diff --git a/provider/indexer-gcp/pom.xml b/provider/indexer-gcp/pom.xml index 958bcfa4c8f0eed42631b82fdd25e8b0792bed8f..b3ac157799678d810aa662b39f8c66e07a28f9b1 100644 --- a/provider/indexer-gcp/pom.xml +++ b/provider/indexer-gcp/pom.xml @@ -41,7 +41,7 @@ <dependency> <groupId>com.google.cloud</groupId> <artifactId>google-cloud-logging</artifactId> - <version>1.72.0</version> + <version>2.3.1</version> </dependency> <dependency> <groupId>com.google.apis</groupId> @@ -70,11 +70,6 @@ <artifactId>google-api-client</artifactId> <version>1.30.11</version> </dependency> - <dependency> - <groupId>io.grpc</groupId> - <artifactId>grpc-core</artifactId> - <version>1.38.1</version> - </dependency> <dependency> <groupId>org.elasticsearch</groupId> diff --git a/provider/indexer-gcp/src/main/java/org/opengroup/osdu/indexer/util/ServiceAccountJwtGcpClientImpl.java b/provider/indexer-gcp/src/main/java/org/opengroup/osdu/indexer/util/ServiceAccountJwtGcpClientImpl.java index 31477a2a1374c32c63a123e413b26f0ea989dbda..680151671136ea6d942deb84a69c50c94dee8bc6 100644 --- a/provider/indexer-gcp/src/main/java/org/opengroup/osdu/indexer/util/ServiceAccountJwtGcpClientImpl.java +++ b/provider/indexer-gcp/src/main/java/org/opengroup/osdu/indexer/util/ServiceAccountJwtGcpClientImpl.java @@ -15,26 +15,12 @@ package org.opengroup.osdu.indexer.util; import com.auth0.jwt.JWT; -import com.auth0.jwt.exceptions.JWTDecodeException; -import com.google.api.client.json.JsonFactory; -import com.google.api.client.json.jackson2.JacksonFactory; +import com.google.cloud.iam.credentials.v1.GenerateIdTokenResponse; import com.google.cloud.iam.credentials.v1.IamCredentialsClient; import com.google.cloud.iam.credentials.v1.ServiceAccountName; -import com.google.cloud.iam.credentials.v1.SignJwtRequest; -import com.google.cloud.iam.credentials.v1.SignJwtResponse; -import com.google.gson.JsonObject; -import com.google.gson.JsonParser; -import org.apache.http.HttpHeaders; +import java.util.Collections; +import javax.inject.Inject; import org.apache.http.HttpStatus; -import org.apache.http.NameValuePair; -import org.apache.http.client.entity.UrlEncodedFormEntity; -import org.apache.http.client.methods.CloseableHttpResponse; -import org.apache.http.client.methods.HttpPost; -import org.apache.http.entity.ContentType; -import org.apache.http.impl.client.CloseableHttpClient; -import org.apache.http.impl.client.HttpClients; -import org.apache.http.message.BasicNameValuePair; -import org.apache.http.util.EntityUtils; import org.opengroup.osdu.core.common.logging.JaxRsDpsLog; import org.opengroup.osdu.core.common.model.http.AppException; import org.opengroup.osdu.core.common.model.http.DpsHeaders; @@ -43,28 +29,24 @@ import org.opengroup.osdu.core.common.model.tenant.TenantInfo; import org.opengroup.osdu.core.common.provider.interfaces.IJwtCache; import org.opengroup.osdu.core.common.provider.interfaces.ITenantFactory; import org.opengroup.osdu.core.common.util.IServiceAccountJwtClient; +import org.opengroup.osdu.core.gcp.multitenancy.credentials.IamCredentialsProvider; import org.opengroup.osdu.indexer.config.IndexerConfigurationProperties; +import org.springframework.beans.factory.annotation.Value; import org.springframework.context.annotation.Primary; import org.springframework.stereotype.Component; import org.springframework.web.context.annotation.RequestScope; -import javax.inject.Inject; -import java.util.ArrayList; -import java.util.HashMap; -import java.util.List; -import java.util.Map; - @Primary @Component @RequestScope public class ServiceAccountJwtGcpClientImpl implements IServiceAccountJwtClient { - private static final String JWT_AUDIENCE = "https://www.googleapis.com/oauth2/v4/token"; private static final String SERVICE_ACCOUNT_NAME_FORMAT = "projects/-/serviceAccounts/%s"; - private final JsonFactory jsonFactory = new JacksonFactory(); + private final