| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| |
|
| | """AWS Credentials and AWS Signature V4 Request Signer. |
| | |
| | This module provides credentials to access Google Cloud resources from Amazon |
| | Web Services (AWS) workloads. These credentials are recommended over the |
| | use of service account credentials in AWS as they do not involve the management |
| | of long-live service account private keys. |
| | |
| | AWS Credentials are initialized using external_account arguments which are |
| | typically loaded from the external credentials JSON file. |
| | |
| | This module also provides a definition for an abstract AWS security credentials supplier. |
| | This supplier can be implemented to return valid AWS security credentials and an AWS region |
| | and used to create AWS credentials. The credentials will then call the |
| | supplier instead of using pre-defined methods such as calling the EC2 metadata endpoints. |
| | |
| | This module also provides a basic implementation of the |
| | `AWS Signature Version 4`_ request signing algorithm. |
| | |
| | AWS Credentials use serialized signed requests to the |
| | `AWS STS GetCallerIdentity`_ API that can be exchanged for Google access tokens |
| | via the GCP STS endpoint. |
| | |
| | .. _AWS Signature Version 4: https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html |
| | .. _AWS STS GetCallerIdentity: https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity.html |
| | """ |
| |
|
| | import abc |
| | from dataclasses import dataclass |
| | import hashlib |
| | import hmac |
| | import http.client as http_client |
| | import json |
| | import os |
| | import posixpath |
| | import re |
| | from typing import Optional |
| | import urllib |
| | from urllib.parse import urljoin |
| |
|
| | from google.auth import _helpers |
| | from google.auth import environment_vars |
| | from google.auth import exceptions |
| | from google.auth import external_account |
| |
|
| | |
| | _AWS_ALGORITHM = "AWS4-HMAC-SHA256" |
| | |
| | |
| | _AWS_REQUEST_TYPE = "aws4_request" |
| | |
| | _AWS_SECURITY_TOKEN_HEADER = "x-amz-security-token" |
| | |
| | _AWS_DATE_HEADER = "x-amz-date" |
| | |
| | _DEFAULT_AWS_REGIONAL_CREDENTIAL_VERIFICATION_URL = ( |
| | "https://sts.{region}.amazonaws.com?Action=GetCallerIdentity&Version=2011-06-15" |
| | ) |
| | |
| | _IMDSV2_SESSION_TOKEN_TTL_SECONDS = "300" |
| |
|
| |
|
| | class RequestSigner(object): |
| | """Implements an AWS request signer based on the AWS Signature Version 4 signing |
| | process. |
| | https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html |
| | """ |
| |
|
| | def __init__(self, region_name): |
| | """Instantiates an AWS request signer used to compute authenticated signed |
| | requests to AWS APIs based on the AWS Signature Version 4 signing process. |
| | |
| | Args: |
| | region_name (str): The AWS region to use. |
| | """ |
| |
|
| | self._region_name = region_name |
| |
|
| | def get_request_options( |
| | self, |
| | aws_security_credentials, |
| | url, |
| | method, |
| | request_payload="", |
| | additional_headers={}, |
| | ): |
| | """Generates the signed request for the provided HTTP request for calling |
| | an AWS API. This follows the steps described at: |
| | https://docs.aws.amazon.com/general/latest/gr/sigv4_signing.html |
| | |
| | Args: |
| | aws_security_credentials (AWSSecurityCredentials): The AWS security credentials. |
| | url (str): The AWS service URL containing the canonical URI and |
| | query string. |
| | method (str): The HTTP method used to call this API. |
| | request_payload (Optional[str]): The optional request payload if |
