319 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			319 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
// Copyright 2020 Google LLC.
 | 
						|
// Use of this source code is governed by a BSD-style
 | 
						|
// license that can be found in the LICENSE file.
 | 
						|
 | 
						|
// cba.go (certificate-based access) contains utils for implementing Device Certificate
 | 
						|
// Authentication according to https://google.aip.dev/auth/4114 and Default Credentials
 | 
						|
// for Google Cloud Virtual Environments according to https://google.aip.dev/auth/4115.
 | 
						|
//
 | 
						|
// The overall logic for DCA is as follows:
 | 
						|
//  1. If both endpoint override and client certificate are specified, use them as is.
 | 
						|
//  2. If user does not specify client certificate, we will attempt to use default
 | 
						|
//     client certificate.
 | 
						|
//  3. If user does not specify endpoint override, we will use defaultMtlsEndpoint if
 | 
						|
//     client certificate is available and defaultEndpoint otherwise.
 | 
						|
//
 | 
						|
// Implications of the above logic:
 | 
						|
//  1. If the user specifies a non-mTLS endpoint override but client certificate is
 | 
						|
//     available, we will pass along the cert anyway and let the server decide what to do.
 | 
						|
//  2. If the user specifies an mTLS endpoint override but client certificate is not
 | 
						|
//     available, we will not fail-fast, but let backend throw error when connecting.
 | 
						|
//
 | 
						|
// If running within Google's cloud environment, and client certificate is not specified
 | 
						|
// and not available through DCA, we will try mTLS with credentials held by
 | 
						|
// the Secure Session Agent, which is part of Google's cloud infrastructure.
 | 
						|
//
 | 
						|
// We would like to avoid introducing client-side logic that parses whether the
 | 
						|
// endpoint override is an mTLS url, since the url pattern may change at anytime.
 | 
						|
//
 | 
						|
// This package is not intended for use by end developers. Use the
 | 
						|
// google.golang.org/api/option package to configure API clients.
 | 
						|
 | 
						|
// Package internal supports the options and transport packages.
 | 
						|
package internal
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"crypto/tls"
 | 
						|
	"errors"
 | 
						|
	"net"
 | 
						|
	"net/url"
 | 
						|
	"os"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/google/s2a-go"
 | 
						|
	"github.com/google/s2a-go/fallback"
 | 
						|
	"google.golang.org/api/internal/cert"
 | 
						|
	"google.golang.org/grpc/credentials"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	mTLSModeAlways = "always"
 | 
						|
	mTLSModeNever  = "never"
 | 
						|
	mTLSModeAuto   = "auto"
 | 
						|
 | 
						|
	// Experimental: if true, the code will try MTLS with S2A as the default for transport security. Default value is false.
 | 
						|
	googleAPIUseS2AEnv = "EXPERIMENTAL_GOOGLE_API_USE_S2A"
 | 
						|
 | 
						|
	universeDomainPlaceholder = "UNIVERSE_DOMAIN"
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	errUniverseNotSupportedMTLS = errors.New("mTLS is not supported in any universe other than googleapis.com")
 | 
						|
)
 | 
						|
 | 
						|
// getClientCertificateSourceAndEndpoint is a convenience function that invokes
 | 
						|
// getClientCertificateSource and getEndpoint sequentially and returns the client
 | 
						|
// cert source and endpoint as a tuple.
 | 
						|
func getClientCertificateSourceAndEndpoint(settings *DialSettings) (cert.Source, string, error) {
 | 
						|
	clientCertSource, err := getClientCertificateSource(settings)
 | 
						|
	if err != nil {
 | 
						|
		return nil, "", err
 | 
						|
	}
 | 
						|
	endpoint, err := getEndpoint(settings, clientCertSource)
 | 
						|
	if err != nil {
 | 
						|
		return nil, "", err
 | 
						|
	}
 | 
						|
	// TODO(chrisdsmith): https://github.com/googleapis/google-api-go-client/issues/2359
 | 
						|
	if settings.Endpoint == "" && !settings.IsUniverseDomainGDU() && settings.DefaultEndpointTemplate != "" {
 | 
						|
		// TODO(chrisdsmith): https://github.com/googleapis/google-api-go-client/issues/2359
 | 
						|
		// if settings.DefaultEndpointTemplate == "" {
 | 
						|
		// 	return nil, "", errors.New("internaloption.WithDefaultEndpointTemplate is required if option.WithUniverseDomain is not googleapis.com")
 | 
						|
		// }
 | 
						|
		endpoint = resolvedDefaultEndpoint(settings)
 | 
						|
	}
 | 
						|
	return clientCertSource, endpoint, nil
 | 
						|
}
 | 
						|
 | 
						|
type transportConfig struct {
 | 
						|
	clientCertSource cert.Source // The client certificate source.