IamCredentialsProvider iamCredentialsProvider = new IamCredentialsProvider(); - private IamCredentialsClient iam; + @Value("GOOGLE_AUDIENCES") + private String audiences; @Inject private ITenantFactory tenantInfoServiceProvider; @@ -94,76 +76,18 @@ public class ServiceAccountJwtGcpClientImpl implements IServiceAccountJwtClient return cachedToken.getTokenValue(); } - // Getting signed JWT - Map<String, Object> signJwtPayload = this.getJWTCreationPayload(tenant); - - ServiceAccountName name = ServiceAccountName.parse(String.format(SERVICE_ACCOUNT_NAME_FORMAT, - tenant.getServiceAccount())); - List<String> delegates = new ArrayList<>(); - delegates.add(tenant.getServiceAccount()); - - SignJwtRequest request = SignJwtRequest.newBuilder() - .setName(name.toString()) - .addAllDelegates(delegates) - .setPayload(jsonFactory.toString(signJwtPayload)) - .build(); - SignJwtResponse signJwtResponse = this.getIamCredentialsClient().signJwt(request); - String signedJwt = signJwtResponse.getSignedJwt(); - - // Getting id token - List<NameValuePair> postParameters = new ArrayList<>(); - postParameters.add(new BasicNameValuePair("grant_type", "urn:ietf:params:oauth:grant-type:jwt-bearer")); - postParameters.add(new BasicNameValuePair("assertion", signedJwt)); - - HttpPost post = new HttpPost(JWT_AUDIENCE); - post.setHeader(HttpHeaders.CONTENT_TYPE, ContentType.APPLICATION_FORM_URLENCODED.getMimeType()); - post.setEntity(new UrlEncodedFormEntity(postParameters, "UTF-8")); - - try(CloseableHttpClient httpclient = HttpClients.createDefault(); - CloseableHttpResponse httpResponse = httpclient.execute(post)) { - JsonObject jsonContent = new JsonParser().parse(EntityUtils.toString(httpResponse.getEntity())).getAsJsonObject(); - - if (!jsonContent.has("id_token")) { - log.error(String.format("Google IAM response: %s", jsonContent.toString())); - throw new AppException(HttpStatus.SC_FORBIDDEN, "Access denied", "The user is not authorized to perform this action"); - } - - String token = jsonContent.get("id_token").getAsString(); + try (IamCredentialsClient iamCredentialsClient = iamCredentialsProvider.getIamCredentialsClient()) { + ServiceAccountName serviceAccountName = ServiceAccountName.parse(String.format(SERVICE_ACCOUNT_NAME_FORMAT, tenant.getServiceAccount())); + GenerateIdTokenResponse idTokenResponse = iamCredentialsClient.generateIdToken(serviceAccountName, Collections.emptyList(), audiences, true); + String token = idTokenResponse.getToken(); IdToken idToken = IdToken.builder().tokenValue(token).expirationTimeMillis(JWT.decode(token).getExpiresAt().getTime()).build(); - this.cacheService.put(tenant.getServiceAccount(), idToken); - return token; } - } catch (JWTDecodeException e) { - throw new AppException(HttpStatus.SC_INTERNAL_SERVER_ERROR, "Persistence error", "Invalid token, error decoding", e); } catch (AppException e) { throw e; } catch (Exception e) { throw new AppException(HttpStatus.SC_INTERNAL_SERVER_ERROR, "Persistence error", "Error generating token", e); } } - - public IamCredentialsClient getIamCredentialsClient() throws Exception { - if (this.iam == null) { - this.iam = IamCredentialsClient.create(); - } - return this.iam; - } - - private Map<String, Object> getJWTCreationPayload(TenantInfo tenantInfo) { - - Map<String, Object> payload = new HashMap<>(); - String googleAudience = properties.getGoogleAudiences(); - if (googleAudience.contains(",")) { - googleAudience = googleAudience.split(",")[0]; - } - payload.put("target_audience", googleAudience); - payload.put("exp", System.currentTimeMillis() / 1000 + 3600); - payload.put("iat", System.currentTimeMillis() / 1000); - payload.put("iss", tenantInfo.getServiceAccount()); - payload.put("aud", JWT_AUDIENCE); - - return payload; - } } diff --git a/provider/indexer-gcp/src/test/java/org/opengroup/osdu/indexer/util/ServiceAccountJwtGcpClientImplTest.java