| | available. |
| | additional_headers (Optional[Mapping[str, str]]): The optional |
| | additional headers needed for the requested AWS API. |
| | |
| | Returns: |
| | Mapping[str, str]: The AWS signed request dictionary object. |
| | """ |
| |
|
| | additional_headers = additional_headers or {} |
| |
|
| | uri = urllib.parse.urlparse(url) |
| | |
| | |
| | |
| | normalized_uri = urllib.parse.urlparse( |
| | urljoin(url, posixpath.normpath(uri.path)) |
| | ) |
| | |
| | if not uri.hostname or uri.scheme != "https": |
| | raise exceptions.InvalidResource("Invalid AWS service URL") |
| |
|
| | header_map = _generate_authentication_header_map( |
| | host=uri.hostname, |
| | canonical_uri=normalized_uri.path or "/", |
| | canonical_querystring=_get_canonical_querystring(uri.query), |
| | method=method, |
| | region=self._region_name, |
| | aws_security_credentials=aws_security_credentials, |
| | request_payload=request_payload, |
| | additional_headers=additional_headers, |
| | ) |
| | headers = { |
| | "Authorization": header_map.get("authorization_header"), |
| | "host": uri.hostname, |
| | } |
| | |
| | if "amz_date" in header_map: |
| | headers[_AWS_DATE_HEADER] = header_map.get("amz_date") |
| | |
| | for key in additional_headers: |
| | headers[key] = additional_headers[key] |
| |
|
| | |
| | if aws_security_credentials.session_token is not None: |
| | headers[_AWS_SECURITY_TOKEN_HEADER] = aws_security_credentials.session_token |
| |
|
| | signed_request = {"url": url, "method": method, "headers": headers} |
| | if request_payload: |
| | signed_request["data"] = request_payload |
| | return signed_request |
| |
|
| |
|
| | def _get_canonical_querystring(query): |
| | """Generates the canonical query string given a raw query string. |
| | Logic is based on |
| | https://docs.aws.amazon.com/general/latest/gr/sigv4-create-canonical-request.html |
| | |
| | Args: |
| | query (str): The raw query string. |
| | |
| | Returns: |
| | str: The canonical query string. |
| | """ |
| | |
| | querystring = urllib.parse.parse_qs(query) |
| | querystring_encoded_map = {} |
| | for key in querystring: |
| | quote_key = urllib.parse.quote(key, safe="-_.~") |
| | |
| | querystring_encoded_map[quote_key] = [] |
| | for item in querystring[key]: |
| | |
| | querystring_encoded_map[quote_key].append( |
| | urllib.parse.quote(item, safe="-_.~") |
| | ) |
| | |
| | querystring_encoded_map[quote_key].sort() |
| | |
| | sorted_keys = list(querystring_encoded_map.keys()) |
| | sorted_keys.sort() |
| | |
| | querystring_encoded_pairs = [] |
| | for key in sorted_keys: |
| | for item in querystring_encoded_map[key]: |
| | querystring_encoded_pairs.append("{}={}".format(key, item)) |
| | return "&".join(querystring_encoded_pairs) |
| |
|
| |
|
| | def _sign(key, msg): |
| | """Creates the HMAC-SHA256 hash of the provided message using the provided |
| | key. |
| | |
| | Args: |
| | key (str): The HMAC-SHA256 key to use. |
| | msg (str): The message to hash. |
| | |
| | Returns: |
| | str: The computed hash bytes. |
| | """ |
| | return hmac.new(key, msg.encode("utf-8"), hashlib.sha256).digest() |
| |
|
| |
|
| | def _get_signing_key(key, date_stamp, region_name, service_name): |
| | """Calculates the signing key used to calculate the signature for |
| | AWS Signature Version 4 based on: |
| | https://docs.aws.amazon.com/general/latest/gr/sigv4-calculate-signature.html |
| | |
| | Args: |
| | key (str): The AWS secret access key. |
| | date_stamp (str): The '%Y%m%d' date format. |
| | region_name (str): The AWS region. |
| | service_name (str): The AWS service name, eg. sts. |
| | |
| | Returns: |
| | str: The signing key bytes. |
