blob: 9dc434c7e92ee4097f0055e854727a4a1b54eaf2 [file] [log] [blame]
// Copyright 2021 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package access
import (
"context"
"encoding/json"
"errors"
"fmt"
"log"
"net/http"
"time"
grpcauth "github.com/grpc-ecosystem/go-grpc-middleware/auth"
"google.golang.org/api/idtoken"
"google.golang.org/grpc"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/metadata"
"google.golang.org/grpc/status"
)
type contextKeyIAP string
const (
// contextIAP is the key used to store IAP provided fields in the context.
contextIAP contextKeyIAP = contextKeyIAP("IAP-JWT")
// IAPHeaderJWT is the header IAP stores the JWT token in.
iapHeaderJWT = "X-Goog-IAP-JWT-Assertion"
// IAPSkipAudienceValidation is the audience string used when the validation is not
// necessary. https://pkg.go.dev/google.golang.org/api/idtoken#Validate
IAPSkipAudienceValidation = ""
)
// IAPFields contains the values for the headers retrieved from Identity Aware
// Proxy.
type IAPFields struct {
// Email contains the user's email address
// For example, "example@gmail.com"
Email string
// ID contains a unique identifier for the user
// For example, "accounts.google.com:userIDvalue"
ID string
}
// IAPFromContext retrieves the IAPFields stored in the context if it exists.
func IAPFromContext(ctx context.Context) (*IAPFields, error) {
v := ctx.Value(contextIAP)
if v == nil {
return nil, fmt.Errorf("IAP fields not found in context")
}
iap, ok := v.(IAPFields)
if !ok {
return nil, fmt.Errorf("context value retrieved does not match expected type")
}
return &iap, nil
}
func RequireIAPAuthHandler(h http.Handler, audience string) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
jwt := r.Header.Get("x-goog-iap-jwt-assertion")
if jwt == "" {
w.WriteHeader(http.StatusUnauthorized)
fmt.Fprintf(w, "must run under IAP\n")
return
}
iap, err := validateIAPJWT(r.Context(), jwt, audience, idtoken.Validate)
if err != nil {
w.WriteHeader(http.StatusUnauthorized)
log.Printf("JWT validation error: %v", err)
return
}
ctx := ContextWithIAP(r.Context(), iap)
h.ServeHTTP(w, r.WithContext(ctx))
})
}
// iapAuthFunc creates an authentication function used to create a GRPC interceptor.
// It ensures that the caller has successfully authenticated via IAP. If the caller
// has authenticated, the headers created by IAP will be added to the request scope
// context passed down to the server implementation.
// https://cloud.google.com/iap/docs/signed-headers-howto
func iapAuthFunc(audience string, validatorFn validator) grpcauth.AuthFunc {
return func(ctx context.Context) (context.Context, error) {
md, ok := metadata.FromIncomingContext(ctx)
if !ok {
return ctx, status.Error(codes.Internal, codes.Internal.String())
}
jwtHeaders := md.Get(iapHeaderJWT)
if len(jwtHeaders) == 0 {
return ctx, status.Error(codes.Unauthenticated, "IAP JWT not found in request")
}
iap, err := validateIAPJWT(ctx, jwtHeaders[0], audience, validatorFn)
if err != nil {
return nil, status.Error(codes.Unauthenticated, err.Error())
}
return ContextWithIAP(ctx, iap), nil
}
}
func validateIAPJWT(ctx context.Context, jwt, audience string, validatorFn validator) (IAPFields, error) {
payload, err := validatorFn(ctx, jwt, audience)
if err != nil {
log.Printf("access: error validating JWT: %s", err)
return IAPFields{}, errors.New("unable to authenticate")
}
if payload.Issuer != "https://cloud.google.com/iap" {
log.Printf("access: incorrect issuer: %q", payload.Issuer)
return IAPFields{}, errors.New("incorrect issuer")
}
if payload.Expires+30 < time.Now().Unix() || payload.IssuedAt-30 > time.Now().Unix() {
log.Printf("Bad JWT times: expires %v, issued %v", time.Unix(payload.Expires, 0), time.Unix(payload.IssuedAt, 0))
return IAPFields{}, errors.New("JWT timestamp invalid")
}
// Always prefer email and ID from JWT over the headers.
//
// https://cloud.google.com/iap/docs/signed-headers-howto#retrieving_the_user_identity
//
// Note that unlike the header, the JWT email does not have a "accounts.google.com:" prefix.