 | 
						|
	endpoint         string      // The corresponding endpoint to use based on client certificate source.
 | 
						|
	s2aAddress       string      // The S2A address if it can be used, otherwise an empty string.
 | 
						|
	s2aMTLSEndpoint  string      // The MTLS endpoint to use with S2A.
 | 
						|
}
 | 
						|
 | 
						|
func getTransportConfig(settings *DialSettings) (*transportConfig, error) {
 | 
						|
	clientCertSource, endpoint, err := getClientCertificateSourceAndEndpoint(settings)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	defaultTransportConfig := transportConfig{
 | 
						|
		clientCertSource: clientCertSource,
 | 
						|
		endpoint:         endpoint,
 | 
						|
		s2aAddress:       "",
 | 
						|
		s2aMTLSEndpoint:  "",
 | 
						|
	}
 | 
						|
 | 
						|
	if !shouldUseS2A(clientCertSource, settings) {
 | 
						|
		return &defaultTransportConfig, nil
 | 
						|
	}
 | 
						|
	if !settings.IsUniverseDomainGDU() {
 | 
						|
		return nil, errUniverseNotSupportedMTLS
 | 
						|
	}
 | 
						|
 | 
						|
	s2aAddress := GetS2AAddress()
 | 
						|
	if s2aAddress == "" {
 | 
						|
		return &defaultTransportConfig, nil
 | 
						|
	}
 | 
						|
	return &transportConfig{
 | 
						|
		clientCertSource: clientCertSource,
 | 
						|
		endpoint:         endpoint,
 | 
						|
		s2aAddress:       s2aAddress,
 | 
						|
		s2aMTLSEndpoint:  settings.DefaultMTLSEndpoint,
 | 
						|
	}, nil
 | 
						|
}
 | 
						|
 | 
						|
// getClientCertificateSource returns a default client certificate source, if
 | 
						|
// not provided by the user.
 | 
						|
//
 | 
						|
// A nil default source can be returned if the source does not exist. Any exceptions
 | 
						|
// encountered while initializing the default source will be reported as client
 | 
						|
// error (ex. corrupt metadata file).
 | 
						|
//
 | 
						|
// Important Note: For now, the environment variable GOOGLE_API_USE_CLIENT_CERTIFICATE
 | 
						|
// must be set to "true" to allow certificate to be used (including user provided
 | 
						|
// certificates). For details, see AIP-4114.
 | 
						|
func getClientCertificateSource(settings *DialSettings) (cert.Source, error) {
 | 
						|
	if !isClientCertificateEnabled() {
 | 
						|
		return nil, nil
 | 
						|
	} else if settings.ClientCertSource != nil {
 | 
						|
		return settings.ClientCertSource, nil
 | 
						|
	} else {
 | 
						|
		return cert.DefaultSource()
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func isClientCertificateEnabled() bool {
 | 
						|
	useClientCert := os.Getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE")
 | 
						|
	// TODO(andyrzhao): Update default to return "true" after DCA feature is fully released.
 | 
						|
	return strings.ToLower(useClientCert) == "true"
 | 
						|
}
 | 
						|
 | 
						|
// getEndpoint returns the endpoint for the service, taking into account the
 | 
						|
// user-provided endpoint override "settings.Endpoint".
 | 
						|
//
 | 
						|
// If no endpoint override is specified, we will either return the default endpoint or
 | 
						|
// the default mTLS endpoint if a client certificate is available.
 | 
						|
//
 | 
						|
// You can override the default endpoint choice (mtls vs. regular) by setting the
 | 
						|
// GOOGLE_API_USE_MTLS_ENDPOINT environment variable.
