-
Notifications
You must be signed in to change notification settings - Fork 259
docs(samples): added auth samples and tests #927
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 27 commits
3bd604d
bd1bc55
ece1c56
0c26c33
45449b2
7ef36df
b2f367e
01b57ad
b9dee60
3ed6be0
dd39fd4
a46ccc4
5eb6506
cc6a5a5
7c68634
1baeebe
9fc3a7a
b8c5f3f
680cfdd
1944e5d
a943290
d7d6257
cf11754
b910be5
e23fe35
ada91fb
8573bb3
591d0e6
82d7350
54013b5
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,83 @@ | ||
| <project xmlns="http://maven.apache.org/POM/4.0.0"> | ||
| <modelVersion>4.0.0</modelVersion> | ||
| <groupId>com.google.auth.samples</groupId> | ||
| <artifactId>authsamples</artifactId> | ||
| <version>1.0.0</version> | ||
| <name>auth-samples</name> | ||
|
|
||
|
|
||
| <!-- | ||
| The parent pom defines common style checks and testing strategies for our samples. | ||
| Removing or replacing it should not affect the execution of the samples in any way. | ||
| --> | ||
| <parent> | ||
| <groupId>com.google.cloud.samples</groupId> | ||
| <artifactId>shared-configuration</artifactId> | ||
| <version>1.2.0</version> | ||
| </parent> | ||
|
|
||
| <properties> | ||
| <maven.compiler.target>1.8</maven.compiler.target> | ||
| <maven.compiler.source>1.8</maven.compiler.source> | ||
| <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding> | ||
| </properties> | ||
|
|
||
| <!-- START dependencies --> | ||
| <!-- Using libraries-bom to manage versions. | ||
| See https://github.com/GoogleCloudPlatform/cloud-opensource-java/wiki/The-Google-Cloud-Platform-Libraries-BOM --> | ||
| <dependencyManagement> | ||
| <dependencies> | ||
| <dependency> | ||
| <groupId>com.google.cloud</groupId> | ||
| <artifactId>libraries-bom</artifactId> | ||
| <version>25.0.0</version> | ||
| <type>pom</type> | ||
| <scope>import</scope> | ||
| </dependency> | ||
| </dependencies> | ||
| </dependencyManagement> | ||
|
|
||
|
|
||
| <dependencies> | ||
| <!-- OAuth dependency--> | ||
| <dependency> | ||
| <groupId>com.google.auth</groupId> | ||
| <artifactId>google-auth-library-oauth2-http</artifactId> | ||
| <version>1.3.0</version> | ||
| </dependency> | ||
|
|
||
| <!-- IAM dependency--> | ||
| <dependency> | ||
| <groupId>com.google.cloud</groupId> | ||
| <artifactId>google-iam-admin</artifactId> | ||
| <version>1.2.1</version> | ||
| </dependency> | ||
|
|
||
| <!-- GCloud dependency--> | ||
| <dependency> | ||
| <groupId>com.google.cloud</groupId> | ||
| <artifactId>google-cloud-compute</artifactId> | ||
| </dependency> | ||
| <dependency> | ||
| <groupId>com.google.cloud</groupId> | ||
| <artifactId>google-cloud-storage</artifactId> | ||
| </dependency> | ||
|
|
||
| <!-- Test dependencies--> | ||
| <dependency> | ||
| <groupId>junit</groupId> | ||
| <artifactId>junit</artifactId> | ||
| <version>4.13.1</version> | ||
| <scope>test</scope> | ||
| </dependency> | ||
| <dependency> | ||
| <artifactId>truth</artifactId> | ||
| <groupId>com.google.truth</groupId> | ||
| <scope>test</scope> | ||
| <version>1.1.3</version> | ||
| </dependency> | ||
|
|
||
| </dependencies> | ||
|
|
||
| </project> | ||
|
|
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,72 @@ | ||
| /* | ||
| * Copyright 2022 Google Inc. | ||
| * | ||
| * Licensed under the Apache License, Version 2.0 (the "License"); | ||
| * you may not use this file except in compliance with the License. | ||
| * You may obtain a copy of the License at | ||
| * | ||
| * http://www.apache.org/licenses/LICENSE-2.0 | ||
| * | ||
| * Unless required by applicable law or agreed to in writing, software | ||
| * distributed under the License is distributed on an "AS IS" BASIS, | ||
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
| * See the License for the specific language governing permissions and | ||
| * limitations under the License. | ||
| */ | ||
|
|
||
| // [START auth_cloud_explicit_adc] | ||
|
|
||
| import com.google.api.gax.paging.Page; | ||
| import com.google.auth.oauth2.GoogleCredentials; | ||
| import com.google.cloud.storage.Bucket; | ||
| import com.google.cloud.storage.Storage; | ||
| import com.google.cloud.storage.StorageOptions; | ||
| import java.io.IOException; | ||
| import java.security.GeneralSecurityException; | ||
|
|
||
| public class AuthenticateExplicit { | ||
|
|
||
| public static void main(String[] args) throws IOException, GeneralSecurityException { | ||
| // TODO(Developer): | ||
