Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Demonstrate authentication using bearer token #704

Closed
wants to merge 19 commits into from

Conversation

cgpoh
Copy link
Contributor

@cgpoh cgpoh commented Jan 11, 2025

Add PolarisContextResolver to demonstrate authentication using bearer token instead of the default custom bearer-token format principal:data-engineer;password:test;realm:acct123

Copy link
Contributor

@adutra adutra left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @cgpoh I'm not sure I understand the purpose of this PR, but you seem to be proposing a new realm context resolver that resolves the realm from a claim in the JWT token, rather than from an adhoc header.

While I'm not opposed to the idea, I think you PR contains some unrelated changes (the Postgres Eclipselink configuration). It would be better to clean that up. Thanks!

.build();
try {
DecodedJWT decodedJWT = verifier.verify(token);
String realm = decodedJWT.getClaim(ISS_PROPERTY_KEY).asString();
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think you can assume that the iss claim will always contain the realm identifier. For example, Polaris itself sets the iss claim to polaris:

private static final String ISSUER_KEY = "polaris";

In fact, Polaris does not include the realm in the JWT tokens it generates.

So, I think this needs to be configurable.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, I think I just need the verify method to check for valid token. Will remove the getClaim method

String principalId = decodedJWT.getClaim(PRINCIPAL_PROPERTY_KEY).asString();

parsedProperties.put(REALM_PROPERTY_KEY, realm);
parsedProperties.put(PRINCIPAL_PROPERTY_KEY, principalId);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Unused property.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will remove these unused properties

import org.slf4j.LoggerFactory;

@JsonTypeName("polaris")
public class PolarisContextResolver implements RealmContextResolver {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would rather call this BearerTokenRealmContextResolver.

@@ -44,4 +44,27 @@
<property name="eclipselink.persistence-context.flush-mode" value="auto"/>
</properties>
</persistence-unit>
<persistence-unit name="polaris-postgresql" transaction-type="RESOURCE_LOCAL">
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This change seems unrelated.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, will remove that.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This also looks unrelated

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, will revert the changes

Copy link
Contributor

@dimas-b dimas-b left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks like an interesting proposal, but I think it might be worth discussing it on the dev mailing list first (due to implications for federated identities, which are already being discussed in dev)?

.build();
try {
DecodedJWT decodedJWT = verifier.verify(token);
String realm = decodedJWT.getClaim(ISS_PROPERTY_KEY).asString();
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Obtaining real from access tokens looks interesting, but would you mind showing an end-to-end use case, @cgpoh ?

One rough edge seems to be that in order to obtain a token from Polaris, the user must provide a realm, so the access token cannot be an exclusive source of realm information.

If you mean tokens provided by external IdP, that feature is yet not available in Polaris (unless I missed it) 🤔

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @dimas-b. For my use case, I followed the Security section in the configuring-polaris-for-production guide. I deployed Polaris in our Kubernetes POC environment and bootstrapped it using PostgreSQL, setting the environment variables
POLARIS_BOOTSTRAP_POLARIS_ROOT_CLIENT_ID and POLARIS_BOOTSTRAP_POLARIS_ROOT_CLIENT_SECRET.

In the subsection, I noticed Polaris lacks a service to resolve a realm from bearer tokens. To address this, I created the PolarisContextResolver class. With this implementation, we can now create Polaris RBAC and catalogs using the bearer token retrieved from api/catalog/v1/oauth/tokens.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the clarification, @cgpoh !

From my POV, I'd question the current text in the callContextResolver & realmIdResolver doc section, actually.

Like I said, getting realm ID from a token is interesting, but it works well only for Polaris own tokens. If a token is from an external IdP (a feature being discussed on the dev mailing list), validating the token may not be as trivial. I can imagine that validation may require some knowledge about the IdP, which would naturally be part of the "realm" definition.

I'd propose to alter the approach a bit and perhaps try to refactor authenticators to also be able to produce realm information. This way, IMHO, the runtime flow will be more coherent: 1) the authenticator receives a "raw" request; 2) the authenticator uses headers (including Bearer token) to make sure that the request is valid (authentic) possibly taking both the realm header and JWT into account; 3) the authenticator declares that the request is for a) some realm, b) some specific principal.

WDYT?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For my POC demonstration, I aimed to use a real token instead of a sequence of key/value pairs, like those in TestInlineBearerTokenPolarisAuthenticator, which led to the creation of the BearerTokenRealmContextResolver class. With the new Quarkus update, it seems TestInlineBearerTokenPolarisAuthenticator is no longer in use, so I believe I can close this PR for now.

I’m intrigued by your approach and will take some time to study the implementation further. Hopefully, I can raise a new PR to address this in the future! 😊

parsedProperties.put(REALM_PROPERTY_KEY, realm);
parsedProperties.put(PRINCIPAL_PROPERTY_KEY, principalId);
} catch (Throwable t) {
throw new JWTVerificationException(t.getMessage(), t);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure we can assume that all bearer tokens are JWTs. When external IdP support is added, it will be quite possible that access tokens are opaque.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I’m thinking JWT for a start and maybe add more support when Quarkus migration is done, what do you think?

@cgpoh
Copy link
Contributor Author

cgpoh commented Jan 14, 2025

Hi @cgpoh I'm not sure I understand the purpose of this PR, but you seem to be proposing a new realm context resolver that resolves the realm from a claim in the JWT token, rather than from an adhoc header.

While I'm not opposed to the idea, I think you PR contains some unrelated changes (the Postgres Eclipselink configuration). It would be better to clean that up. Thanks!

Thanks @adutra . Apologies for not being clear about the purpose of this PR. I’ve provided an explanation here

import org.slf4j.LoggerFactory;

@JsonTypeName("polaris")
public class BearerTokenRealmContextResolver implements RealmContextResolver {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

FYI: RealmContextResolver has been renamed. Please rebase.

Comment on lines +82 to +85
JWTVerifier verifier =
JWT.require(Algorithm.HMAC256("polaris"))
.withIssuer(ISS_PROPERTY_DEFAULT_VALUE)
.build();
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This will never be usable in production if you hardcode the secret here. The default token broker signs the JWT with a secret that is defined in the configuration - could be anything. Is it expected that this resolver is only used for test cases? Or is it intended to work in conjunction with the JWTBroker-generated tokens in prod?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agree. For now, is more of a POC. I intend to define a secret in a configuration without hardcoding when working with the JWTBroker in prod.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants