blob: 75aa623f18fd144199d82e28cff6dcd9986f4efe [file] [log] [blame]
// Copyright 2019 The LUCI Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package projectscope
import (
"context"
"time"
"go.opentelemetry.io/otel/trace"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
"google.golang.org/protobuf/types/known/timestamppb"
"go.chromium.org/luci/common/clock"
"go.chromium.org/luci/common/logging"
"go.chromium.org/luci/server/auth"
"go.chromium.org/luci/server/auth/authdb"
"go.chromium.org/luci/server/auth/signing"
"go.chromium.org/luci/tokenserver/api/minter/v1"
"go.chromium.org/luci/tokenserver/appengine/impl/utils"
"go.chromium.org/luci/tokenserver/appengine/impl/utils/projectidentity"
)
const (
// projectActorsGroup is a group of identities and subgroups authorized to obtain project tokens.
projectActorsGroup = "auth-project-actors"
)
// MintProjectTokenRPC implements TokenMinter.MintProjectToken.
// method.
type MintProjectTokenRPC struct {
// Signer is mocked in tests.
//
// In prod it is the default server signer that uses server's service account.
Signer signing.Signer
// MintAccessToken produces an OAuth token for a service account.
//
// In prod it is auth.MintAccessTokenForServiceAccount.
MintAccessToken func(context.Context, auth.MintAccessTokenParams) (*auth.Token, error)
// ProjectIdentities manages project scoped identities.
//
// In prod it is projectidentity.ProjectIdentities.
ProjectIdentities func(context.Context) projectidentity.Storage
// LogToken is mocked in tests.
//
// In prod it is produced by NewTokenLogger.
LogToken TokenLogger
}
// MintProjectToken mints a project-scoped service account OAuth2 token.
//
// Project-scoped service accounts are identities tied to an individual LUCI project.
// Therefore they provide a way to safely interact with LUCI APIs and prevent accidental
// cross-project operations.
func (r *MintProjectTokenRPC) MintProjectToken(c context.Context, req *minter.MintProjectTokenRequest) (*minter.MintProjectTokenResponse, error) {
state := auth.GetState(c)
callerID := state.User().Identity
// Make sure we log the request as early as possible.
utils.LogRequest(c, r, req, callerID)
// Perform bounds checking and corrections on the requested token validity lifetime.
if err := utils.ValidateAndNormalizeRequest(c, req.OauthScope, &req.MinValidityDuration, req.AuditTags); err != nil {
logging.WithError(err).Errorf(c, "invalid request %v", req)
return nil, status.Errorf(codes.InvalidArgument, "invalid request: %s", err.Error())
}
if err := utils.ValidateProject(c, req.LuciProject); err != nil {
logging.WithError(err).Errorf(c, "invalid request %v", req)
return nil, status.Errorf(codes.InvalidArgument, "invalid request: %s", err.Error())
}
// Using delegation to obtain a project scoped account is forbidden.
if callerID != state.PeerIdentity() {
logging.Errorf(c, "Trying to use delegation, it's forbidden")
return nil, status.Errorf(codes.PermissionDenied, "delegation is forbidden for this API call")
}
// Perform authorization check first.
// Internal error: Retry
// !Member: PermissionDenied
// Member: Continue
member, err := auth.IsMember(c, projectActorsGroup)
switch {
case err != nil:
logging.WithError(err).Errorf(c, "unable to perform group check of member %s and group %s", callerID, projectActorsGroup)
return nil, status.Errorf(codes.Internal, "internal authorization error")
case !member:
logging.Infof(c, "Denied access to %s, authorization failed", callerID)
return nil, status.Errorf(codes.PermissionDenied, "access denied")
}
projectIdentity, err := r.ProjectIdentities(c).LookupByProject(c, req.LuciProject)
if err != nil {
switch {
case err == projectidentity.ErrNotFound:
// TODO(tandrii): upgrade to Errorf once project scoped identity migration
// is re-started.
logging.WithError(err).Warningf(c, "no project identity for project %s", req.LuciProject)
return nil, status.Errorf(codes.NotFound, "unable to find project identity for project %s", req.LuciProject)
case err != nil:
logging.WithError(err).Errorf(c, "error while looking for scoped identity of project %s", req.LuciProject)
return nil, status.Errorf(codes.Internal, "internal error")
}
}
// All checks passed, mint the token.
accessTok, err := r.MintAccessToken(c, auth.MintAccessTokenParams{
ServiceAccount: projectIdentity.Email,
Scopes: req.OauthScope,
MinTTL: time.Duration(req.MinValidityDuration) * time.Second,
})
if err != nil {
logging.WithError(err).Errorf(c, "Failed to mint project scoped oauth token for caller %q in project %q for identity %q",
callerID, req.LuciProject, projectIdentity.Email)
return nil, status.Errorf(codes.Internal, "failed to mint token for service account %s", projectIdentity.Email)
}
// Determine service version for token logging.
serviceVer, err := utils.ServiceVersion(c, r.Signer)
if err != nil {
return nil, status.Errorf(codes.Internal, "can't grab service version - %s", err)
}
// Create response object.
resp := &minter.MintProjectTokenResponse{
ServiceAccountEmail: projectIdentity.Email,
AccessToken: accessTok.Token,
Expiry: timestamppb.New(accessTok.Expiry),
ServiceVersion: serviceVer,
}
if r.LogToken != nil {
// Errors during logging are considered not fatal. We have a monitoring
// counter that tracks number of errors, so they are not totally invisible.
tokInfo := MintedTokenInfo{
Request: req,
Response: resp,
RequestedAt: timestamppb.New(clock.Now(c)),
Expiration: resp.Expiry,
PeerIP: state.PeerIP(),
PeerIdentity: state.PeerIdentity(),
RequestID: trace.SpanContextFromContext(c).TraceID().String(),
AuthDBRev: authdb.Revision(state.DB()),
}
if logErr := r.LogToken(c, &tokInfo); logErr != nil {
logging.WithError(logErr).Errorf(c, "Failed to insert the delegation token into the BigQuery log")
}
}
return resp, nil
}
// Name implements utils.RPC interface.
func (r *MintProjectTokenRPC) Name() string {
return "MintProjectTokenRPC"
}