[rubygems/rubygems] implement fallback

e09a6ec815
This commit is contained in:
pjsk 2025-05-28 16:56:54 -07:00 committed by Hiroshi SHIBATA
parent 23b34517bd
commit 01ae9e4fb0
No known key found for this signature in database
GPG key ID: F9CF13417264FAC2
2 changed files with 78 additions and 39 deletions

View file

@ -1,11 +1,14 @@
# frozen_string_literal: true
require_relative "openssl"
require_relative "user_interaction"
##
# S3URISigner implements AWS SigV4 for S3 Source to avoid a dependency on the aws-sdk-* gems
# More on AWS SigV4: https://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html
class Gem::S3URISigner
include Gem::UserInteraction
class ConfigurationError < Gem::Exception
def initialize(message)
super message
@ -146,19 +149,40 @@ class Gem::S3URISigner
require_relative "request"
require_relative "request/connection_pools"
require "json"
token = ec2_metadata_token
iam_info = ec2_metadata_request(EC2_IAM_INFO, token)
# Expected format: arn:aws:iam::<id>:instance-profile/<role_name>
role_name = iam_info["InstanceProfileArn"].split("/").last
ec2_metadata_request(EC2_IAM_SECURITY_CREDENTIALS + role_name, token)
# First try V2 fallback to V1
res = nil
begin
res = ec2_metadata_credentials_imds_v2
rescue InstanceProfileError
alert_warning "Unable to access ec2 credentials via IMDSv2, falling back to IMDSv1"
res = ec2_metadata_credentials_imds_v1
end
res
end
def ec2_metadata_request(url, token)
def ec2_metadata_credentials_imds_v2
token = ec2_metadata_token
iam_info = ec2_metadata_request(EC2_IAM_INFO, token:)
# Expected format: arn:aws:iam::<id>:instance-profile/<role_name>
role_name = iam_info["InstanceProfileArn"].split("/").last
ec2_metadata_request(EC2_IAM_SECURITY_CREDENTIALS + role_name, token:)
end
def ec2_metadata_credentials_imds_v1
iam_info = ec2_metadata_request(EC2_IAM_INFO, token: nil)
# Expected format: arn:aws:iam::<id>:instance-profile/<role_name>
role_name = iam_info["InstanceProfileArn"].split("/").last
ec2_metadata_request(EC2_IAM_SECURITY_CREDENTIALS + role_name, token: nil)
end
def ec2_metadata_request(url, token:)
request = ec2_iam_request(Gem::URI(url), Gem::Net::HTTP::Get)
response = request.fetch do |req|
req.add_field "X-aws-ec2-metadata-token", token
if token
req.add_field "X-aws-ec2-metadata-token", token
end
end
case response
@ -185,11 +209,8 @@ class Gem::S3URISigner
end
def ec2_iam_request(uri, verb)
@request_pool ||= {}
@request_pool[uri] ||= create_request_pool(uri)
pool = @request_pool[uri]
Gem::Request.new(uri, verb, nil, pool)
@request_pool ||= create_request_pool(uri)
Gem::Request.new(uri, verb, nil, @request_pool)
end
def create_request_pool(uri)