| | """ |
| | k_date = _sign(("AWS4" + key).encode("utf-8"), date_stamp) |
| | k_region = _sign(k_date, region_name) |
| | k_service = _sign(k_region, service_name) |
| | k_signing = _sign(k_service, "aws4_request") |
| | return k_signing |
| |
|
| |
|
| | def _generate_authentication_header_map( |
| | host, |
| | canonical_uri, |
| | canonical_querystring, |
| | method, |
| | region, |
| | aws_security_credentials, |
| | request_payload="", |
| | additional_headers={}, |
| | ): |
| | """Generates the authentication header map needed for generating the AWS |
| | Signature Version 4 signed request. |
| | |
| | Args: |
| | host (str): The AWS service URL hostname. |
| | canonical_uri (str): The AWS service URL path name. |
| | canonical_querystring (str): The AWS service URL query string. |
| | method (str): The HTTP method used to call this API. |
| | region (str): The AWS region. |
| | aws_security_credentials (AWSSecurityCredentials): The AWS security credentials. |
| | request_payload (Optional[str]): The optional request payload if |
| | available. |
| | additional_headers (Optional[Mapping[str, str]]): The optional |
| | additional headers needed for the requested AWS API. |
| | |
| | Returns: |
| | Mapping[str, str]: The AWS authentication header dictionary object. |
| | This contains the x-amz-date and authorization header information. |
| | """ |
| | |
| | |
| | service_name = host.split(".")[0] |
| |
|
| | current_time = _helpers.utcnow() |
| | amz_date = current_time.strftime("%Y%m%dT%H%M%SZ") |
| | date_stamp = current_time.strftime("%Y%m%d") |
| |
|
| | |
| | full_headers = {} |
| | for key in additional_headers: |
| | full_headers[key.lower()] = additional_headers[key] |
| | |
| | if aws_security_credentials.session_token is not None: |
| | full_headers[ |
| | _AWS_SECURITY_TOKEN_HEADER |
| | ] = aws_security_credentials.session_token |
| |
|
| | |
| | full_headers["host"] = host |
| | |
| | |
| | |
| | |
| | if "date" not in full_headers: |
| | full_headers[_AWS_DATE_HEADER] = amz_date |
| |
|
| | |
| | canonical_headers = "" |
| | header_keys = list(full_headers.keys()) |
| | header_keys.sort() |
| | for key in header_keys: |
| | canonical_headers = "{}{}:{}\n".format( |
| | canonical_headers, key, full_headers[key] |
| | ) |
| | signed_headers = ";".join(header_keys) |
| |
|
| | payload_hash = hashlib.sha256((request_payload or "").encode("utf-8")).hexdigest() |
| |
|
| | |
| | canonical_request = "{}\n{}\n{}\n{}\n{}\n{}".format( |
| | method, |
| | canonical_uri, |
| | canonical_querystring, |
| | canonical_headers, |
| | signed_headers, |
| | payload_hash, |
| | ) |
| |
|
| | credential_scope = "{}/{}/{}/{}".format( |
| | date_stamp, region, service_name, _AWS_REQUEST_TYPE |
| | ) |
| |
|
| | |
| | string_to_sign = "{}\n{}\n{}\n{}".format( |
| | _AWS_ALGORITHM, |
| | amz_date, |
| | credential_scope, |
| | hashlib.sha256(canonical_request.encode("utf-8")).hexdigest(), |
| | ) |
| |
|
| | |
| | signing_key = _get_signing_key( |
| | aws_security_credentials.secret_access_key, date_stamp, region, service_name |
| | ) |
| | signature = hmac.new( |
| | signing_key, string_to_sign.encode("utf-8"), hashlib.sha256 |
| | ).hexdigest() |
| |
|
| | |
| | authorization_header = "{} Credential={}/{}, SignedHeaders={}, Signature={}".format( |
| | _AWS_ALGORITHM, |
| | aws_security_credentials.access_key_id, |
| | credential_scope, |
| | signed_headers, |
| | signature, |
| | ) |
| |
|
| | authentication_header = {"authorization_header": authorization_header} |
| | |
| | if "date" not in full_headers: |
| | authentication_header["amz_date"] = amz_date |
| | return authentication_header |
| |
|
| |
|
| | @dataclass |
| | class AwsSecurityCredentials: |
| | """A class that models AWS security credentials with an optional session token. |
| | |
| | Attributes: |
| | access_key_id (str): The AWS security credentials access key id. |
| | secret_access_key (str): The AWS security credentials secret access key. |
| | session_token (Optional[str]): The optional AWS security credentials session token. This should be set when using temporary credentials. |
| | """ |
| |
|
| | access_key_id: str |
| | secret_access_key: str |
| | session_token: Optional[str] = None |
| |
|
| |
|
| | class AwsSecurityCredentialsSupplier(metaclass=abc.ABCMeta): |
| | """Base class for AWS security credential suppliers. This can be implemented with custom logic to retrieve |
| | AWS security credentials to exchange for a Google Cloud access token. The AWS external account credential does |
| | not cache the AWS security credentials, so caching logic should be added in the implementation. |
| | """ |
| |
|
| | @abc.abstractmethod |
| | def get_aws_security_credentials(self, context, request): |
| | """Returns the AWS security credentials for the requested context. |
| | |
| | .. warning: This is not cached by the calling Google credential, so caching logic should be implemented in the supplier. |
| | |
| | Args: |
| | context (google.auth.externalaccount.SupplierContext): The context object |
| | containing information about the requested audience and subject token type. |
| | request (google.auth.transport.Request): The object used to make |
| | HTTP requests. |
| | |
| | Raises: |
| | google.auth.exceptions.RefreshError: If an error is encountered during |
| | security credential retrieval logic. |
| | |
| | Returns: |
| | AwsSecurityCredentials: The requested AWS security credentials. |
| | """ |
| | raise NotImplementedError("") |
| |
|
| | @abc.abstractmethod |
| | def get_aws_region(self, context, request): |
| | """Returns the AWS region for the requested context. |
| | |
| | Args: |
| | context (google.auth.externalaccount.SupplierContext): The context object |
| | containing information about the requested audience and subject token type. |
| | request (google.auth.transport.Request): The object used to make |
| | HTTP requests. |
| | |
| | Raises: |
| | google.auth.exceptions.RefreshError: If an error is encountered during |
| | region retrieval logic. |
| | |
| | Returns: |
| | str: The AWS region. |
| | """ |
| | raise NotImplementedError("") |
| |
|
| |
|
| | class _DefaultAwsSecurityCredentialsSupplier(AwsSecurityCredentialsSupplier): |
| | """Default implementation of AWS security credentials supplier. Supports retrieving |
| | credentials and region via EC2 metadata endpoints and environment variables. |
| | """ |
| |
|
| | def __init__(self, credential_source): |
| | self._region_url = credential_source.get("region_url") |
| | self._security_credentials_url = credential_source.get("url") |
| | self._imdsv2_session_token_url = credential_source.get( |
| | "imdsv2_session_token_url" |
| | ) |
| |
|
| | @_helpers.copy_docstring(AwsSecurityCredentialsSupplier) |
| | def get_aws_security_credentials(self, context, request): |
| |
|
| | |
| | |
| | env_aws_access_key_id = os.environ.get(environment_vars.AWS_ACCESS_KEY_ID) |
| | env_aws_secret_access_key = os.environ.get( |
| | environment_vars.AWS_SECRET_ACCESS_KEY |
| | ) |
| | |
| | env_aws_session_token = os.environ.get(environment_vars.AWS_SESSION_TOKEN) |
| | if env_aws_access_key_id and env_aws_secret_access_key: |
| | return AwsSecurityCredentials( |
| | env_aws_access_key_id, env_aws_secret_access_key, env_aws_session_token |
| | ) |
| |