| // 1. Replace the project variable below. | ||
| // 2. Make sure you have the necessary permission to list storage buckets | ||
| // "storage.buckets.list" | ||
|
|
||
| String projectId = "your-google-cloud-project-id"; | ||
|
|
||
| authenticateExplicit(projectId); | ||
| } | ||
|
|
||
| // List storage buckets by authenticating with ADC. | ||
| public static void authenticateExplicit(String projectId) throws IOException { | ||
| // Construct the GoogleCredentials object which obtains the default configuration from your | ||
| // working environment. | ||
| // GoogleCredentials.getApplicationDefault() will give you ComputeEngineCredentials | ||
| // if you are on a GCE (or other metadata server supported environments). | ||
| GoogleCredentials credentials = GoogleCredentials.getApplicationDefault(); | ||
| // If you are authenticating to a Cloud API, you can let the library include the default scope, | ||
| // https://www.googleapis.com/auth/cloud-platform, because IAM is used to provide fine-grained | ||
| // permissions for Cloud. | ||
| // If you need to provide a scope, specify it as follows: | ||
| // GoogleCredentials credentials = GoogleCredentials.getApplicationDefault() | ||
| // .createScoped(scope); | ||
| // For more information on scopes to use, | ||
| // see: https://developers.google.com/identity/protocols/oauth2/scopes | ||
|
|
||
| // Construct the Storage client. | ||
| Storage storage = | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This should use a try/catch and include the warning about making sure to close: disingenuous: https://googlecloudplatform.github.io/samples-style-guide/#clients
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I am not sure of this as many of the storage samples look like they don't follow the auto close try-catch.. |
||
| StorageOptions.newBuilder() | ||
| .setCredentials(credentials) | ||
| .setProjectId(projectId) | ||
| .build() | ||
| .getService(); | ||
|
|
||
| System.out.println("Buckets:"); | ||
| Page<Bucket> buckets = storage.list(); | ||
| for (Bucket bucket : buckets.iterateAll()) { | ||
| System.out.println(bucket.toString()); | ||
| } | ||
| System.out.println("Listed all storage buckets."); | ||
| } | ||
| } | ||
| // [END auth_cloud_explicit_adc] | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,60 @@ | ||
| /* | ||
| * Copyright 2022 Google Inc. | ||
| * | ||
| * Licensed under the Apache License, Version 2.0 (the "License"); | ||
| * you may not use this file except in compliance with the License. | ||
| * You may obtain a copy of the License at | ||
| * | ||
| * http://www.apache.org/licenses/LICENSE-2.0 | ||
| * | ||
| * Unless required by applicable law or agreed to in writing, software | ||
| * distributed under the License is distributed on an "AS IS" BASIS, | ||
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
| * See the License for the specific language governing permissions and | ||
| * limitations under the License. | ||
| */ | ||
|
|
||
| // [START auth_cloud_implicit_adc] | ||
|
|
||
| import com.google.cloud.compute.v1.Instance; | ||
| import com.google.cloud.compute.v1.InstancesClient; | ||
| import java.io.IOException; | ||
|
|
||
| public class AuthenticateImplicitWithAdc { | ||
|
|
||
| public static void main(String[] args) throws IOException { | ||
| // TODO(Developer): | ||
Sita04 marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| // 1. Before running this sample, | ||
| // set up ADC as described in https://cloud.google.com/docs/authentication/external/set-up-adc | ||
| // 2. Replace the project variable below. | ||
| // 3. Make sure that the user account or service account that you are using | ||
| // has the required permissions. For this sample, you must have "compute.instances.list". | ||
| String projectId = "your-google-cloud-project-id"; | ||
| authenticateImplicitWithAdc(projectId); | ||
| } | ||
|
|
||
| // When interacting with Google Cloud Client libraries, the library can auto-detect the | ||
| // credentials to use. | ||
| public static void authenticateImplicitWithAdc(String project) throws IOException { | ||
|
|
||
| String zone = "us-central1-a"; | ||
| // This snippet demonstrates how to list instances. | ||
| // *NOTE*: Replace the client created below with the client required for your application. | ||
| // Note that the credentials are not specified when constructing the client. | ||
| // Hence, the client library will look for credentials using ADC. | ||
