2015-02-12 03:23:34 +00:00
|
|
|
# Copyright 2015, Google Inc.
|
|
|
|
# All rights reserved.
|
|
|
|
#
|
|
|
|
# Redistribution and use in source and binary forms, with or without
|
|
|
|
# modification, are permitted provided that the following conditions are
|
|
|
|
# met:
|
|
|
|
#
|
|
|
|
# * Redistributions of source code must retain the above copyright
|
|
|
|
# notice, this list of conditions and the following disclaimer.
|
|
|
|
# * Redistributions in binary form must reproduce the above
|
|
|
|
# copyright notice, this list of conditions and the following disclaimer
|
|
|
|
# in the documentation and/or other materials provided with the
|
|
|
|
# distribution.
|
|
|
|
# * Neither the name of Google Inc. nor the names of its
|
|
|
|
# contributors may be used to endorse or promote products derived from
|
|
|
|
# this software without specific prior written permission.
|
|
|
|
#
|
|
|
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
2019-02-27 16:06:41 +00:00
|
|
|
require "googleauth/signet"
|
|
|
|
require "googleauth/credentials_loader"
|
|
|
|
require "googleauth/json_key_reader"
|
|
|
|
require "jwt"
|
|
|
|
require "multi_json"
|
|
|
|
require "stringio"
|
2015-02-12 03:23:34 +00:00
|
|
|
|
|
|
|
module Google
|
|
|
|
# Module Auth provides classes that provide Google-specific authorization
|
|
|
|
# used to access Google APIs.
|
|
|
|
module Auth
|
2015-03-18 01:26:40 +00:00
|
|
|
# Authenticates requests using Google's Service Account credentials via an
|
|
|
|
# OAuth access token.
|
2015-02-12 03:23:34 +00:00
|
|
|
#
|
2015-02-12 20:54:58 +00:00
|
|
|
# This class allows authorizing requests for service accounts directly
|
|
|
|
# from credentials from a json key file downloaded from the developer
|
|
|
|
# console (via 'Generate new Json Key').
|
2015-02-12 03:23:34 +00:00
|
|
|
#
|
|
|
|
# cf [Application Default Credentials](http://goo.gl/mkAHpZ)
|
|
|
|
class ServiceAccountCredentials < Signet::OAuth2::Client
|
2019-02-27 16:06:41 +00:00
|
|
|
TOKEN_CRED_URI = "https://www.googleapis.com/oauth2/v4/token".freeze
|
2015-03-06 21:13:26 +00:00
|
|
|
extend CredentialsLoader
|
2018-07-13 19:41:10 +00:00
|
|
|
extend JsonKeyReader
|
2018-10-24 16:23:37 +00:00
|
|
|
attr_reader :project_id
|
2015-02-12 20:54:58 +00:00
|
|
|
|
2015-10-14 20:53:37 +00:00
|
|
|
# Creates a ServiceAccountCredentials.
|
2015-02-12 03:23:34 +00:00
|
|
|
#
|
|
|
|
# @param json_key_io [IO] an IO from which the JSON key can be read
|
2015-03-17 23:46:55 +00:00
|
|
|
# @param scope [string|array|nil] the scope(s) to access
|
2015-10-14 20:53:37 +00:00
|
|
|
def self.make_creds(options = {})
|
2015-05-21 20:38:19 +00:00
|
|
|
json_key_io, scope = options.values_at(:json_key_io, :scope)
|
|
|
|
if json_key_io
|
2018-10-24 16:23:37 +00:00
|
|
|
private_key, client_email, project_id = read_json_key(json_key_io)
|
2015-05-21 20:38:19 +00:00
|
|
|
else
|
2018-06-05 16:56:48 +00:00
|
|
|
private_key = unescape ENV[CredentialsLoader::PRIVATE_KEY_VAR]
|
2015-05-21 20:38:19 +00:00
|
|
|
client_email = ENV[CredentialsLoader::CLIENT_EMAIL_VAR]
|
2018-10-24 16:23:37 +00:00
|
|
|
project_id = ENV[CredentialsLoader::PROJECT_ID_VAR]
|
2015-05-21 20:38:19 +00:00
|
|
|
end
|
2018-10-26 19:17:12 +00:00
|
|
|
project_id ||= CredentialsLoader.load_gcloud_project_id
|
2015-05-21 20:38:19 +00:00
|
|
|
|
2015-10-14 20:53:37 +00:00
|
|
|
new(token_credential_uri: TOKEN_CRED_URI,
|
|
|
|
audience: TOKEN_CRED_URI,
|
|
|
|
scope: scope,
|
|
|
|
issuer: client_email,
|
2018-10-24 16:23:37 +00:00
|
|
|
signing_key: OpenSSL::PKey::RSA.new(private_key),
|
|
|
|
project_id: project_id)
|
2019-01-02 22:42:42 +00:00
|
|
|
.configure_connection(options)