|
| | imdsv2_session_token = self._get_imdsv2_session_token(request) |
| | role_name = self._get_metadata_role_name(request, imdsv2_session_token) |
| |
|
| | |
| | credentials = self._get_metadata_security_credentials( |
| | request, role_name, imdsv2_session_token |
| | ) |
| |
|
| | return AwsSecurityCredentials( |
| | credentials.get("AccessKeyId"), |
| | credentials.get("SecretAccessKey"), |
| | credentials.get("Token"), |
| | ) |
| |
|
| | @_helpers.copy_docstring(AwsSecurityCredentialsSupplier) |
| | def get_aws_region(self, context, request): |
| | |
| | |
| | |
| | env_aws_region = os.environ.get(environment_vars.AWS_REGION) |
| | if env_aws_region is not None: |
| | return env_aws_region |
| |
|
| | env_aws_region = os.environ.get(environment_vars.AWS_DEFAULT_REGION) |
| | if env_aws_region is not None: |
| | return env_aws_region |
| |
|
| | if not self._region_url: |
| | raise exceptions.RefreshError("Unable to determine AWS region") |
| |
|
| | headers = None |
| | imdsv2_session_token = self._get_imdsv2_session_token(request) |
| | if imdsv2_session_token is not None: |
| | headers = {"X-aws-ec2-metadata-token": imdsv2_session_token} |
| |
|
| | response = request(url=self._region_url, method="GET", headers=headers) |
| |
|
| | |
| | response_body = ( |
| | response.data.decode("utf-8") |
| | if hasattr(response.data, "decode") |
| | else response.data |
| | ) |
| |
|
| | if response.status != http_client.OK: |
| | raise exceptions.RefreshError( |
| | "Unable to retrieve AWS region: {}".format(response_body) |
| | ) |
| |
|
| | |
| | |
| | return response_body[:-1] |
| |
|
| | def _get_imdsv2_session_token(self, request): |
| | if request is not None and self._imdsv2_session_token_url is not None: |
| | headers = { |
| | "X-aws-ec2-metadata-token-ttl-seconds": _IMDSV2_SESSION_TOKEN_TTL_SECONDS |
| | } |
| |
|
| | imdsv2_session_token_response = request( |
| | url=self._imdsv2_session_token_url, method="PUT", headers=headers |
| | ) |
| |
|
| | if imdsv2_session_token_response.status != http_client.OK: |
| | raise exceptions.RefreshError( |
| | "Unable to retrieve AWS Session Token: {}".format( |
| | imdsv2_session_token_response.data |
| | ) |
| | ) |
| |
|
| | return imdsv2_session_token_response.data |
| | else: |
| | return None |
| |
|
| | def _get_metadata_security_credentials( |
| | self, request, role_name, imdsv2_session_token |
| | ): |
| | """Retrieves the AWS security credentials required for signing AWS |
| | requests from the AWS metadata server. |
| | |
| | Args: |
| | request (google.auth.transport.Request): A callable used to make |
| | HTTP requests. |
| | role_name (str): The AWS role name required by the AWS metadata |
| | server security_credentials endpoint in order to return the |
| | credentials. |
| | imdsv2_session_token (str): The AWS IMDSv2 session token to be added as a |
| | header in the requests to AWS metadata endpoint. |
| | |
| | Returns: |
| | Mapping[str, str]: The AWS metadata server security credentials |
| | response. |
| | |
| | Raises: |
| | google.auth.exceptions.RefreshError: If an error occurs while |
| | retrieving the AWS security credentials. |
| | """ |
| | headers = {"Content-Type": "application/json"} |
| | if imdsv2_session_token is not None: |
| | headers["X-aws-ec2-metadata-token"] = imdsv2_session_token |
| |
|
| | response = request( |
| | url="{}/{}".format(self._security_credentials_url, role_name), |
| | method="GET", |
| | headers=headers, |
| | ) |
| |
|
| | |
| | response_body = ( |
| | response.data.decode("utf-8") |
| | if hasattr(response.data, "decode") |
| | else response.data |
| | ) |
| |
|
| | if response.status != http_client.OK: |