| // | ||
| // Initialize client that will be used to send requests. This client only needs to be created | ||
| // once, and can be reused for multiple requests. After completing all of your requests, call | ||
| // the `instancesClient.close()` method on the client to safely | ||
| // clean up any remaining background resources. | ||
| try (InstancesClient instancesClient = InstancesClient.create()) { | ||
Sita04 marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| // Set the project and zone to retrieve instances present in the zone. | ||
| System.out.printf("Listing instances from %s in %s:", project, zone); | ||
| for (Instance zoneInstance : instancesClient.list(project, zone).iterateAll()) { | ||
| System.out.println(zoneInstance.getName()); | ||
| } | ||
| System.out.println("####### Listing instances complete #######"); | ||
| } | ||
| } | ||
| } | ||
| // [END auth_cloud_implicit_adc] | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,87 @@ | ||
| /* | ||
| * Copyright 2022 Google Inc. | ||
| * | ||
| * Licensed under the Apache License, Version 2.0 (the "License"); | ||
| * you may not use this file except in compliance with the License. | ||
| * You may obtain a copy of the License at | ||
| * | ||
| * http://www.apache.org/licenses/LICENSE-2.0 | ||
| * | ||
| * Unless required by applicable law or agreed to in writing, software | ||
| * distributed under the License is distributed on an "AS IS" BASIS, | ||
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
| * See the License for the specific language governing permissions and | ||
| * limitations under the License. | ||
| */ | ||
|
|
||
| // [auth_cloud_idtoken_impersonated_credentials] | ||
|
|
||
| import com.google.auth.oauth2.GoogleCredentials; | ||
| import com.google.auth.oauth2.IdTokenCredentials; | ||
| import com.google.auth.oauth2.IdTokenProvider.Option; | ||
| import com.google.auth.oauth2.ImpersonatedCredentials; | ||
| import java.io.IOException; | ||
| import java.util.Arrays; | ||
| import java.util.List; | ||
|
|
||
| public class IdTokenFromImpersonatedCredentials { | ||
|
|
||
| public static void main(String[] args) throws IOException { | ||
| // TODO(Developer): Replace the below variables before running the code. | ||
|
|
||
| // Provide the scopes that you might need to request to access Google APIs, | ||
Sita04 marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| // depending on the level of access you need. | ||
| // The best practice is to use the cloud-wide scope and use IAM to narrow the permissions. | ||
| // https://cloud.google.com/docs/authentication#authorization_for_services | ||
| // For more information, see: https://developers.google.com/identity/protocols/oauth2/scopes | ||
| String scope = "https://www.googleapis.com/auth/cloud-platform"; | ||
|
|
||
| // The service name for which the id token is requested. Service name refers to the | ||
| // logical identifier of an API service, such as "pubsub.googleapis.com". | ||
| String targetAudience = "iap.googleapis.com"; | ||
|
|
||
| // The name of the privilege-bearing service account for whom the credential is created. | ||
| String impersonatedServiceAccount = "[email protected]"; | ||
|
|
||
| getIdTokenUsingOAuth2(impersonatedServiceAccount, scope, targetAudience); | ||
| } | ||
|
|
||
| // Use a service account (SA1) to impersonate as another service account (SA2) and obtain id token | ||
| // for the impersonated account. | ||
| // To obtain token for SA2, SA1 should have the "roles/iam.serviceAccountTokenCreator" permission | ||
| // on SA2. | ||
| public static void getIdTokenUsingOAuth2( | ||
| String impersonatedServiceAccount, String scope, String targetAudience) throws IOException { | ||
|
|
||
| // Construct the GoogleCredentials object which obtains the default configuration from your | ||
| // working environment. | ||
| GoogleCredentials googleCredentials = GoogleCredentials.getApplicationDefault(); | ||
|
|
||
| // delegates: The chained list of delegates required to grant the final accessToken. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I've also separated out the delegation flow from the single service account flow. It doesn't make sense to create an ID token from a delegation chain, because there's no authz included for ID tokens. So let's just stick to a single privilege-bearing (current term, subject to change) service account (no delegation chain).
