This repository was archived by the owner on Nov 23, 2025. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathmain.go
More file actions
71 lines (56 loc) · 1.64 KB
/
main.go
File metadata and controls
71 lines (56 loc) · 1.64 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
package main
import (
"context"
"os"
"time"
"github.com/aws/aws-lambda-go/events"
"github.com/aws/aws-lambda-go/lambda"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/secretsmanager"
"github.com/awslabs/aws-lambda-go-api-proxy/httpadapter"
"github.com/epithet-ssh/epithet/pkg/ca"
"github.com/epithet-ssh/epithet/pkg/caserver"
"github.com/epithet-ssh/epithet/pkg/sshcert"
"github.com/go-chi/chi"
"github.com/go-chi/chi/middleware"
)
func main() {
policyURL := os.Getenv("POLICY_URL")
privkeySecretName := os.Getenv("PRIVKEY_SECRET_NAME")
sess := session.Must(session.NewSessionWithOptions(session.Options{
SharedConfigState: session.SharedConfigEnable,
}))
svc := secretsmanager.New(sess)
rs, err := svc.GetSecretValue(&secretsmanager.GetSecretValueInput{
SecretId: aws.String(privkeySecretName),
})
if err != nil {
panic(err)
}
privKey := aws.StringValue(rs.SecretString)
c, err := ca.New(sshcert.RawPrivateKey(string(privKey)), policyURL)
if err != nil {
panic(err)
}
r := chi.NewRouter()
// A good base middleware stack
r.Use(middleware.RequestID)
r.Use(middleware.RealIP)
r.Use(middleware.Logger)
r.Use(middleware.Recoverer)
r.Use(middleware.Timeout(60 * time.Second))
r.Handle("/*", caserver.New(c))
adapter := httpadapter.New(r)
h := handler{
mux: adapter,
}
lambda.Start(h.Handle)
}
type handler struct {
mux *httpadapter.HandlerAdapter
}
// Handle handles lambda invocations :-)
func (h *handler) Handle(ctx context.Context, req events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {
return h.mux.ProxyWithContext(ctx, req)
}