| | raise exceptions.RefreshError( |
| | "Unable to retrieve AWS security credentials: {}".format(response_body) |
| | ) |
| |
|
| | credentials_response = json.loads(response_body) |
| |
|
| | return credentials_response |
| |
|
| | def _get_metadata_role_name(self, request, imdsv2_session_token): |
| | """Retrieves the AWS role currently attached to the current AWS |
| | workload by querying the AWS metadata server. This is needed for the |
| | AWS metadata server security credentials endpoint in order to retrieve |
| | the AWS security credentials needed to sign requests to AWS APIs. |
| | |
| | Args: |
| | request (google.auth.transport.Request): A callable used to make |
| | HTTP requests. |
| | imdsv2_session_token (str): The AWS IMDSv2 session token to be added as a |
| | header in the requests to AWS metadata endpoint. |
| | |
| | Returns: |
| | str: The AWS role name. |
| | |
| | Raises: |
| | google.auth.exceptions.RefreshError: If an error occurs while |
| | retrieving the AWS role name. |
| | """ |
| | if self._security_credentials_url is None: |
| | raise exceptions.RefreshError( |
| | "Unable to determine the AWS metadata server security credentials endpoint" |
| | ) |
| |
|
| | headers = None |
| | if imdsv2_session_token is not None: |
| | headers = {"X-aws-ec2-metadata-token": imdsv2_session_token} |
| |
|
| | response = request( |
| | url=self._security_credentials_url, method="GET", headers=headers |
| | ) |
| |
|
| | |
| | response_body = ( |
| | response.data.decode("utf-8") |
| | if hasattr(response.data, "decode") |
| | else response.data |
| | ) |
| |
|
| | if response.status != http_client.OK: |
| | raise exceptions.RefreshError( |
| | "Unable to retrieve AWS role name {}".format(response_body) |
| | ) |
| |
|
| | return response_body |
| |
|
| |
|
| | class Credentials(external_account.Credentials): |
| | """AWS external account credentials. |
| | This is used to exchange serialized AWS signature v4 signed requests to |
| | AWS STS GetCallerIdentity service for Google access tokens. |
| | """ |
| |
|
| | def __init__( |
| | self, |
| | audience, |
| | subject_token_type, |
| | token_url=external_account._DEFAULT_TOKEN_URL, |
| | credential_source=None, |
| | aws_security_credentials_supplier=None, |
| | *args, |
| | **kwargs |
| | ): |
| | """Instantiates an AWS workload external account credentials object. |
| | |
| | Args: |
| | audience (str): The STS audience field. |
| | subject_token_type (str): The subject token type based on the Oauth2.0 token exchange spec. |
| | Expected values include:: |
| | |
| | “urn:ietf:params:aws:token-type:aws4_request” |
| | |
| | token_url (Optional [str]): The STS endpoint URL. If not provided, will default to "https://sts.googleapis.com/v1/token". |
| | credential_source (Optional [Mapping]): The credential source dictionary used |
| | to provide instructions on how to retrieve external credential to be exchanged for Google access tokens. |
| | Either a credential source or an AWS security credentials supplier must be provided. |
| | |
| | Example credential_source for AWS credential:: |
| | |
| | { |
| | "environment_id": "aws1", |
| | "regional_cred_verification_url": "https://sts.{region}.amazonaws.com?Action=GetCallerIdentity&Version=2011-06-15", |
| | "region_url": "http://169.254.169.254/latest/meta-data/placement/availability-zone", |
| | "url": "http://169.254.169.254/latest/meta-data/iam/security-credentials", |
| | imdsv2_session_token_url": "http://169.254.169.254/latest/api/token" |
| | } |
| | |
| | aws_security_credentials_supplier (Optional [AwsSecurityCredentialsSupplier]): Optional AWS security credentials supplier. |