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Reopening because you are still including delegate chain. There should be just one privilege-bearing service account and one caller, which can be represented by either a service account or a user account.
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The delegates parameter is mandatory in the "Impersonated Credentials" API, unlike the other one we used from IAM library.
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Could we just say |
||
| // For more information, see: | ||
| // https://cloud.google.com/iam/docs/create-short-lived-credentials-direct#sa-credentials-permissions | ||
| // Delegate is NOT USED here. | ||
| List<String> delegates = null; | ||
|
|
||
| // Create the impersonated credential. | ||
| ImpersonatedCredentials impersonatedCredentials = | ||
| ImpersonatedCredentials.create( | ||
| googleCredentials, impersonatedServiceAccount, delegates, Arrays.asList(scope), 300); | ||
|
|
||
| // Set the impersonated credential, target audience and token options. | ||
| IdTokenCredentials idTokenCredentials = | ||
| IdTokenCredentials.newBuilder() | ||
| .setIdTokenProvider(impersonatedCredentials) | ||
| .setTargetAudience(targetAudience) | ||
| // Setting this will include email in the id token. | ||
| .setOptions(Arrays.asList(Option.INCLUDE_EMAIL)) | ||
| .build(); | ||
|
|
||
| // Get the ID token. | ||
| // Once you've obtained the ID token, use it to make an authenticated call | ||
| // to the target audience. | ||
| String idToken = idTokenCredentials.refreshAccessToken().getTokenValue(); | ||
| System.out.println("Generated ID token."); | ||
| } | ||
| } | ||
| // [auth_cloud_idtoken_impersonated_credentials] | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,61 @@ | ||
| /* | ||
| * Copyright 2022 Google Inc. | ||
| * | ||
| * Licensed under the Apache License, Version 2.0 (the "License"); | ||
| * you may not use this file except in compliance with the License. | ||
| * You may obtain a copy of the License at | ||
| * | ||
| * http://www.apache.org/licenses/LICENSE-2.0 | ||
| * | ||
| * Unless required by applicable law or agreed to in writing, software | ||
| * distributed under the License is distributed on an "AS IS" BASIS, | ||
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
| * See the License for the specific language governing permissions and | ||
| * limitations under the License. | ||
| */ | ||
|
|
||
| // [START auth_cloud_idtoken_metadata_server] | ||
|
|
||
| import com.google.auth.oauth2.GoogleCredentials; | ||
| import com.google.auth.oauth2.IdTokenCredentials; | ||
| import com.google.auth.oauth2.IdTokenProvider; | ||
| import com.google.auth.oauth2.IdTokenProvider.Option; | ||
| import java.io.IOException; | ||
| import java.security.GeneralSecurityException; | ||
| import java.util.Arrays; | ||
|
|
||
| public class IdTokenFromMetadataServer { | ||
|
|
||
| public static void main(String[] args) throws IOException, GeneralSecurityException { | ||
| // TODO(Developer): Replace the below variables before running the code. | ||
|
|
||
| // The url or target audience to obtain the ID token for. | ||
| String url = "http://www.abc.com"; | ||
|
|
||
| getIdTokenFromMetadataServer(url); | ||
| } | ||
|
|
||
| // Use the Google Cloud metadata server in the Cloud Run (or AppEngine or Kubernetes etc.,) | ||
| // environment to create an identity token and add it to the HTTP request as part of an | ||
| // Authorization header. | ||
| public static void getIdTokenFromMetadataServer(String url) throws IOException { | ||
| // Construct the GoogleCredentials object which obtains the default configuration from your | ||
| // working environment. | ||
| GoogleCredentials googleCredentials = GoogleCredentials.getApplicationDefault(); | ||
|
|
||
| IdTokenCredentials idTokenCredentials = | ||
| IdTokenCredentials.newBuilder() | ||
| .setIdTokenProvider((IdTokenProvider) googleCredentials) | ||
| .setTargetAudience(url) | ||
| // Setting the ID token options. | ||
| .setOptions(Arrays.asList(Option.FORMAT_FULL, Option.LICENSES_TRUE)) | ||
| .build(); | ||
|
|
||
| // Get the ID token. | ||
| // Once you've obtained the ID token, use it to make an authenticated call | ||
| // to the target audience. | ||
| String idToken = idTokenCredentials.refreshAccessToken().getTokenValue(); | ||
| System.out.println("Generated ID token."); | ||
| } | ||
| } | ||
| // [END auth_cloud_idtoken_metadata_server] |
Uh oh!
There was an error while loading. Please reload this page.