|
2015-10-14 20:53:37 +00:00
|
|
|
end
|
|
|
|
|
2018-06-05 16:56:48 +00:00
|
|
|
# Handles certain escape sequences that sometimes appear in input.
|
|
|
|
# Specifically, interprets the "\n" sequence for newline, and removes
|
|
|
|
# enclosing quotes.
|
|
|
|
def self.unescape(str)
|
|
|
|
str = str.gsub '\n', "\n"
|
|
|
|
str = str[1..-2] if str.start_with?('"') && str.end_with?('"')
|
|
|
|
str
|
|
|
|
end
|
|
|
|
|
2015-10-14 20:53:37 +00:00
|
|
|
def initialize(options = {})
|
2018-10-24 16:23:37 +00:00
|
|
|
@project_id = options[:project_id]
|
2015-10-14 20:53:37 +00:00
|
|
|
super(options)
|
2015-02-12 03:23:34 +00:00
|
|
|
end
|
2015-03-24 04:06:26 +00:00
|
|
|
|
|
|
|
# Extends the base class.
|
|
|
|
#
|
|
|
|
# If scope(s) is not set, it creates a transient
|
|
|
|
# ServiceAccountJwtHeaderCredentials instance and uses that to
|
|
|
|
# authenticate instead.
|
|
|
|
def apply!(a_hash, opts = {})
|
|
|
|
# Use the base implementation if scopes are set
|
|
|
|
unless scope.nil?
|
|
|
|
super
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
# Use the ServiceAccountJwtHeaderCredentials using the same cred values
|
|
|
|
# if no scopes are set.
|
|
|
|
cred_json = {
|
|
|
|
private_key: @signing_key.to_s,
|
|
|
|
client_email: @issuer
|
|
|
|
}
|
|
|
|
alt_clz = ServiceAccountJwtHeaderCredentials
|
2015-10-14 20:53:37 +00:00
|
|
|
key_io = StringIO.new(MultiJson.dump(cred_json))
|
|
|
|
alt = alt_clz.make_creds(json_key_io: key_io)
|
2015-03-24 04:06:26 +00:00
|
|
|
alt.apply!(a_hash)
|
|
|
|
end
|
2015-03-18 01:26:40 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Authenticates requests using Google's Service Account credentials via
|
|
|
|
# JWT Header.
|
|
|
|
#
|
|
|
|
# This class allows authorizing requests for service accounts directly
|
|
|
|
# from credentials from a json key file downloaded from the developer
|
|
|
|
# console (via 'Generate new Json Key'). It is not part of any OAuth2
|
|
|
|
# flow, rather it creates a JWT and sends that as a credential.
|
|
|
|
#
|
|
|
|
# cf [Application Default Credentials](http://goo.gl/mkAHpZ)
|
|
|
|
class ServiceAccountJwtHeaderCredentials
|
|
|
|
JWT_AUD_URI_KEY = :jwt_aud_uri
|
|
|
|
AUTH_METADATA_KEY = Signet::OAuth2::AUTH_METADATA_KEY
|
2019-02-27 16:06:41 +00:00
|
|
|
TOKEN_CRED_URI = "https://www.googleapis.com/oauth2/v4/token".freeze
|
|
|
|
SIGNING_ALGORITHM = "RS256".freeze
|
2015-03-18 01:26:40 +00:00
|
|
|
EXPIRY = 60
|
|
|
|
extend CredentialsLoader
|
2018-07-13 19:41:10 +00:00
|
|
|
extend JsonKeyReader
|
2018-10-24 16:23:37 +00:00
|
|
|
attr_reader :project_id
|
2015-03-18 01:26:40 +00:00
|
|
|
|
|
|
|
# make_creds proxies the construction of a credentials instance
|
|
|
|
#
|
|
|
|
# make_creds is used by the methods in CredentialsLoader.
|
|
|
|
#
|
|
|
|
# By default, it calls #new with 2 args, the second one being an
|
|
|
|
# optional scope. Here's the constructor only has one param, so
|
|
|
|
# we modify make_creds to reflect this.
|
|
|
|
def self.make_creds(*args)
|
2015-05-21 20:38:19 +00:00
|
|
|
new(json_key_io: args[0][:json_key_io])
|
2015-03-18 01:26:40 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Initializes a ServiceAccountJwtHeaderCredentials.
