Skip to content

Commit 7621132

Browse files
Authenticated cloud-to-prod interop tests. (#55)
Added authentication provider classes, and wired up the auth interop tests. Refactored connection logic to throw initial connection errors early. Fixes #53
1 parent c082e5b commit 7621132

File tree

11 files changed

+390
-105
lines changed

11 files changed

+390
-105
lines changed

CHANGELOG.md

+7
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,10 @@
1+
## 0.3.0 - 2018-02-05
2+
3+
* Added authentication metadata providers, optimized for use with Google Cloud.
4+
* Added service URI to metadata provider API, needed for Json Web Token generation.
5+
* Added authenticated cloud-to-prod interoperability tests.
6+
* Refactored connection logic to throw initial connection errors early.
7+
18
## 0.2.1 - 2018-01-18
29

310
* Updated generated code in examples using latest protoc compiler plugin.

example/googleapis/bin/logging.dart

-57
Original file line numberDiff line numberDiff line change
@@ -14,72 +14,15 @@
1414
// limitations under the License.
1515

1616
import 'dart:async';
17-
import 'dart:convert';
1817
import 'dart:io';
1918

20-
import 'package:googleapis_auth/auth_io.dart' as auth;
2119
import 'package:grpc/grpc.dart';
22-
import 'package:http/http.dart' as http;
2320

2421
import 'package:googleapis/src/generated/google/api/monitored_resource.pb.dart';
2522
import 'package:googleapis/src/generated/google/logging/type/log_severity.pb.dart';
2623
import 'package:googleapis/src/generated/google/logging/v2/log_entry.pb.dart';
2724
import 'package:googleapis/src/generated/google/logging/v2/logging.pbgrpc.dart';
2825

29-
const _tokenExpirationThreshold = const Duration(seconds: 30);
30-
31-
class ServiceAccountAuthenticator {
32-
auth.ServiceAccountCredentials _serviceAccountCredentials;
33-
final List<String> _scopes;
34-
String _projectId;
35-
36-
auth.AccessToken _accessToken;
37-
Future<CallOptions> _call;
38-
39-
ServiceAccountAuthenticator(String serviceAccountJson, this._scopes) {
40-
final serviceAccount = JSON.decode(serviceAccountJson);
41-
_serviceAccountCredentials =
42-
new auth.ServiceAccountCredentials.fromJson(serviceAccount);
43-
_projectId = serviceAccount['project_id'];
44-
}
45-
46-
String get projectId => _projectId;
47-
48-
Future authenticate(Map<String, String> metadata) async {
49-
if (_accessToken == null || _accessToken.hasExpired) {
50-
await _obtainAccessCredentials();
51-
}
52-
53-
metadata['authorization'] = 'Bearer ${_accessToken.data}';
54-
55-
if (_tokenExpiresSoon) {
56-
// Token is about to expire. Extend it prematurely.
57-
_obtainAccessCredentials().catchError((_) {});
58-
}
59-
}
60-
61-
bool get _tokenExpiresSoon => _accessToken.expiry
62-
.subtract(_tokenExpirationThreshold)
63-
.isBefore(new DateTime.now().toUtc());
64-
65-
Future _obtainAccessCredentials() {
66-
if (_call == null) {
67-
final authClient = new http.Client();
68-
_call = auth
69-
.obtainAccessCredentialsViaServiceAccount(
70-
_serviceAccountCredentials, _scopes, authClient)
71-
.then((credentials) {
72-
_accessToken = credentials.accessToken;
73-
_call = null;
74-
authClient.close();
75-
});
76-
}
77-
return _call;
78-
}
79-
80-
CallOptions get toCallOptions => new CallOptions(providers: [authenticate]);
81-
}
82-
8326
Future<Null> main() async {
8427
final serviceAccountFile = new File('logging-service-account.json');
8528
if (!serviceAccountFile.existsSync()) {

example/googleapis/pubspec.yaml

-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ environment:
88

99
dependencies:
1010
async: ^1.13.3
11-
googleapis_auth: ^0.2.3+6
1211
grpc:
1312
path: ../../
1413
protobuf: ^0.7.0

interop/lib/src/client.dart

+155-7
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ import 'dart:typed_data';
1919

2020
import 'package:collection/collection.dart';
2121
import 'package:grpc/grpc.dart';
22-
2322
import 'package:interop/src/generated/empty.pb.dart';
2423
import 'package:interop/src/generated/messages.pb.dart';
2524
import 'package:interop/src/generated/test.pbgrpc.dart';
@@ -40,6 +39,17 @@ class Tester {
4039
String defaultServiceAccount;
4140
String oauthScope;
4241
String serviceAccountKeyFile;
42+
String _serviceAccountJson;
43+
44+
String get serviceAccountJson =>
45+
_serviceAccountJson ??= _readServiceAccountJson();
46+
47+
String _readServiceAccountJson() {
48+
if (serviceAccountKeyFile?.isEmpty ?? true) {
49+
throw 'Service account key file not specified.';
50+
}
51+
return new File(serviceAccountKeyFile).readAsStringSync();
52+
}
4353