 | 
						|
//
 | 
						|
// If the endpoint override is an address (host:port) rather than full base
 | 
						|
// URL (ex. https://...), then the user-provided address will be merged into
 | 
						|
// the default endpoint. For example, WithEndpoint("myhost:8000") and
 | 
						|
// WithDefaultEndpoint("https://foo.com/bar/baz") will return "https://myhost:8080/bar/baz"
 | 
						|
func getEndpoint(settings *DialSettings, clientCertSource cert.Source) (string, error) {
 | 
						|
	if settings.Endpoint == "" {
 | 
						|
		if isMTLS(clientCertSource) {
 | 
						|
			if !settings.IsUniverseDomainGDU() {
 | 
						|
				return "", errUniverseNotSupportedMTLS
 | 
						|
			}
 | 
						|
			return settings.DefaultMTLSEndpoint, nil
 | 
						|
		}
 | 
						|
		return resolvedDefaultEndpoint(settings), nil
 | 
						|
	}
 | 
						|
	if strings.Contains(settings.Endpoint, "://") {
 | 
						|
		// User passed in a full URL path, use it verbatim.
 | 
						|
		return settings.Endpoint, nil
 | 
						|
	}
 | 
						|
	if resolvedDefaultEndpoint(settings) == "" {
 | 
						|
		// If DefaultEndpoint is not configured, use the user provided endpoint verbatim.
 | 
						|
		// This allows a naked "host[:port]" URL to be used with GRPC Direct Path.
 | 
						|
		return settings.Endpoint, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// Assume user-provided endpoint is host[:port], merge it with the default endpoint.
 | 
						|
	return mergeEndpoints(resolvedDefaultEndpoint(settings), settings.Endpoint)
 | 
						|
}
 | 
						|
 | 
						|
func isMTLS(clientCertSource cert.Source) bool {
 | 
						|
	mtlsMode := getMTLSMode()
 | 
						|
	return mtlsMode == mTLSModeAlways || (clientCertSource != nil && mtlsMode == mTLSModeAuto)
 | 
						|
}
 | 
						|
 | 
						|
// resolvedDefaultEndpoint returns the DefaultEndpointTemplate merged with the
 | 
						|
// Universe Domain if the DefaultEndpointTemplate is set, otherwise returns the
 | 
						|
// deprecated DefaultEndpoint value.
 | 
						|
func resolvedDefaultEndpoint(settings *DialSettings) string {
 | 
						|
	if settings.DefaultEndpointTemplate == "" {
 | 
						|
		return settings.DefaultEndpoint
 | 
						|
	}
 | 
						|
	return strings.Replace(settings.DefaultEndpointTemplate, universeDomainPlaceholder, settings.GetUniverseDomain(), 1)
 | 
						|
}
 | 
						|
 | 
						|
func getMTLSMode() string {
 | 
						|
	mode := os.Getenv("GOOGLE_API_USE_MTLS_ENDPOINT")
 | 
						|
	if mode == "" {
 | 
						|
		mode = os.Getenv("GOOGLE_API_USE_MTLS") // Deprecated.
 | 
						|
	}
 | 
						|
	if mode == "" {
 | 
						|
		return mTLSModeAuto
 | 
						|
	}
 | 
						|
	return strings.ToLower(mode)
 | 
						|
}
 | 
						|
 | 
						|
func mergeEndpoints(baseURL, newHost string) (string, error) {
 | 
						|
	u, err := url.Parse(fixScheme(baseURL))
 | 
						|
	if err != nil {
 | 
						|
		return "", err
 | 
						|
	}
 | 
						|
	return strings.Replace(baseURL, u.Host, newHost, 1), nil
 | 
						|
}
 | 
						|
 | 
						|
func fixScheme(baseURL string) string {
 | 
						|
	if !strings.Contains(baseURL, "://") {
 | 
						|
		return "https://" + baseURL
 | 
						|
	}
 | 
						|
	return baseURL
 | 
						|
}
 | 
						|
 | 
						|
// GetGRPCTransportConfigAndEndpoint returns an instance of credentials.TransportCredentials, and the
 | 
						|
// corresponding endpoint to use for GRPC client.
