-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(auth): add universe domain support to idtoken #11059
Merged
quartzmo
merged 30 commits into
googleapis:main
from
quartzmo:auth-idtoken-universe-domain
Jan 7, 2025
Merged
feat(auth): add universe domain support to idtoken #11059
quartzmo
merged 30 commits into
googleapis:main
from
quartzmo:auth-idtoken-universe-domain
Jan 7, 2025
+394
−159
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
quartzmo
force-pushed
the
auth-idtoken-universe-domain
branch
from
October 30, 2024 16:00
ee34736
to
260aaaa
Compare
quartzmo
force-pushed
the
auth-idtoken-universe-domain
branch
from
October 30, 2024 16:02
2b32c34
to
06969bb
Compare
codyoss
reviewed
Oct 30, 2024
codyoss
reviewed
Oct 31, 2024
quartzmo
added
the
do not merge
Indicates a pull request not ready for merge, due to either quality or timing.
label
Nov 1, 2024
quartzmo
removed
the
do not merge
Indicates a pull request not ready for merge, due to either quality or timing.
label
Jan 3, 2025
codyoss
approved these changes
Jan 6, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM to me overall. Just refactor a little to remove some now unnecessary structs.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
IdToken flow can be done in two ways: 1) OAuth2 server calls or 2) IAM service calls. The majority of implementations went with the OAuth2 server calls. In non-GDU environments, however, there is no OAuth2 server, so the IAM implementation must be used. This is enabled as follows:
impersonatedIDTokenProvider.Token
inauth/credentials/impersonate/idtoken.go
toIDTokenIAMOptions.Token
inauth/credentials/internal/impersonate/idtoken.go
to enable reuse inauth/credentials/idtoken/iam.go
.formatIAMServiceAccountName
inauth/credentials/impersonate/impersonate.go
toFormatIAMServiceAccountResource
inauth/internal/internal.go
, for reuse.auth/credentials/idtoken/file.go
introduce a conditional (resolveUniverseDomain(f) == internal.DefaultUniverseDomain
) which if true sustains the existing behavior (auth.New2LOTokenProvider
) and if false introduces the new non-GDU behavior inIDTokenIAMOptions.Token
Note that to use the IAM endpoint in a non-GDU environment, the service account must have the
iam.serviceAccountTokenCreator
role because the service account is not only the target service account, but also the caller; the Oauth2 endpoint doesn’t need this.