|
|
|
|
#
|
|
|
|
# @param json_key_io [IO] an IO from which the JSON key can be read
|
2015-05-21 20:38:19 +00:00
|
|
|
def initialize(options = {})
|
|
|
|
json_key_io = options[:json_key_io]
|
|
|
|
if json_key_io
|
2018-10-24 16:23:37 +00:00
|
|
|
@private_key, @issuer, @project_id =
|
|
|
|
self.class.read_json_key(json_key_io)
|
2015-05-21 20:38:19 +00:00
|
|
|
else
|
2018-10-24 16:23:37 +00:00
|
|
|
@private_key = ENV[CredentialsLoader::PRIVATE_KEY_VAR]
|
|
|
|
@issuer = ENV[CredentialsLoader::CLIENT_EMAIL_VAR]
|
|
|
|
@project_id = ENV[CredentialsLoader::PROJECT_ID_VAR]
|
2015-05-21 20:38:19 +00:00
|
|
|
end
|
2018-10-26 19:17:12 +00:00
|
|
|
@project_id ||= CredentialsLoader.load_gcloud_project_id
|
2018-10-24 16:23:37 +00:00
|
|
|
@signing_key = OpenSSL::PKey::RSA.new(@private_key)
|
2015-03-18 01:26:40 +00:00
|
|
|
end
|
2015-03-07 03:52:08 +00:00
|
|
|
|
2015-03-24 04:06:26 +00:00
|
|
|
# Construct a jwt token if the JWT_AUD_URI key is present in the input
|
2015-03-18 01:26:40 +00:00
|
|
|
# hash.
|
2015-03-07 03:52:08 +00:00
|
|
|
#
|
2015-03-18 01:26:40 +00:00
|
|
|
# The jwt token is used as the value of a 'Bearer '.
|
2015-03-07 03:52:08 +00:00
|
|
|
def apply!(a_hash, opts = {})
|
|
|
|
jwt_aud_uri = a_hash.delete(JWT_AUD_URI_KEY)
|
2015-03-18 01:26:40 +00:00
|
|
|
return a_hash if jwt_aud_uri.nil?
|
|
|
|
jwt_token = new_jwt_token(jwt_aud_uri, opts)
|
|
|
|
a_hash[AUTH_METADATA_KEY] = "Bearer #{jwt_token}"
|
|
|
|
a_hash
|
2015-03-07 03:52:08 +00:00
|
|
|
end
|
|
|
|
|
2015-03-18 01:26:40 +00:00
|
|
|
# Returns a clone of a_hash updated with the authoriation header
|
|
|
|
def apply(a_hash, opts = {})
|
|
|
|
a_copy = a_hash.clone
|
|
|
|
apply!(a_copy, opts)
|
|
|
|
a_copy
|
|
|
|
end
|
|
|
|
|
|
|
|
# Returns a reference to the #apply method, suitable for passing as
|
|
|
|
# a closure
|
|
|
|
def updater_proc
|
|
|
|
lambda(&method(:apply))
|
|
|
|
end
|
|
|
|
|
|
|
|
protected
|
|
|
|
|
2015-03-07 03:52:08 +00:00
|
|
|
# Creates a jwt uri token.
|
|
|
|
def new_jwt_token(jwt_aud_uri, options = {})
|
|
|
|
now = Time.new
|
|
|
|
skew = options[:skew] || 60
|
|
|
|
assertion = {
|
2019-02-27 16:06:41 +00:00
|
|
|
"iss" => @issuer,
|
|
|
|
"sub" => @issuer,
|
|
|
|
"aud" => jwt_aud_uri,
|
|
|
|
"exp" => (now + EXPIRY).to_i,
|
|
|
|
"iat" => (now - skew).to_i
|
2015-03-07 03:52:08 +00:00
|
|
|
}
|
2015-03-18 01:26:40 +00:00
|
|
|
JWT.encode(assertion, @signing_key, SIGNING_ALGORITHM)
|
2015-03-07 03:52:08 +00:00
|
|
|
end
|
2015-02-12 03:23:34 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|