auth.go (10446B)
1 // Code generated by smithy-go-codegen DO NOT EDIT. 2 3 package ssooidc 4 5 import ( 6 "context" 7 "fmt" 8 awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware" 9 smithy "github.com/aws/smithy-go" 10 smithyauth "github.com/aws/smithy-go/auth" 11 "github.com/aws/smithy-go/metrics" 12 "github.com/aws/smithy-go/middleware" 13 "github.com/aws/smithy-go/tracing" 14 smithyhttp "github.com/aws/smithy-go/transport/http" 15 "slices" 16 "strings" 17 ) 18 19 func bindAuthParamsRegion(_ interface{}, params *AuthResolverParameters, _ interface{}, options Options) { 20 params.Region = options.Region 21 } 22 23 type setLegacyContextSigningOptionsMiddleware struct { 24 } 25 26 func (*setLegacyContextSigningOptionsMiddleware) ID() string { 27 return "setLegacyContextSigningOptions" 28 } 29 30 func (m *setLegacyContextSigningOptionsMiddleware) HandleFinalize(ctx context.Context, in middleware.FinalizeInput, next middleware.FinalizeHandler) ( 31 out middleware.FinalizeOutput, metadata middleware.Metadata, err error, 32 ) { 33 rscheme := getResolvedAuthScheme(ctx) 34 schemeID := rscheme.Scheme.SchemeID() 35 36 if sn := awsmiddleware.GetSigningName(ctx); sn != "" { 37 if schemeID == "aws.auth#sigv4" { 38 smithyhttp.SetSigV4SigningName(&rscheme.SignerProperties, sn) 39 } else if schemeID == "aws.auth#sigv4a" { 40 smithyhttp.SetSigV4ASigningName(&rscheme.SignerProperties, sn) 41 } 42 } 43 44 if sr := awsmiddleware.GetSigningRegion(ctx); sr != "" { 45 if schemeID == "aws.auth#sigv4" { 46 smithyhttp.SetSigV4SigningRegion(&rscheme.SignerProperties, sr) 47 } else if schemeID == "aws.auth#sigv4a" { 48 smithyhttp.SetSigV4ASigningRegions(&rscheme.SignerProperties, []string{sr}) 49 } 50 } 51 52 return next.HandleFinalize(ctx, in) 53 } 54 55 func addSetLegacyContextSigningOptionsMiddleware(stack *middleware.Stack) error { 56 return stack.Finalize.Insert(&setLegacyContextSigningOptionsMiddleware{}, "Signing", middleware.Before) 57 } 58 59 type withAnonymous struct { 60 resolver AuthSchemeResolver 61 } 62 63 var _ AuthSchemeResolver = (*withAnonymous)(nil) 64 65 func (v *withAnonymous) ResolveAuthSchemes(ctx context.Context, params *AuthResolverParameters) ([]*smithyauth.Option, error) { 66 opts, err := v.resolver.ResolveAuthSchemes(ctx, params) 67 if err != nil { 68 return nil, err 69 } 70 71 opts = append(opts, &smithyauth.Option{ 72 SchemeID: smithyauth.SchemeIDAnonymous, 73 }) 74 return opts, nil 75 } 76 77 func wrapWithAnonymousAuth(options *Options) { 78 if _, ok := options.AuthSchemeResolver.(*defaultAuthSchemeResolver); !ok { 79 return 80 } 81 82 options.AuthSchemeResolver = &withAnonymous{ 83 resolver: options.AuthSchemeResolver, 84 } 85 } 86 87 // AuthResolverParameters contains the set of inputs necessary for auth scheme 88 // resolution. 89 type AuthResolverParameters struct { 90 // The name of the operation being invoked. 91 Operation string 92 93 // The region in which the operation is being invoked. 94 Region string 95 } 96 97 func bindAuthResolverParams(ctx context.Context, operation string, input interface{}, options Options) *AuthResolverParameters { 98 params := &AuthResolverParameters{ 99 Operation: operation, 100 } 101 102 bindAuthParamsRegion(ctx, params, input, options) 103 104 return params 105 } 106 107 // AuthSchemeResolver returns a set of possible authentication options for an 108 // operation. 