|
| 1 | +# frozen_string_literal: true |
| 2 | + |
| 3 | +require 'securerandom' |
| 4 | +require 'base64' |
| 5 | +require 'json' |
| 6 | + |
| 7 | +module Kafka |
| 8 | + module Sasl |
| 9 | + class AwsMskIam |
| 10 | + AWS_MSK_IAM = "AWS_MSK_IAM" |
| 11 | + |
| 12 | + def initialize(aws_region:, access_key_id:, secret_key_id:, session_token: nil, logger:) |
| 13 | + @semaphore = Mutex.new |
| 14 | + |
| 15 | + @aws_region = aws_region |
| 16 | + @access_key_id = access_key_id |
| 17 | + @secret_key_id = secret_key_id |
| 18 | + @session_token = session_token |
| 19 | + @logger = TaggedLogger.new(logger) |
| 20 | + end |
| 21 | + |
| 22 | + def ident |
| 23 | + AWS_MSK_IAM |
| 24 | + end |
| 25 | + |
| 26 | + def configured? |
| 27 | + @aws_region && @access_key_id && @secret_key_id |
| 28 | + end |
| 29 | + |
| 30 | + def authenticate!(host, encoder, decoder) |
| 31 | + @logger.debug "Authenticating #{@access_key_id} with SASL #{AWS_MSK_IAM}" |
| 32 | + |
| 33 | + host_without_port = host.split(':', -1).first |
| 34 | + |
| 35 | + time_now = Time.now.utc |
| 36 | + |
| 37 | + msg = authentication_payload(host: host_without_port, time_now: time_now) |
| 38 | + @logger.debug "Sending first client SASL AWS_MSK_IAM message:" |
| 39 | + @logger.debug msg |
| 40 | + encoder.write_bytes(msg) |
| 41 | + |
| 42 | + begin |
| 43 | + @server_first_message = decoder.bytes |
| 44 | + @logger.debug "Received first server SASL AWS_MSK_IAM message: #{@server_first_message}" |
| 45 | + |
| 46 | + raise Kafka::Error, "SASL AWS_MSK_IAM authentication failed: unknown error" unless @server_first_message |
| 47 | + rescue Errno::ETIMEDOUT, EOFError => e |
| 48 | + raise Kafka::Error, "SASL AWS_MSK_IAM authentication failed: #{e.message}" |
| 49 | + end |
| 50 | + |
| 51 | + @logger.debug "SASL #{AWS_MSK_IAM} authentication successful" |
| 52 | + end |
| 53 | + |
| 54 | + private |
| 55 | + |
| 56 | + def bin_to_hex(s) |
| 57 | + s.each_byte.map { |b| b.to_s(16).rjust(2, '0') }.join |
| 58 | + end |
| 59 | + |
| 60 | + def digest |
| 61 | + @digest ||= OpenSSL::Digest::SHA256.new |
| 62 | + end |
| 63 | + |
| 64 | + def authentication_payload(host:, time_now:) |
| 65 | + { |
| 66 | + 'version' => "2020_10_22", |
| 67 | + 'host' => host, |
| 68 | + 'user-agent' => "ruby-kafka", |
| 69 | + 'action' => "kafka-cluster:Connect", |
| 70 | + 'x-amz-algorithm' => "AWS4-HMAC-SHA256", |
| 71 | + 'x-amz-credential' => @access_key_id + "/" + time_now.strftime("%Y%m%d") + "/" + @aws_region + "/kafka-cluster/aws4_request", |
| 72 | + 'x-amz-date' => time_now.strftime("%Y%m%dT%H%M%SZ"), |
| 73 | + 'x-amz-signedheaders' => "host", |
| 74 | + 'x-amz-expires' => "900", |
| 75 | + 'x-amz-security-token' => @session_token, |
| 76 | + 'x-amz-signature' => signature(host: host, time_now: time_now) |
| 77 | + }.delete_if { |_, v| v.nil? }.to_json |
| 78 | + end |
| 79 | + |
| 80 | + def canonical_request(host:, time_now:) |
| 81 | + "GET\n" + |
| 82 | + "/\n" + |
| 83 | + canonical_query_string(time_now: time_now) + "\n" + |
| 84 | + canonical_headers(host: host) + "\n" + |
| 85 | + signed_headers + "\n" + |
| 86 | + hashed_payload |
| 87 | + end |
| 88 | + |
| 89 | + def canonical_query_string(time_now:) |
| 90 | + params = { |
| 91 | + "Action" => "kafka-cluster:Connect", |
| 92 | + "X-Amz-Algorithm" => "AWS4-HMAC-SHA256", |
| 93 | + "X-Amz-Credential" => @access_key_id + "/" + time_now.strftime("%Y%m%d") + "/" + @aws_region + "/kafka-cluster/aws4_request", |
| 94 | + "X-Amz-Date" => time_now.strftime("%Y%m%dT%H%M%SZ"), |
| 95 | + "X-Amz-Expires" => "900", |
| 96 | + "X-Amz-Security-Token" => @session_token, |
| 97 | + "X-Amz-SignedHeaders" => "host" |
| 98 | + }.delete_if { |_, v| v.nil? } |
| 99 | + |
| 100 | + URI.encode_www_form(params) |
| 101 | + end |
| 102 | + |
| 103 | + def canonical_headers(host:) |
| 104 | + "host" + ":" + host + "\n" |
| 105 | + end |
| 106 | + |
| 107 | + def signed_headers |
| 108 | + "host" |
| 109 | + end |
| 110 | + |
| 111 | + def hashed_payload |
| 112 | + bin_to_hex(digest.digest("")) |
| 113 | + end |
| 114 | + |
| 115 | + def string_to_sign(host:, time_now:) |
| 116 | + "AWS4-HMAC-SHA256" + "\n" + |
| 117 | + time_now.strftime("%Y%m%dT%H%M%SZ") + "\n" + |
| 118 | + time_now.strftime("%Y%m%d") + "/" + @aws_region + "/kafka-cluster/aws4_request" + "\n" + |
| 119 | + bin_to_hex(digest.digest(canonical_request(host: host, time_now: time_now))) |
| 120 | + end |
| 121 | + |
| 122 | + def signature(host:, time_now:) |
| 123 | + date_key = OpenSSL::HMAC.digest("SHA256", "AWS4" + @secret_key_id, time_now.strftime("%Y%m%d")) |
| 124 | + date_region_key = OpenSSL::HMAC.digest("SHA256", date_key, @aws_region) |
| 125 | + date_region_service_key = OpenSSL::HMAC.digest("SHA256", date_region_key, "kafka-cluster") |
| 126 | + signing_key = OpenSSL::HMAC.digest("SHA256", date_region_service_key, "aws4_request") |
| 127 | + signature = bin_to_hex(OpenSSL::HMAC.digest("SHA256", signing_key, string_to_sign(host: host, time_now: time_now))) |
| 128 | + |
| 129 | + signature |
| 130 | + end |
| 131 | + end |
| 132 | + end |
| 133 | +end |
0 commit comments