|
| 1 | +from __future__ import annotations |
| 2 | + |
| 3 | +from typing import Any |
| 4 | + |
| 5 | +from aws_lambda_powertools import Logger |
| 6 | +from aws_lambda_powertools.utilities import parameters |
| 7 | +from aws_lambda_powertools.utilities.data_classes import ( |
| 8 | + TransferFamilyAuthorizer, |
| 9 | + TransferFamilyAuthorizerResponse, |
| 10 | + event_source, |
| 11 | +) |
| 12 | +from aws_lambda_powertools.utilities.typing import LambdaContext |
| 13 | + |
| 14 | +logger = Logger() |
| 15 | + |
| 16 | +@event_source(data_class=TransferFamilyAuthorizer) |
| 17 | +def lambda_handler(event: TransferFamilyAuthorizer, context: LambdaContext): |
| 18 | + |
| 19 | + username = event.username |
| 20 | + password = event.password or None |
| 21 | + |
| 22 | + response: dict[str, Any] = {} |
| 23 | + build_response = TransferFamilyAuthorizerResponse() |
| 24 | + |
| 25 | + try: |
| 26 | + user_data = parameters.get_secret(f"/sftp/{username}", transform="json") |
| 27 | + |
| 28 | + logger.info(f"Credentials found for user {username}") |
| 29 | + |
| 30 | + stored_username = user_data["username"] |
| 31 | + stored_secret = user_data["password"] |
| 32 | + stored_gid = user_data["gid"] |
| 33 | + stored_uid = user_data["uid"] |
| 34 | + stored_role = user_data["role"] |
| 35 | + stored_directory = user_data["efs-server"] |
| 36 | + stored_entry = user_data["entry"] |
| 37 | + stored_directory_type = user_data["directory-type"] |
| 38 | + home_directory_details = {"Entry": stored_entry, "Target": stored_directory} |
| 39 | + |
| 40 | + if username == stored_username and password == stored_secret: |
| 41 | + logger.info(f"User {username} informed a valid password") |
| 42 | + |
| 43 | + response = build_response.build_authentication_response_efs( # (1)! |
| 44 | + role_arn=stored_role, |
| 45 | + user_gid=stored_gid, |
| 46 | + user_uid=stored_uid, |
| 47 | + home_directory_type=stored_directory_type, |
| 48 | + home_directory_details=home_directory_details, |
| 49 | + ) |
| 50 | + else: |
| 51 | + logger.info(f"User {username} informed a invalid password") |
| 52 | + |
| 53 | + except Exception as e: |
| 54 | + logger.exception(e) |
| 55 | + logger.info(f"Credentials not valid for user {username}") |
| 56 | + |
| 57 | + return response |
0 commit comments