4454
void set serverPort(String value) {
4555
if (value == null) {
@@ -61,6 +71,7 @@ class Tester {
6171
_useTestCA = value == 'true';
6272
}
6373

74+
ClientChannel channel;
6475
TestServiceClient client;
6576
UnimplementedServiceClient unimplementedServiceClient;
6677

@@ -90,7 +101,7 @@ class Tester {
90101
options = new ChannelOptions.insecure();
91102
}
92103

93-
final channel =
104+
channel =
94105
new ClientChannel(serverHost, port: _serverPort, options: options);
95106
client = new TestServiceClient(channel);
96107
unimplementedServiceClient = new UnimplementedServiceClient(channel);
@@ -124,6 +135,8 @@ class Tester {
124135
return emptyStream();
125136
case 'compute_engine_creds':
126137
return computeEngineCreds();
138+
case 'service_account_creds':
139+
return serviceAccountCreds();
127140
case 'jwt_token_creds':
128141
return jwtTokenCreds();
129142
case 'oauth2_auth_token':
@@ -458,7 +471,8 @@ class Tester {
458471
responses.map((response) => response.payload.body.length).toList();
459472

460473
if (!new ListEquality().equals(responseLengths, expectedResponses)) {
461-
throw 'Incorrect response lengths received (${responseLengths.join(', ')} != ${expectedResponses.join(', ')})';
474+
throw 'Incorrect response lengths received (${responseLengths.join(
475+
', ')} != ${expectedResponses.join(', ')})';
462476
}
463477
}
464478

@@ -571,7 +585,8 @@ class Tester {
571585
requests.add(index);
572586
await for (final response in responses) {
573587
if (index >= expectedResponses.length) {
574-
throw 'Received too many responses. $index > ${expectedResponses.length}.';
588+
throw 'Received too many responses. $index > ${expectedResponses
589+
.length}.';
575590
}
576591
if (response.payload.body.length != expectedResponses[index]) {
577592
throw 'Response mismatch for response $index: '
@@ -638,6 +653,62 @@ class Tester {
638653
/// * clients are free to assert that the response payload body contents are
639654
/// zero and comparing the entire response message against a golden response
640655
Future<Null> computeEngineCreds() async {
656+
final credentials = new ComputeEngineAuthenticator();
657+
final clientWithCredentials =
658+
new TestServiceClient(channel, options: credentials.toCallOptions);
659+
660+
final response = await _sendSimpleRequestForAuth(clientWithCredentials,
661+
fillUsername: true, fillOauthScope: true);
662+
663+
final user = response.username;
664+
final oauth = response.oauthScope;
665+
666+
if (user?.isEmpty ?? true) {
667+
throw 'Username not received.';
668+
}
669+
if (oauth?.isEmpty ?? true) {
670+
throw 'OAuth scope not received.';
671+
}
672+
673+
if (!serviceAccountJson.contains(user)) {
674+
throw 'Got user name $user, which is not a substring of $serviceAccountJson';
675+
}
676+
if (!oauthScope.contains(oauth)) {
677+
throw 'Got OAuth scope $oauth, which is not a substring of $oauthScope';
678+
}
679+
}
680+
681+
/// This test is only for cloud-to-prod path.
682+
///
683+
/// This test verifies unary calls succeed in sending messages while using
684+
/// service account credentials.
685+
///
686+
/// Test caller should set flag `--service_account_key_file` with the path to
687+
/// json key file downloaded from https://console.developers.google.com.
688+
/// Alternately, if using a usable auth implementation, she may specify the
689+
/// file location in the environment variable GOOGLE_APPLICATION_CREDENTIALS.
690+
///
691+
/// Procedure:
692+
/// 1. Client configures the channel to use ServiceAccountCredentials
693+
/// 2. Client calls UnaryCall with:
694+
/// {
695+
/// response_size: 314159
696+
/// payload: {
697+
/// body: 271828 bytes of zeros
698+
/// }
699+
/// fill_username: true
700+
/// }
701+
///
702+
/// Client asserts:
703+
/// * call was successful
704+
/// * received SimpleResponse.username is not empty and is in the json key
705+
/// file used by the auth library. The client can optionally check the
706+
/// username matches the email address in the key file or equals the value
707+
/// of `--default_service_account` flag.
708+
/// * response payload body is 314159 bytes in size
709+
/// * clients are free to assert that the response payload body contents are
710+
/// zero and comparing the entire response message against a golden response
711+
Future<Null> serviceAccountCreds() async {
641712
throw 'Not implemented';
642713
}
643714

