Skip to content

Commit

Permalink
Add impersonated service account
Browse files Browse the repository at this point in the history
  • Loading branch information
Danil Nurgaliev committed Aug 5, 2024
1 parent 9768476 commit 69772af
Show file tree
Hide file tree
Showing 2 changed files with 156 additions and 0 deletions.
5 changes: 5 additions & 0 deletions lib/googleauth/default_credentials.rb
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@
require "googleauth/credentials_loader"
require "googleauth/service_account"
require "googleauth/user_refresh"
require "googleauth/impersonated_service_account"
require "googleauth/external_account"

module Google
Expand Down Expand Up @@ -52,6 +53,8 @@ def self.read_creds
ServiceAccountCredentials
when "authorized_user"
UserRefreshCredentials
when "impersonated_service_account"
ImpersonatedServiceAccount
when "external_account"
ExternalAccount::Credentials
else
Expand All @@ -70,6 +73,8 @@ def self.determine_creds_class json_key_io
[json_key, ServiceAccountCredentials]
when "authorized_user"
[json_key, UserRefreshCredentials]
when "impersonated_service_account"
[json_key, ImpersonatedServiceAccount]
when "external_account"
[json_key, ExternalAccount::Credentials]
else
Expand Down
151 changes: 151 additions & 0 deletions lib/googleauth/impersonated_service_account.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,151 @@
# Copyright 2015 Google, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

require "googleauth/signet"
require "googleauth/credentials_loader"
require "googleauth/scope_util"
require "multi_json"

module Google
# Module Auth provides classes that provide Google-specific authorization
# used to access Google APIs.
module Auth
# Authenticates requests using User Refresh credentials.
#
# This class allows authorizing requests from user refresh tokens.
#
# This the end of the result of a 3LO flow. E.g, the end result of
# 'gcloud auth login' saves a file with these contents in well known
# location
#
# cf [Application Default Credentials](https://cloud.google.com/docs/authentication/production)
class ImpersonatedServiceAccount < Signet::OAuth2::Client
TOKEN_CRED_URI = "https://oauth2.googleapis.com/token".freeze
AUTHORIZATION_URI = "https://accounts.google.com/o/oauth2/auth".freeze
REVOKE_TOKEN_URI = "https://oauth2.googleapis.com/revoke".freeze
extend CredentialsLoader
attr_reader :project_id
attr_reader :quota_project_id

# Create a UserRefreshCredentials.
#
# @param json_key_io [IO] an IO from which the JSON key can be read
# @param scope [string|array|nil] the scope(s) to access
def self.make_creds options = {}
json_key_io, scope = options.values_at :json_key_io, :scope
p scope
user_creds = read_json_key json_key_io if json_key_io
user_creds ||= {
"client_id" => ENV[CredentialsLoader::CLIENT_ID_VAR],
"client_secret" => ENV[CredentialsLoader::CLIENT_SECRET_VAR],
"refresh_token" => ENV[CredentialsLoader::REFRESH_TOKEN_VAR],
"project_id" => ENV[CredentialsLoader::PROJECT_ID_VAR],
"quota_project_id" => nil,
"universe_domain" => nil
}
new(token_credential_uri: TOKEN_CRED_URI,
client_id: user_creds["client_id"],
client_secret: user_creds["client_secret"],
refresh_token: user_creds["refresh_token"],
project_id: user_creds["project_id"],
quota_project_id: user_creds["quota_project_id"],
scope: scope,
service_account_impersonation_url: user_creds['service_account_impersonation_url'],
universe_domain: user_creds["universe_domain"] || "googleapis.com")
.configure_connection(options)
end

# Reads the client_id, client_secret and refresh_token fields from the
# JSON key.
def self.read_json_key json_key_io
json_key = MultiJson.load json_key_io.read
source_credentials = json_key['source_credentials']
wanted = ["client_id", "client_secret", "refresh_token"]
wanted.each do |key|
raise "the json is missing the #{key} field" unless source_credentials.key? key
end
source_credentials.merge(
'service_account_impersonation_url' => json_key['service_account_impersonation_url']
)
end

def initialize options = {}
options ||= {}
options[:token_credential_uri] ||= TOKEN_CRED_URI
options[:authorization_uri] ||= AUTHORIZATION_URI
@service_account_impersonation_url = options[:service_account_impersonation_url]
@project_id = options[:project_id]
@project_id ||= CredentialsLoader.load_gcloud_project_id
@quota_project_id = options[:quota_project_id]
super options
end

def fetch_access_token(options = {})
token_hash = super

c = options[:connection] || Faraday.default_connection
response = c.post(@service_account_impersonation_url) do |req|
req.headers = {
authorization: "Bearer #{token_hash['access_token']}",
'content-type' => 'application/json'
}

req.body = JSON.dump({scope: scope})
end

if response.status != 200
raise "Service account impersonation failed with status #{response.status}"
end

parsed = MultiJson.load response.body

{
access_token: parsed['accessToken'],
expires_at: Time.parse(parsed['expireTime'])
}
end


# Revokes the credential
def revoke! options = {}
c = options[:connection] || Faraday.default_connection

retry_with_error do
resp = c.post(REVOKE_TOKEN_URI, token: refresh_token || access_token)
case resp.status
when 200
self.access_token = nil
self.refresh_token = nil
self.expires_at = 0
else
raise(Signet::AuthorizationError,
"Unexpected error code #{resp.status}")
end
end
end

# Verifies that a credential grants the requested scope
#
# @param [Array<String>, String] required_scope
# Scope to verify
# @return [Boolean]
# True if scope is granted
def includes_scope? required_scope
missing_scope = Google::Auth::ScopeUtil.normalize(required_scope) -
Google::Auth::ScopeUtil.normalize(scope)
missing_scope.empty?
end
end
end
end

0 comments on commit 69772af

Please sign in to comment.