b/provider/indexer-gcp/src/test/java/org/opengroup/osdu/indexer/util/ServiceAccountJwtGcpClientImplTest.java deleted file mode 100644 index 5a5446e665201811f46d135d2b8fc5601a46c979..0000000000000000000000000000000000000000 --- a/provider/indexer-gcp/src/test/java/org/opengroup/osdu/indexer/util/ServiceAccountJwtGcpClientImplTest.java +++ /dev/null @@ -1,174 +0,0 @@ -// Copyright 2017-2019, Schlumberger -// -// Licensed under the Apache License, Version 2.0 (the "License"); -// you may not use this file except in compliance with the License. -// You may obtain a copy of the License at -// -// http://www.apache.org/licenses/LICENSE-2.0 -// -// Unless required by applicable law or agreed to in writing, software -// distributed under the License is distributed on an "AS IS" BASIS, -// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -// See the License for the specific language governing permissions and -// limitations under the License. - -package org.opengroup.osdu.indexer.util; - -import com.google.api.client.googleapis.auth.oauth2.GoogleCredential; -import com.google.api.client.googleapis.javanet.GoogleNetHttpTransport; -import com.google.api.client.http.javanet.NetHttpTransport; -import com.google.api.gax.rpc.UnaryCallable; -import com.google.cloud.iam.credentials.v1.IamCredentialsClient; -import com.google.cloud.iam.credentials.v1.SignJwtRequest; -import com.google.cloud.iam.credentials.v1.SignJwtResponse; -import com.google.cloud.iam.credentials.v1.stub.IamCredentialsStub; -import org.apache.http.HttpStatus; -import org.apache.http.client.methods.CloseableHttpResponse; -import org.apache.http.impl.client.CloseableHttpClient; -import org.apache.http.impl.client.HttpClients; -import org.apache.http.util.EntityUtils; -import org.junit.Assert; -import org.junit.Before; -import org.junit.Ignore; -import org.junit.Test; -import org.junit.runner.RunWith; -import org.mockito.InjectMocks; -import org.mockito.Mock; -import org.mockito.Mockito; -import org.mockito.Spy; -import org.opengroup.osdu.core.common.model.tenant.TenantInfo; -import org.opengroup.osdu.core.common.model.http.AppException; -import org.opengroup.osdu.core.common.logging.JaxRsDpsLog; -import org.opengroup.osdu.core.common.model.search.DeploymentEnvironment; -import org.opengroup.osdu.core.common.model.search.IdToken; -import org.opengroup.osdu.core.common.provider.interfaces.IJwtCache; -import org.opengroup.osdu.indexer.config.IndexerConfigurationProperties; -import org.powermock.core.classloader.annotations.PrepareForTest; -import org.powermock.reflect.Whitebox; -import org.springframework.test.context.junit4.SpringRunner; - -import static org.junit.Assert.fail; -import static org.mockito.Matchers.any; -import static org.mockito.MockitoAnnotations.initMocks; -import static org.powermock.api.mockito.PowerMockito.when; - -@Ignore -@RunWith(SpringRunner.class) -@PrepareForTest({GoogleNetHttpTransport.class, GoogleCredential.class, NetHttpTransport.class, SignJwtResponse.class, HttpClients.class, EntityUtils.class, IndexerConfigurationProperties.class}) -public class ServiceAccountJwtGcpClientImplTest { - - private static final String JWT_TOKEN = "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6Ik1UVXlPREE0TXpFd09BPT0ifQ.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.WQfGr1Xu-6IdaXdoJ9Fwzx8O2el1UkFPWo1vk_ujiAfdOjAR46UG5SrBC7mzC7gYRyK3a4fimBmbv3uRVJjTNXdxXRLZDw0SvXUMIOqjUGLom491ESbrtka_Xz7vGO-tWyDcEQDTfFzQ91LaVN7XdzL18_EDTXZoPhKb-zquyk9WLQxP9Mw-3Yh-UrbvC9nl1-GRn1IVbzp568kqkpOVUFM9alYSGw-oMGDZNt1DIYOJnpGaw2RB5B3AKvNivZH_Xdac7ZTzQbsDOt8B8DL2BphuxcJ9jshCJkM2SHQ15uErv8sfnzMwdF08e_0QcC_30I8eX9l8yOu6TnwwqlXunw"; - - @Mock - private IndexerConfigurationProperties indexerConfigurationProperties; - @Mock - private JaxRsDpsLog log; - @Mock - private GoogleCredential credential; - @Mock - private NetHttpTransport httpTransport; - @Mock - private