View file

@ -9,7 +9,6 @@ class TestGemRemoteFetcherS3 < Gem::TestCase
include Gem::DefaultUserInteraction
class FakeGemRequest < Gem::Request
attr_reader :last_request, :uri
# Override perform_request to stub things
@ -52,12 +51,13 @@ class TestGemRemoteFetcherS3 < Gem::TestCase
case uri.to_s
when "http://169.254.169.254/latest/api/token"
res = Gem::Net::HTTPOK.new nil, 200, nil
def res.body
"mysecrettoken"
if $imdsv2_token_failure
res = Gem::Net::HTTPUnauthorized.new nil, 401, nil
def res.body = "you got a 401! panic!"
else
res = Gem::Net::HTTPOK.new nil, 200, nil
def res.body = "mysecrettoken"
end
fake_s3_request.set_response(res)
when "http://169.254.169.254/latest/meta-data/iam/info"
res = Gem::Net::HTTPOK.new nil, 200, nil
def res.body
@ -70,33 +70,26 @@ class TestGemRemoteFetcherS3 < Gem::TestCase
}
JSON
end
fake_s3_request.set_response(res)
when "http://169.254.169.254/latest/meta-data/iam/security-credentials/TestRole"
res = Gem::Net::HTTPOK.new nil, 200, nil
def res.body
$instance_profile
end
fake_s3_request.set_response(res)
def res.body = $instance_profile
else
raise "Unexpected request to #{uri}"
end
fake_s3_request.set_response(res)
fake_s3_request
end
end
class FakeGemFetcher < Gem::RemoteFetcher
attr_reader :fetched_uri, :last_s3_uri_signer
def request(uri, request_class, last_modified = nil)
@fetched_uri = uri
res = Gem::Net::HTTPOK.new nil, 200, nil
def res.body
"success"
end
def res.body = "success"
res
end
@ -132,10 +125,33 @@ class TestGemRemoteFetcherS3 < Gem::TestCase
assert_equal(expected.strip, recent_aws_query_logs.strip)
end
def assert_fetch_s3(url:, signature:, token: nil, region: "us-east-1", instance_profile_json: nil, method: "GET")
@fetcher = FakeGemFetcher.new nil
def assert_fetched_s3_with_imds_v1
# Three API requests:
# 1. Get the token (which fails)
# 2. Lookup profile details without token
# 3. Query the credentials without token
expected = <<~TEXT
PUT http://169.254.169.254/latest/api/token
x-aws-ec2-metadata-token-ttl-seconds=60
GET http://169.254.169.254/latest/meta-data/iam/info
GET http://169.254.169.254/latest/meta-data/iam/security-credentials/TestRole
TEXT
recent_aws_query_logs = @fetcher.last_s3_uri_signer.recent_aws_query_logs
assert_equal(expected.strip, recent_aws_query_logs.strip)
end
def with_imds_v2_failure
$imdsv2_token_failure = true
yield(fetcher)
ensure
$imdsv2_token_failure = nil
end
def assert_fetch_s3(url:, signature:, token: nil, region: "us-east-1", instance_profile_json: nil, fetcher: nil, method: "GET")
@fetcher = fetcher || FakeGemFetcher.new(nil)
$instance_profile = instance_profile_json
res = fetcher.fetch_s3 Gem::URI.parse(url), nil, (method == "HEAD")
res = @fetcher.fetch_s3 Gem::URI.parse(url), nil, (method == "HEAD")
$imdsv2_token_failure ||= nil
assert_equal "https://my-bucket.s3.#{region}.amazonaws.com/gems/specs.4.8.gz?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=testuser%2F20190624%2F#{region}%2Fs3%2Faws4_request&X-Amz-Date=20190624T051941Z&X-Amz-Expires=86400#{token ? "&X-Amz-Security-Token=" + token : ""}&X-Amz-SignedHeaders=host&X-Amz-Signature=#{signature}", @fetcher.fetched_uri.to_s
if method == "HEAD"
@ -373,14 +389,16 @@ class TestGemRemoteFetcherS3 < Gem::TestCase
url = "s3://my-bucket/gems/specs.4.8.gz"
Time.stub :now, Time.at(1_561_353_581) do
assert_fetch_s3(
url: url,
signature: "e709338735f9077edf8f6b94b247171c266a9605975e08e4a519a123c3322625",
token: "testtoken",
region: "us-east-1",
instance_profile_json: '{"AccessKeyId": "testuser", "SecretAccessKey": "testpass", "Token": "testtoken"}'
)
assert_fetched_s3_with_imds_v2
with_imds_v2_failure do
assert_fetch_s3(
url: url,
signature: "e709338735f9077edf8f6b94b247171c266a9605975e08e4a519a123c3322625",
token: "testtoken",
region: "us-east-1",
instance_profile_json: '{"AccessKeyId": "testuser", "SecretAccessKey": "testpass", "Token": "testtoken"}'
)
assert_fetched_s3_with_imds_v1
end
end
ensure
Gem.configuration[:s3_source] = nil