-
Notifications
You must be signed in to change notification settings - Fork 82
/
federation_client_oke_workload_identity.go
215 lines (180 loc) · 6.61 KB
/
federation_client_oke_workload_identity.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
// Copyright (c) 2016, 2018, 2024, Oracle and/or its affiliates. All rights reserved.
// This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
package auth
import (
"bytes"
"crypto/rsa"
"crypto/tls"
"crypto/x509"
"encoding/base64"
"encoding/json"
"fmt"
"io"
"net/http"
"sync"
"time"
"github.com/oracle/oci-go-sdk/v65/common"
"github.com/oracle/oci-go-sdk/v65/common/utils"
)
const (
rpstValidForRatio float64 = 0.5
)
// Workload RPST Issuance Service (WRIS)
// x509FederationClientForOkeWorkloadIdentity retrieves a security token from Auth service.
type x509FederationClientForOkeWorkloadIdentity struct {
tenancyID string
sessionKeySupplier sessionKeySupplier
securityToken securityToken
authClient *common.BaseClient
mux sync.Mutex
proxymuxEndpoint string
saTokenProvider ServiceAccountTokenProvider
kubernetesServiceAccountCert *x509.CertPool
}
func newX509FederationClientForOkeWorkloadIdentity(endpoint string, saTokenProvider ServiceAccountTokenProvider,
kubernetesServiceAccountCert *x509.CertPool) (federationClient, error) {
client := &x509FederationClientForOkeWorkloadIdentity{
proxymuxEndpoint: endpoint,
saTokenProvider: saTokenProvider,
kubernetesServiceAccountCert: kubernetesServiceAccountCert,
}
client.sessionKeySupplier = newSessionKeySupplier()
return client, nil
}
func (c *x509FederationClientForOkeWorkloadIdentity) renewSecurityToken() (err error) {
if err = c.sessionKeySupplier.Refresh(); err != nil {
return fmt.Errorf("failed to refresh session key: %s", err.Error())
}
common.Logf("Renewing security token at: %v\n", time.Now().Format("15:04:05.000"))
if c.securityToken, err = c.getSecurityToken(); err != nil {
return fmt.Errorf("failed to get security token: %s", err.Error())
}
common.Logf("Security token renewed at: %v\n", time.Now().Format("15:04:05.000"))
return nil
}
type workloadIdentityRequestPayload struct {
Podkey string `json:"podKey"`
}
type token struct {
Token string
}
// getSecurityToken get security token from Proxymux
func (c *x509FederationClientForOkeWorkloadIdentity) getSecurityToken() (securityToken, error) {
client := http.Client{
Timeout: 30 * time.Second,
Transport: &http.Transport{
TLSClientConfig: &tls.Config{
RootCAs: c.kubernetesServiceAccountCert,
},
},
}
publicKey := string(c.sessionKeySupplier.PublicKeyPemRaw())
common.Logf("Public Key for OKE Workload Identity is:", publicKey)
rawPayload := workloadIdentityRequestPayload{Podkey: publicKey}
payload, err := json.Marshal(rawPayload)
if err != nil {
return nil, fmt.Errorf("error getting security token%s", err)
}
common.Logf("Payload for OKE Workload Identity is:", string(payload))
request, err := http.NewRequest(http.MethodPost, c.proxymuxEndpoint, bytes.NewBuffer(payload))
if err != nil {
common.Logf("error %s", err)
return nil, fmt.Errorf("error getting security token %s", err)
}
kubernetesServiceAccountToken, err := c.saTokenProvider.ServiceAccountToken()
if err != nil {
common.Logf("error %s", err)
return nil, fmt.Errorf("error getting service account token %s", err)
}
common.Logf("Service Account Token for OKE Workload Identity is: ", kubernetesServiceAccountToken)
request.Header.Add("Authorization", "Bearer "+kubernetesServiceAccountToken)
request.Header.Set("Content-Type", "application/json")
opcRequestID := utils.GenerateOpcRequestID()
request.Header.Set("opc-request-id", opcRequestID)
response, err := client.Do(request)
if err != nil {
return nil, fmt.Errorf("error %s", err)
}
var body bytes.Buffer
defer func(body io.ReadCloser) {
err := body.Close()
if err != nil {
common.Logf("error %s", err)
}
}(response.Body)
statusCode := response.StatusCode
if statusCode != http.StatusOK {
return nil, fmt.Errorf("failed to get a RPST token from Proxymux: URL: %s, Status: %s, Message: %s",
c.proxymuxEndpoint, response.Status, body.String())
}
if _, err = body.ReadFrom(response.Body); err != nil {
return nil, fmt.Errorf("error reading body from Proxymux response: %s", err)
}
rawBody := body.String()
rawBody = rawBody[1 : len(rawBody)-1]
decodedBodyStr, err := base64.StdEncoding.DecodeString(rawBody)
if err != nil {
return nil, fmt.Errorf("error decoding Proxymux response using base64 scheme: %s", err)
}
var parsedBody token
err = json.Unmarshal(decodedBodyStr, &parsedBody)
if err != nil {
return nil, fmt.Errorf("error parsing Proxymux response body: %s", err)
}
token := parsedBody.Token
if len(token) == 0 {
return nil, fmt.Errorf("invalid (empty) token received from Proxymux")
}
if len(token) < 3 {
return nil, fmt.Errorf("invalid token received from Proxymux")
}
return newPrincipalToken(token[3:])
}
func (c *x509FederationClientForOkeWorkloadIdentity) PrivateKey() (*rsa.PrivateKey, error) {
c.mux.Lock()
defer c.mux.Unlock()
if err := c.renewSecurityTokenIfNotValid(); err != nil {
return nil, err
}
return c.sessionKeySupplier.PrivateKey(), nil
}
func (c *x509FederationClientForOkeWorkloadIdentity) SecurityToken() (token string, err error) {
c.mux.Lock()
defer c.mux.Unlock()
if err = c.renewSecurityTokenIfNotValid(); err != nil {
return "", err
}
return c.securityToken.String(), nil
}
func (c *x509FederationClientForOkeWorkloadIdentity) renewSecurityTokenIfNotValid() (err error) {
if c.securityToken == nil || !c.securityToken.Valid() {
if err = c.renewSecurityToken(); err != nil {
return fmt.Errorf("failed to renew security token: %s", err.Error())
}
}
return nil
}
type workloadIdentityPrincipalToken struct {
principalToken
}
func (t *workloadIdentityPrincipalToken) Valid() bool {
// TODO: read rpstValidForRatio from rpst token
issuedAt := int64(t.jwtToken.payload["iat"].(float64))
expiredAt := int64(t.jwtToken.payload["exp"].(float64))
softExpiredAt := issuedAt + int64(float64(expiredAt-issuedAt)*rpstValidForRatio)
softExpiredAtTime := time.Unix(softExpiredAt, 0)
now := time.Now().Unix() + int64(bufferTimeBeforeTokenExpiration.Seconds())
expired := softExpiredAt <= now
if expired {
common.Debugf("Token expired at: %v", softExpiredAtTime.Format("15:04:05.000"))
}
return !expired
}
func (c *x509FederationClientForOkeWorkloadIdentity) GetClaim(key string) (interface{}, error) {
c.mux.Lock()
defer c.mux.Unlock()
if err := c.renewSecurityTokenIfNotValid(); err != nil {
return nil, err
}
return c.securityToken.GetClaim(key)
}