// TODO: idtoken.Payload doesn't include email for some reason, so we
// get it from claims, which _should_ also contain it.
email, ok := payload.Claims["email"].(string)
if !ok {
return IAPFields{}, fmt.Errorf("JWT email %v (%T) is not a string", payload.Claims["email"], payload.Claims["email"])
}
if email == "" {
return IAPFields{}, fmt.Errorf("JWT missing email claim")
}
if payload.Subject == "" {
return IAPFields{}, fmt.Errorf("JWT missing subject")
}
return IAPFields{
Email: email,
ID: payload.Subject,
}, nil
}
// ContextWithIAP adds the iap fields to the context.
func ContextWithIAP(ctx context.Context, iap IAPFields) context.Context {
return context.WithValue(ctx, contextIAP, iap)
}
// RequireIAPAuthUnaryInterceptor creates an authentication interceptor for a GRPC
// server. This requires Identity Aware Proxy authentication. Upon a successful authentication
// the associated headers will be copied into the request context.
func RequireIAPAuthUnaryInterceptor(audience string) grpc.UnaryServerInterceptor {
return grpcauth.UnaryServerInterceptor(iapAuthFunc(audience, idtoken.Validate))
}
// RequireIAPAuthStreamInterceptor creates an authentication interceptor for a GRPC
// streaming server. This requires Identity Aware Proxy authentication. Upon a successful
// authentication the associated headers will be copied into the request context.
func RequireIAPAuthStreamInterceptor(audience string) grpc.StreamServerInterceptor {
return grpcauth.StreamServerInterceptor(iapAuthFunc(audience, idtoken.Validate))
}
// validator is a function type for the validator function. The primary purpose is to be able to
// replace the validator function.
type validator func(ctx context.Context, token, audiance string) (*idtoken.Payload, error)
// IAPAudienceGCE returns the jwt audience for GCE and GKE services.
// The project number is the numerical GCP project number the service is deployed in.
// The service ID is the identifier for the backend service used to route IAP requests.
// https://cloud.google.com/iap/docs/signed-headers-howto
func IAPAudienceGCE(projectNumber int64, serviceID string) string {
return fmt.Sprintf("/projects/%d/global/backendServices/%s", projectNumber, serviceID)
}
// IAPAudienceAppEngine returns the JWT audience for App Engine services.
// The project number is the numerical GCP project number the service is deployed in.
// The project ID is the textual identifier for the GCP project that the App Engine instance is deployed in.
// https://cloud.google.com/iap/docs/signed-headers-howto
func IAPAudienceAppEngine(projectNumber int64, projectID string) string {
return fmt.Sprintf("/projects/%d/apps/%s", projectNumber, projectID)
}
// FakeContextWithOutgoingIAPAuth adds the iap fields to the metadata of an outgoing GRPC request and
// should only be used for testing.
func FakeContextWithOutgoingIAPAuth(ctx context.Context, iap IAPFields) context.Context {
// Instead of a real JWT, we simply pass through the IAP fields we want
// to get out from FakeIAPAuthFunc.
b, err := json.Marshal(iap)
if err != nil {
panic(fmt.Sprintf("error marshalling %+v: %v", iap, err))
}
md := metadata.New(map[string]string{
iapHeaderJWT: string(b),
})
return metadata.NewOutgoingContext(ctx, md)
}
// FakeIAPAuthFunc provides a fake IAP authentication validation and should only be used for testing.
func FakeIAPAuthFunc() grpcauth.AuthFunc {
return iapAuthFunc("TESTING", func(ctx context.Context, token, audience string) (*idtoken.Payload, error) {
var iap IAPFields
if err := json.Unmarshal([]byte(token), &iap); err != nil {
// Panic because this is an internal test infra
// problem. We don't want a problem here masked by
// passing tests because a higher level simply treats
// this as unauthenticated.
panic(fmt.Sprintf("error unmarshalling %s: %v", token, err))
}
payload := &idtoken.Payload{
Issuer: "https://cloud.google.com/iap",
Audience: audience,
Expires: time.Now().Add(time.Minute).Unix(),
IssuedAt: time.Now().Add(-time.Minute).Unix(),
Subject: iap.ID,
}
if iap.Email != "" {
payload.Claims = map[string]any{
"email": iap.Email,
}
}
return payload, nil
})
}
// FakeIAPAuthInterceptorOptions provides the GRPC server options for fake IAP authentication
// and should only be used for testing.
func FakeIAPAuthInterceptorOptions() []grpc.ServerOption {
return []grpc.ServerOption{
grpc.UnaryInterceptor(grpcauth.UnaryServerInterceptor(FakeIAPAuthFunc())),
grpc.StreamInterceptor(grpcauth.StreamServerInterceptor(FakeIAPAuthFunc())),
}
}