google: Add support for OAuth2 token exchange over mTLS

This commit is contained in:
Andy Zhao 2023-02-22 11:56:22 -08:00
parent df3362d767
commit d171fca96d
2 changed files with 45 additions and 1 deletions

View File

@ -6,6 +6,7 @@ package google
import ( import (
"context" "context"
"crypto/tls"
"encoding/json" "encoding/json"
"fmt" "fmt"
"io/ioutil" "io/ioutil"
@ -62,6 +63,12 @@ type CredentialsParams struct {
// PKCE is used to support PKCE flow. Optional for 3LO flow. // PKCE is used to support PKCE flow. Optional for 3LO flow.
PKCE *authhandler.PKCEParams PKCE *authhandler.PKCEParams
// The OAuth2 TokenURL to use, which depends on whether mTLS is enabled. Optional.
TokenURL string
// The TLSConfig used for constructing an mTLS-enabled HTTP client. Optional.
TLSConfig *tls.Config
} }
func (params CredentialsParams) deepCopy() CredentialsParams { func (params CredentialsParams) deepCopy() CredentialsParams {

View File

@ -6,9 +6,12 @@ package google
import ( import (
"context" "context"
"crypto/tls"
"encoding/json" "encoding/json"
"errors" "errors"
"fmt" "fmt"
"net"
"net/http"
"net/url" "net/url"
"strings" "strings"
"time" "time"
@ -16,6 +19,7 @@ import (
"cloud.google.com/go/compute/metadata" "cloud.google.com/go/compute/metadata"
"golang.org/x/oauth2" "golang.org/x/oauth2"
"golang.org/x/oauth2/google/internal/externalaccount" "golang.org/x/oauth2/google/internal/externalaccount"
"golang.org/x/oauth2/internal"
"golang.org/x/oauth2/jwt" "golang.org/x/oauth2/jwt"
) )
@ -26,6 +30,9 @@ var Endpoint = oauth2.Endpoint{
AuthStyle: oauth2.AuthStyleInParams, AuthStyle: oauth2.AuthStyleInParams,
} }
// MTLSTokenURL is Google's OAuth 2.0 default mTLS endpoint.
const MTLSTokenURL = "https://oauth2.mtls.googleapis.com/token"
// JWTTokenURL is Google's OAuth 2.0 token URL to use with the JWT flow. // JWTTokenURL is Google's OAuth 2.0 token URL to use with the JWT flow.
const JWTTokenURL = "https://oauth2.googleapis.com/token" const JWTTokenURL = "https://oauth2.googleapis.com/token"
@ -172,8 +179,15 @@ func (f *credentialsFile) tokenSource(ctx context.Context, params CredentialsPar
cfg.Endpoint.AuthURL = Endpoint.AuthURL cfg.Endpoint.AuthURL = Endpoint.AuthURL
} }
if cfg.Endpoint.TokenURL == "" { if cfg.Endpoint.TokenURL == "" {
if params.TokenURL != "" {
cfg.Endpoint.TokenURL = params.TokenURL
} else {
cfg.Endpoint.TokenURL = Endpoint.TokenURL cfg.Endpoint.TokenURL = Endpoint.TokenURL
} }
}
if params.TLSConfig != nil {
ctx = context.WithValue(ctx, internal.HTTPClient, customHTTPClient(params.TLSConfig))
}
tok := &oauth2.Token{RefreshToken: f.RefreshToken} tok := &oauth2.Token{RefreshToken: f.RefreshToken}
return cfg.TokenSource(ctx, tok), nil return cfg.TokenSource(ctx, tok), nil
case externalAccountKey: case externalAccountKey:
@ -275,3 +289,26 @@ func (cs computeSource) Token() (*oauth2.Token, error) {
"oauth2.google.serviceAccount": acct, "oauth2.google.serviceAccount": acct,
}), nil }), nil
} }
// customHTTPClient constructs an HTTPClient using the provided tlsConfig, to support mTLS.
func customHTTPClient(tlsConfig *tls.Config) *http.Client {
trans := baseTransport()
trans.TLSClientConfig = tlsConfig
return &http.Client{Transport: trans}
}
func baseTransport() *http.Transport {
return &http.Transport{
Proxy: http.ProxyFromEnvironment,
DialContext: (&net.Dialer{
Timeout: 30 * time.Second,
KeepAlive: 30 * time.Second,
DualStack: true,
}).DialContext,
MaxIdleConns: 100,
MaxIdleConnsPerHost: 100,
IdleConnTimeout: 90 * time.Second,
TLSHandshakeTimeout: 10 * time.Second,
ExpectContinueTimeout: 1 * time.Second,
}
}