@@ -672,7 +743,19 @@ class Tester {
672743
/// * clients are free to assert that the response payload body contents are
673744
/// zero and comparing the entire response message against a golden response
674745
Future<Null> jwtTokenCreds() async {
675-
throw 'Not implemented';
746+
final credentials = new JwtServiceAccountAuthenticator(serviceAccountJson);
747+
final clientWithCredentials =
748+
new TestServiceClient(channel, options: credentials.toCallOptions);
749+
750+
final response = await _sendSimpleRequestForAuth(clientWithCredentials,
751+
fillUsername: true);
752+
final username = response.username;
753+
if (username?.isEmpty ?? true) {
754+
throw 'Username not received.';
755+
}
756+
if (!serviceAccountJson.contains(username)) {
757+
throw 'Got user name $username, which is not a substring of $serviceAccountJson';
758+
}
676759
}
677760

678761
/// This test is only for cloud-to-prod path and some implementations may run
@@ -715,7 +798,30 @@ class Tester {
715798
/// check against the json key file or GCE default service account email.
716799
/// * received SimpleResponse.oauth_scope is in `--oauth_scope`
717800
Future<Null> oauth2AuthToken() async {
718-
throw 'Not implemented';
801+
final credentials =
802+
new ServiceAccountAuthenticator(serviceAccountJson, [oauthScope]);
803+
final clientWithCredentials =
804+
new TestServiceClient(channel, options: credentials.toCallOptions);
805+
806+
final response = await _sendSimpleRequestForAuth(clientWithCredentials,
807+
fillUsername: true, fillOauthScope: true);
808+
809+
final user = response.username;
810+
final oauth = response.oauthScope;
811+
812+
if (user?.isEmpty ?? true) {
813+
throw 'Username not received.';
814+
}
815+
if (oauth?.isEmpty ?? true) {
816+
throw 'OAuth scope not received.';
817+
}
818+
819+
if (!serviceAccountJson.contains(user)) {
820+
throw 'Got user name $user, which is not a substring of $serviceAccountJson';
821+
}
822+
if (!oauthScope.contains(oauth)) {
823+
throw 'Got OAuth scope $oauth, which is not a substring of $oauthScope';
824+
}
719825
}
720826

721827
/// Similar to the other auth tests, this test is only for cloud-to-prod path.
@@ -747,7 +853,49 @@ class Tester {
747853
/// file used by the auth library. The client can optionally check the
748854
/// username matches the email address in the key file.
749855
Future<Null> perRpcCreds() async {
750-
throw 'Not implemented';
856+
final credentials =
857+
new ServiceAccountAuthenticator(serviceAccountJson, [oauthScope]);
858+
859+
final response = await _sendSimpleRequestForAuth(client,
860+
fillUsername: true,
861+
fillOauthScope: true,
862+
options: credentials.toCallOptions);
863+
864+
final user = response.username;
865+
final oauth = response.oauthScope;
866+
867+
if (user?.isEmpty ?? true) {
868+
throw 'Username not received.';
869+
}
870+
if (oauth?.isEmpty ?? true) {
871+
throw 'OAuth scope not received.';
872+
}
873+
874+
if (!serviceAccountJson.contains(user)) {
875+
throw 'Got user name $user, which is not a substring of $serviceAccountJson';
876+
}
877+
if (!oauthScope.contains(oauth)) {
878+
throw 'Got OAuth scope $oauth, which is not a substring of $oauthScope';
879+
}
880+
}
881+
882+
Future<SimpleResponse> _sendSimpleRequestForAuth(TestServiceClient client,
883+
{bool fillUsername: false,
884+
bool fillOauthScope: false,
885+
CallOptions options}) async {
886+
final payload = new Payload()..body = new Uint8List(271828);
887+
final request = new SimpleRequest()
888+
..responseSize = 314159
889+
..payload = payload
890+
..fillUsername = fillUsername
891+
..fillOauthScope = fillOauthScope;
892+
final response = await client.unaryCall(request, options: options);
893+
final receivedBytes = response.payload.body.length;
894+
if (receivedBytes != 314159) {
895+
throw 'Response payload mismatch. Expected 314159 bytes, '
896+
'got ${receivedBytes}.';
897+
}
898+
return response;
751899
}
752900

753901
/// This test verifies that custom metadata in either binary or ascii format

lib/grpc.dart

+2
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@
1313
// See the License for the specific language governing permissions and
1414
// limitations under the License.
1515

16+
export 'src/auth/auth.dart';
17+
1618
export 'src/client/call.dart';
1719
export 'src/client/channel.dart';
1820
export 'src/client/client.dart';

0 commit comments

Comments
 (0)