109 type AuthSchemeResolver interface { 110 ResolveAuthSchemes(context.Context, *AuthResolverParameters) ([]*smithyauth.Option, error) 111 } 112 113 type defaultAuthSchemeResolver struct{} 114 115 var _ AuthSchemeResolver = (*defaultAuthSchemeResolver)(nil) 116 117 func (*defaultAuthSchemeResolver) ResolveAuthSchemes(ctx context.Context, params *AuthResolverParameters) ([]*smithyauth.Option, error) { 118 if overrides, ok := operationAuthOptions[params.Operation]; ok { 119 return overrides(params), nil 120 } 121 return serviceAuthOptions(params), nil 122 } 123 124 var operationAuthOptions = map[string]func(*AuthResolverParameters) []*smithyauth.Option{ 125 "CreateToken": func(params *AuthResolverParameters) []*smithyauth.Option { 126 return []*smithyauth.Option{ 127 {SchemeID: smithyauth.SchemeIDAnonymous}, 128 } 129 }, 130 131 "RegisterClient": func(params *AuthResolverParameters) []*smithyauth.Option { 132 return []*smithyauth.Option{ 133 {SchemeID: smithyauth.SchemeIDAnonymous}, 134 } 135 }, 136 137 "StartDeviceAuthorization": func(params *AuthResolverParameters) []*smithyauth.Option { 138 return []*smithyauth.Option{ 139 {SchemeID: smithyauth.SchemeIDAnonymous}, 140 } 141 }, 142 } 143 144 func serviceAuthOptions(params *AuthResolverParameters) []*smithyauth.Option { 145 return []*smithyauth.Option{ 146 { 147 SchemeID: smithyauth.SchemeIDSigV4, 148 SignerProperties: func() smithy.Properties { 149 var props smithy.Properties 150 smithyhttp.SetSigV4SigningName(&props, "sso-oauth") 151 smithyhttp.SetSigV4SigningRegion(&props, params.Region) 152 return props 153 }(), 154 }, 155 } 156 } 157 158 type resolveAuthSchemeMiddleware struct { 159 operation string 160 options Options 161 } 162 163 func (*resolveAuthSchemeMiddleware) ID() string { 164 return "ResolveAuthScheme" 165 } 166 167 func (m *resolveAuthSchemeMiddleware) HandleFinalize(ctx context.Context, in middleware.FinalizeInput, next middleware.FinalizeHandler) ( 168 out middleware.FinalizeOutput, metadata middleware.Metadata, err error, 169 ) { 170 _, span := tracing.StartSpan(ctx, "ResolveAuthScheme") 171 defer span.End() 172 173 params := bindAuthResolverParams(ctx, m.operation, getOperationInput(ctx), m.options) 174 options, err := m.options.AuthSchemeResolver.ResolveAuthSchemes(ctx, params) 175 if err != nil { 176 return out, metadata, fmt.Errorf("resolve auth scheme: %w", err) 177 } 178 179 scheme, ok := m.selectScheme(options) 180 if !ok { 181 return out, metadata, fmt.Errorf("could not select an auth scheme") 182 } 183 184 ctx = setResolvedAuthScheme(ctx, scheme) 185 186 span.SetProperty("auth.scheme_id", scheme.Scheme.SchemeID()) 187 span.End() 188 return next.HandleFinalize(ctx, in) 189 } 190 191 func (m *resolveAuthSchemeMiddleware) selectScheme(options []*smithyauth.Option) (*resolvedAuthScheme, bool) { 192 sorted := sortAuthOptions(options, m.options.AuthSchemePreference) 193 for _, option := range sorted { 194 if option.SchemeID == smithyauth.SchemeIDAnonymous { 195 return newResolvedAuthScheme(smithyhttp.NewAnonymousScheme(), option), true 196 } 197 198 for _, scheme := range m.options.AuthSchemes { 199 if scheme.SchemeID() != option.SchemeID { 200 continue 201 } 202 203 if scheme.IdentityResolver(m.options) != nil { 204 return newResolvedAuthScheme(scheme, option), true 205 } 206 } 207 } 208 209 return nil, false 210 } 211 212 func sortAuthOptions(options []*smithyauth.Option, preferred []string) []*smithyauth.Option { 213 byPriority := make([]*smithyauth.Option, 0, len(options)) 214 for _, prefName := range preferred { 215 for _, option := range options { 216 optName := option.SchemeID 217 if parts := strings.Split(option.SchemeID, "#"); len(parts) == 2 { 218 optName = parts[1] 219 } 220 if prefName == optName { 221 byPriority = append(byPriority, option) 222 } 223 } 224 } 225 for _, option := range options { 226 if !slices.ContainsFunc(byPriority, func(o *smithyauth.Option) bool { 227 return o.SchemeID == option.SchemeID 228 }) { 229 byPriority = append(byPriority, option) 230 } 231 } 232 return byPriority 233 } 234 235 type resolvedAuthSchemeKey struct{} 236 237 type resolvedAuthScheme struct { 238 Scheme smithyhttp.AuthScheme 239 IdentityProperties