| | This will be called to supply valid AWS security credentails which will then |
| | be exchanged for Google access tokens. Either an AWS security credentials supplier |
| | or a credential source must be provided. |
| | args (List): Optional positional arguments passed into the underlying :meth:`~external_account.Credentials.__init__` method. |
| | kwargs (Mapping): Optional keyword arguments passed into the underlying :meth:`~external_account.Credentials.__init__` method. |
| | |
| | Raises: |
| | google.auth.exceptions.RefreshError: If an error is encountered during |
| | access token retrieval logic. |
| | ValueError: For invalid parameters. |
| | |
| | .. note:: Typically one of the helper constructors |
| | :meth:`from_file` or |
| | :meth:`from_info` are used instead of calling the constructor directly. |
| | """ |
| | super(Credentials, self).__init__( |
| | audience=audience, |
| | subject_token_type=subject_token_type, |
| | token_url=token_url, |
| | credential_source=credential_source, |
| | *args, |
| | **kwargs |
| | ) |
| | if credential_source is None and aws_security_credentials_supplier is None: |
| | raise exceptions.InvalidValue( |
| | "A valid credential source or AWS security credentials supplier must be provided." |
| | ) |
| | if ( |
| | credential_source is not None |
| | and aws_security_credentials_supplier is not None |
| | ): |
| | raise exceptions.InvalidValue( |
| | "AWS credential cannot have both a credential source and an AWS security credentials supplier." |
| | ) |
| |
|
| | if aws_security_credentials_supplier: |
| | self._aws_security_credentials_supplier = aws_security_credentials_supplier |
| | |
| | self._cred_verification_url = ( |
| | _DEFAULT_AWS_REGIONAL_CREDENTIAL_VERIFICATION_URL |
| | ) |
| | else: |
| | environment_id = credential_source.get("environment_id") or "" |
| | self._aws_security_credentials_supplier = _DefaultAwsSecurityCredentialsSupplier( |
| | credential_source |
| | ) |
| | self._cred_verification_url = credential_source.get( |
| | "regional_cred_verification_url" |
| | ) |
| |
|
| | |
| | matches = re.match(r"^(aws)([\d]+)$", environment_id) |
| | if matches: |
| | env_id, env_version = matches.groups() |
| | else: |
| | env_id, env_version = (None, None) |
| |
|
| | if env_id != "aws" or self._cred_verification_url is None: |
| | raise exceptions.InvalidResource( |
| | "No valid AWS 'credential_source' provided" |
| | ) |
| | elif env_version is None or int(env_version) != 1: |
| | raise exceptions.InvalidValue( |
| | "aws version '{}' is not supported in the current build.".format( |
| | env_version |
| | ) |
| | ) |
| |
|
| | self._target_resource = audience |
| | self._request_signer = None |
| |
|
| | def retrieve_subject_token(self, request): |
| | """Retrieves the subject token using the credential_source object. |
| | The subject token is a serialized `AWS GetCallerIdentity signed request`_. |
| | |
| | The logic is summarized as: |
| | |
| | Retrieve the AWS region from the AWS_REGION or AWS_DEFAULT_REGION |
| | environment variable or from the AWS metadata server availability-zone |
| | if not found in the environment variable. |
| | |
| | Check AWS credentials in environment variables. If not found, retrieve |
| | from the AWS metadata server security-credentials endpoint. |
| | |
| | When retrieving AWS credentials from the metadata server |
| | security-credentials endpoint, the AWS role needs to be determined by |
| | calling the security-credentials endpoint without any argument. Then the |
| | credentials can be retrieved via: security-credentials/role_name |
| | |
