6 +63,20 @@ func newRoute53(m map[string]string, _ json.RawMessage) (*route53Provider, error
return nil, err
}

if roleArn != "" {
stsClient := sts.NewFromConfig(config)
sessionName := fmt.Sprintf("dnscontrol-route53-%d", time.Now().Unix())

var assumeOpts []func(*stscreds.AssumeRoleOptions)
if externalId != "" {
assumeOpts = append(assumeOpts, func(o *stscreds.AssumeRoleOptions) { o.ExternalID = aws.String(externalId) })
}
assumeOpts = append(assumeOpts, func(o *stscreds.AssumeRoleOptions) { o.RoleSessionName = sessionName })

stsCredsProvider := stscreds.NewAssumeRoleProvider(stsClient, roleArn, assumeOpts...)
config.Credentials = aws.NewCredentialsCache(stsCredsProvider)
}

var dls *string
if val, ok := m["DelegationSet"]; ok {
printer.Printf("ROUTE53 DelegationSet %s configured\n", val)
Expand Down