smithy.Properties 240 SignerProperties smithy.Properties 241 } 242 243 func newResolvedAuthScheme(scheme smithyhttp.AuthScheme, option *smithyauth.Option) *resolvedAuthScheme { 244 return &resolvedAuthScheme{ 245 Scheme: scheme, 246 IdentityProperties: option.IdentityProperties, 247 SignerProperties: option.SignerProperties, 248 } 249 } 250 251 func setResolvedAuthScheme(ctx context.Context, scheme *resolvedAuthScheme) context.Context { 252 return middleware.WithStackValue(ctx, resolvedAuthSchemeKey{}, scheme) 253 } 254 255 func getResolvedAuthScheme(ctx context.Context) *resolvedAuthScheme { 256 v, _ := middleware.GetStackValue(ctx, resolvedAuthSchemeKey{}).(*resolvedAuthScheme) 257 return v 258 } 259 260 type getIdentityMiddleware struct { 261 options Options 262 } 263 264 func (*getIdentityMiddleware) ID() string { 265 return "GetIdentity" 266 } 267 268 func (m *getIdentityMiddleware) HandleFinalize(ctx context.Context, in middleware.FinalizeInput, next middleware.FinalizeHandler) ( 269 out middleware.FinalizeOutput, metadata middleware.Metadata, err error, 270 ) { 271 innerCtx, span := tracing.StartSpan(ctx, "GetIdentity") 272 defer span.End() 273 274 rscheme := getResolvedAuthScheme(innerCtx) 275 if rscheme == nil { 276 return out, metadata, fmt.Errorf("no resolved auth scheme") 277 } 278 279 resolver := rscheme.Scheme.IdentityResolver(m.options) 280 if resolver == nil { 281 return out, metadata, fmt.Errorf("no identity resolver") 282 } 283 284 identity, err := timeOperationMetric(ctx, "client.call.resolve_identity_duration", 285 func() (smithyauth.Identity, error) { 286 return resolver.GetIdentity(innerCtx, rscheme.IdentityProperties) 287 }, 288 func(o *metrics.RecordMetricOptions) { 289 o.Properties.Set("auth.scheme_id", rscheme.Scheme.SchemeID()) 290 }) 291 if err != nil { 292 return out, metadata, fmt.Errorf("get identity: %w", err) 293 } 294 295 ctx = setIdentity(ctx, identity) 296 297 span.End() 298 return next.HandleFinalize(ctx, in) 299 } 300 301 type identityKey struct{} 302 303 func setIdentity(ctx context.Context, identity smithyauth.Identity) context.Context { 304 return middleware.WithStackValue(ctx, identityKey{}, identity) 305 } 306 307 func getIdentity(ctx context.Context) smithyauth.Identity { 308 v, _ := middleware.GetStackValue(ctx, identityKey{}).(smithyauth.Identity) 309 return v 310 } 311 312 type signRequestMiddleware struct { 313 options Options 314 } 315 316 func (*signRequestMiddleware) ID() string { 317 return "Signing" 318 } 319 320 func (m *signRequestMiddleware) HandleFinalize(ctx context.Context, in middleware.FinalizeInput, next middleware.FinalizeHandler) ( 321 out middleware.FinalizeOutput, metadata middleware.Metadata, err error, 322 ) { 323 _, span := tracing.StartSpan(ctx, "SignRequest") 324 defer span.End() 325 326 req, ok := in.Request.(*smithyhttp.Request) 327 if !ok { 328 return out, metadata, fmt.Errorf("unexpected transport type %T", in.Request) 329 } 330 331 rscheme := getResolvedAuthScheme(ctx) 332 if rscheme == nil { 333 return out, metadata, fmt.Errorf("no resolved auth scheme") 334 } 335 336 identity := getIdentity(ctx) 337 if identity == nil { 338 return out, metadata, fmt.Errorf("no identity") 339 } 340 341 signer := rscheme.Scheme.Signer() 342 if signer == nil { 343 return out, metadata, fmt.Errorf("no signer") 344 } 345 346 _, err = timeOperationMetric(ctx, "client.call.signing_duration", func() (any, error) { 347 return nil, signer.SignRequest(ctx, req, identity, rscheme.SignerProperties) 348 }, func(o *metrics.RecordMetricOptions) { 349 o.Properties.Set("auth.scheme_id", rscheme.Scheme.SchemeID()) 350 }) 351 if err != nil { 352 return out, metadata, fmt.Errorf("sign request: %w", err) 353 } 354 355 span.End() 356 return next.HandleFinalize(ctx, in) 357 }