| | Generate the signed request to AWS STS GetCallerIdentity action. |
| | |
| | Inject x-goog-cloud-target-resource into header and serialize the |
| | signed request. This will be the subject-token to pass to GCP STS. |
| | |
| | .. _AWS GetCallerIdentity signed request: |
| | https://cloud.google.com/iam/docs/access-resources-aws#exchange-token |
| | |
| | Args: |
| | request (google.auth.transport.Request): A callable used to make |
| | HTTP requests. |
| | Returns: |
| | str: The retrieved subject token. |
| | """ |
| |
|
| | |
| | |
| | if self._request_signer is None: |
| | self._region = self._aws_security_credentials_supplier.get_aws_region( |
| | self._supplier_context, request |
| | ) |
| | self._request_signer = RequestSigner(self._region) |
| |
|
| | |
| | |
| | aws_security_credentials = self._aws_security_credentials_supplier.get_aws_security_credentials( |
| | self._supplier_context, request |
| | ) |
| | |
| | |
| | request_options = self._request_signer.get_request_options( |
| | aws_security_credentials, |
| | self._cred_verification_url.replace("{region}", self._region), |
| | "POST", |
| | ) |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | request_headers = request_options.get("headers") |
| | |
| | |
| | |
| | |
| | request_headers["x-goog-cloud-target-resource"] = self._target_resource |
| |
|
| | |
| | aws_signed_req = {} |
| | aws_signed_req["url"] = request_options.get("url") |
| | aws_signed_req["method"] = request_options.get("method") |
| | aws_signed_req["headers"] = [] |
| | |
| | for key in request_headers.keys(): |
| | aws_signed_req["headers"].append( |
| | {"key": key, "value": request_headers[key]} |
| | ) |
| |
|
| | return urllib.parse.quote( |
| | json.dumps(aws_signed_req, separators=(",", ":"), sort_keys=True) |
| | ) |
| |
|
| | def _create_default_metrics_options(self): |
| | metrics_options = super(Credentials, self)._create_default_metrics_options() |
| | metrics_options["source"] = "aws" |
| | if self._has_custom_supplier(): |
| | metrics_options["source"] = "programmatic" |
| | return metrics_options |
| |
|
| | def _has_custom_supplier(self): |
| | return self._credential_source is None |
| |
|
| | def _constructor_args(self): |
| | args = super(Credentials, self)._constructor_args() |
| | |
| | if self._has_custom_supplier(): |
| | args.update( |
| | { |
| | "aws_security_credentials_supplier": self._aws_security_credentials_supplier |
| | } |
| | ) |
| | return args |
| |
|
| | @classmethod |
| | def from_info(cls, info, **kwargs): |
| | """Creates an AWS Credentials instance from parsed external account info. |
| | |
| | Args: |
| | info (Mapping[str, str]): The AWS external account info in Google |
| | format. |
| | kwargs: Additional arguments to pass to the constructor. |
| | |
| | Returns: |
| | google.auth.aws.Credentials: The constructed credentials. |
| | |
| | Raises: |
| | ValueError: For invalid parameters. |
| | """ |
| | aws_security_credentials_supplier = info.get( |
| | "aws_security_credentials_supplier" |
| | ) |
| | kwargs.update( |
| | {"aws_security_credentials_supplier": aws_security_credentials_supplier} |
| | ) |
| | return super(Credentials, cls).from_info(info, **kwargs) |
| |
|
| | @classmethod |
| | def from_file(cls, filename, **kwargs): |
| | """Creates an AWS Credentials instance from an external account json file. |
| | |
| | Args: |
| | filename (str): The path to the AWS external account json file. |
| | kwargs: Additional arguments to pass to the constructor. |
| | |
| | Returns: |
| | google.auth.aws.Credentials: The constructed credentials. |
| | """ |
| | return super(Credentials, cls).from_file(filename, **kwargs) |
| |
|