 | 
						|
func GetGRPCTransportConfigAndEndpoint(settings *DialSettings) (credentials.TransportCredentials, string, error) {
 | 
						|
	config, err := getTransportConfig(settings)
 | 
						|
	if err != nil {
 | 
						|
		return nil, "", err
 | 
						|
	}
 | 
						|
 | 
						|
	defaultTransportCreds := credentials.NewTLS(&tls.Config{
 | 
						|
		GetClientCertificate: config.clientCertSource,
 | 
						|
	})
 | 
						|
	if config.s2aAddress == "" {
 | 
						|
		return defaultTransportCreds, config.endpoint, nil
 | 
						|
	}
 | 
						|
 | 
						|
	var fallbackOpts *s2a.FallbackOptions
 | 
						|
	// In case of S2A failure, fall back to the endpoint that would've been used without S2A.
 | 
						|
	if fallbackHandshake, err := fallback.DefaultFallbackClientHandshakeFunc(config.endpoint); err == nil {
 | 
						|
		fallbackOpts = &s2a.FallbackOptions{
 | 
						|
			FallbackClientHandshakeFunc: fallbackHandshake,
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	s2aTransportCreds, err := s2a.NewClientCreds(&s2a.ClientOptions{
 | 
						|
		S2AAddress:   config.s2aAddress,
 | 
						|
		FallbackOpts: fallbackOpts,
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		// Use default if we cannot initialize S2A client transport credentials.
 | 
						|
		return defaultTransportCreds, config.endpoint, nil
 | 
						|
	}
 | 
						|
	return s2aTransportCreds, config.s2aMTLSEndpoint, nil
 | 
						|
}
 | 
						|
 | 
						|
// GetHTTPTransportConfigAndEndpoint returns a client certificate source, a function for dialing MTLS with S2A,
 | 
						|
// and the endpoint to use for HTTP client.
 | 
						|
func GetHTTPTransportConfigAndEndpoint(settings *DialSettings) (cert.Source, func(context.Context, string, string) (net.Conn, error), string, error) {
 | 
						|
	config, err := getTransportConfig(settings)
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, "", err
 | 
						|
	}
 | 
						|
 | 
						|
	if config.s2aAddress == "" {
 | 
						|
		return config.clientCertSource, nil, config.endpoint, nil
 | 
						|
	}
 | 
						|
 | 
						|
	var fallbackOpts *s2a.FallbackOptions
 | 
						|
	// In case of S2A failure, fall back to the endpoint that would've been used without S2A.
 | 
						|
	if fallbackURL, err := url.Parse(config.endpoint); err == nil {
 | 
						|
		if fallbackDialer, fallbackServerAddr, err := fallback.DefaultFallbackDialerAndAddress(fallbackURL.Hostname()); err == nil {
 | 
						|
			fallbackOpts = &s2a.FallbackOptions{
 | 
						|
				FallbackDialer: &s2a.FallbackDialer{
 | 
						|
					Dialer:     fallbackDialer,
 | 
						|
					ServerAddr: fallbackServerAddr,
 | 
						|
				},
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	dialTLSContextFunc := s2a.NewS2ADialTLSContextFunc(&s2a.ClientOptions{
 | 
						|
		S2AAddress:   config.s2aAddress,
 | 
						|
		FallbackOpts: fallbackOpts,
 | 
						|
	})
 | 
						|
	return nil, dialTLSContextFunc, config.s2aMTLSEndpoint, nil
 | 
						|
}
 | 
						|
 | 
						|
func shouldUseS2A(clientCertSource cert.Source, settings *DialSettings) bool {
 | 
						|
	// If client cert is found, use that over S2A.
 | 
						|
	if clientCertSource != nil {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	// If EXPERIMENTAL_GOOGLE_API_USE_S2A is not set to true, skip S2A.
 | 
						|
	if !isGoogleS2AEnabled() {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	// If DefaultMTLSEndpoint is not set or has endpoint override, skip S2A.
 | 
						|
	if settings.DefaultMTLSEndpoint == "" || settings.Endpoint != "" {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	// If custom HTTP client is provided, skip S2A.
 | 
						|
	if settings.HTTPClient != nil {
 | 
						|
		return false
 | 
						|
	}
 | 
						|
	return !settings.EnableDirectPath && !settings.EnableDirectPathXds
 | 
						|
}
 | 
						|
 | 
						|
func isGoogleS2AEnabled() bool {
 | 
						|
	return strings.ToLower(os.Getenv(googleAPIUseS2AEnv)) == "true"
 | 
						|
}
 |