IamCredentialsClient iam; - @Mock - private IamCredentialsStub iamCredentialsStub; - @Mock - private UnaryCallable<SignJwtRequest, SignJwtResponse> unaryCallable; - @Mock - private CloseableHttpClient httpClient; - @Mock - private CloseableHttpResponse httpResponse; -// @InjectMocks -// private TenantInfoServiceImpl tenantInfoServiceProvider; -// @Mock -// private TenantInfoServiceImpl tenantInfoService; - @Mock - private IJwtCache cacheService; - @InjectMocks @Spy - private ServiceAccountJwtGcpClientImpl sut; - @Before - public void setup() throws Exception { - initMocks(this); - -// mockStatic(GoogleNetHttpTransport.class); -// mockStatic(GoogleCredential.class); -// mockStatic(HttpClients.class); -// mockStatic(EntityUtils.class); -// mockStatic(Config.class); - - when(GoogleNetHttpTransport.newTrustedTransport()).thenReturn(httpTransport); - when(GoogleCredential.getApplicationDefault()).thenReturn(credential); - when(credential.createScopedRequired()).thenReturn(true); - when(credential.createScoped(any())).thenReturn(credential); - when(HttpClients.createDefault()).thenReturn(httpClient); - when(httpClient.execute(any())).thenReturn(httpResponse); - when(indexerConfigurationProperties.getDeploymentEnvironment()).thenReturn(DeploymentEnvironment.LOCAL); - when(indexerConfigurationProperties.getGoogleAudiences()).thenReturn("aud"); - -// when(this.tenantInfoServiceProvider).thenReturn(this.tenantInfoService); - - TenantInfo tenantInfo = new TenantInfo(); - tenantInfo.setServiceAccount("tenant"); -// when(this.tenantInfoService.getTenantInfo()).thenReturn(tenantInfo); - - when(this.sut.getIamCredentialsClient()).thenReturn(iam); - Whitebox.setInternalState(iam, "stub", iamCredentialsStub); - - SignJwtResponse signJwtResponse = SignJwtResponse.getDefaultInstance(); - SignJwtRequest signJwtRequest = SignJwtRequest.newBuilder().build(); - - when(iamCredentialsStub.signJwtCallable()).thenReturn(unaryCallable); - when(unaryCallable.call(any())).thenReturn(signJwtResponse); - when(iam.signJwt(signJwtRequest)).thenReturn(signJwtResponse); - - } - - @Test - public void should_returnCachedToken_givenCachedToken_getIdTokenTest() { - String tokenValue = "tokenValue"; - IdToken idToken = IdToken.builder().tokenValue(tokenValue).expirationTimeMillis(System.currentTimeMillis() + 10000000L).build(); - when(this.cacheService.get(any())).thenReturn(idToken); - - String returnedIdToken = this.sut.getIdToken(tokenValue); - - Assert.assertEquals(tokenValue, returnedIdToken); - } - - @Test - public void should_returnValidToken_getIdTokenTest() throws Exception { - when(EntityUtils.toString(any())).thenReturn(String.format("{\"id_token\":\"%s\"}", JWT_TOKEN)); - - String returnedToken = this.sut.getIdToken("tenant"); - - Assert.assertEquals(JWT_TOKEN, returnedToken); - } - - @Test - public void should_return500_given_invalidJWTResponse_getIdTokenException() { - try { - when(EntityUtils.toString(any())).thenReturn(String.format("{\"id_token\":\"%s\"}", "invalid jwt")); - - this.sut.getIdToken("tenant"); - fail("Should throw exception"); - } catch (AppException e) { - Assert.assertEquals(HttpStatus.SC_INTERNAL_SERVER_ERROR, e.getError().getCode()); - Assert.assertEquals("Invalid token, error decoding", e.getError().getMessage()); - } catch (Exception e) { - fail("Should not throw this exception" + e.getMessage()); - } - } - - @Test - public void should_return403_given_missingIdTokenResponse_getIdTokenException() { - try { - when(EntityUtils.toString(any())).thenReturn("{}"); - - this.sut.getIdToken("tenant"); - fail("Should throw exception"); - } catch (AppException e) { - Assert.assertEquals(HttpStatus.SC_FORBIDDEN, e.getError().getCode()); - Assert.assertEquals("The user is not authorized to perform this action", e.getError().getMessage()); - } catch (Exception e) { - fail("Should not throw this exception" + e.getMessage()); - } - } -}