Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SQS Broker - handle STS authentication with AWS #1322

Merged
merged 8 commits into from
Mar 29, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
72 changes: 57 additions & 15 deletions kombu/transport/SQS.py
Original file line number Diff line number Diff line change
Expand Up @@ -67,11 +67,17 @@
'backoff_tasks': ['svc.tasks.tasks.task2'] # optional
},
}
'sts_role_arn': 'arn:aws:iam::<xxx>:role/STSTest', # optional
'sts_token_timeout': 900 # optional
}

backoff_policy & backoff_tasks are optional arguments. These arguments automatically change the message visibility timeout, in order to have different times between specific task
retries. This would apply after task failure.

AWS STS authentication is supported, by using sts_role_arn, and sts_token_timeout. sts_role_arn is the assumed IAM role ARN we are trying to access with.
sts_token_timeout is the token timeout, defaults (and minimum) to 900 seconds. After the mentioned period, a new token will be created.


If you authenticate using Okta_ (e.g. calling |gac|_), you can also specify
a 'session_token' to connect to a queue. Note that those tokens have a
limited lifetime and are therefore only suited for short-lived tests.
Expand Down Expand Up @@ -112,6 +118,7 @@
import socket
import string
import uuid
from datetime import datetime
from queue import Empty

from botocore.client import Config
Expand Down Expand Up @@ -625,22 +632,22 @@ def new_sqs_client(self, region, access_key_id, secret_access_key, session_token

def sqs(self, queue=None):
if queue is not None and self.predefined_queues:
if queue in self._predefined_queue_clients:
return self._predefined_queue_clients[queue]

if queue not in self.predefined_queues:
raise UndefinedQueueException((
"Queue with name '{}' must be defined in "
"'predefined_queues'."
).format(queue))
raise UndefinedQueueException(f"Queue with name '{queue}' must be defined"
" in 'predefined_queues'.")
q = self.predefined_queues[queue]
c = self._predefined_queue_clients[queue] = self.new_sqs_client(
region=q.get('region', self.region),
access_key_id=q.get('access_key_id', self.conninfo.userid),
secret_access_key=q.get('secret_access_key', self.conninfo.password), # noqa: E501
# With session_token, this client’s access will expire, but it’s useful for testing
session_token=q.get('session_token', None),
)
return c
if self.transport_options.get('sts_role_arn'):
return self._handle_sts_session(queue, q)
if not self.transport_options.get('sts_role_arn'):
if queue in self._predefined_queue_clients:
return self._predefined_queue_clients[queue]
else:
c = self._predefined_queue_clients[queue] = self.new_sqs_client(
region=q.get('region', self.region),
access_key_id=q.get('access_key_id', self.conninfo.userid),
secret_access_key=q.get('secret_access_key', self.conninfo.password))
return c

if self._sqs is not None:
return self._sqs
Expand All @@ -652,9 +659,44 @@ def sqs(self, queue=None):
)
return c

def _handle_sts_session(self, queue, q):
if not hasattr(self, 'sts_expiration'): # STS token - token init
sts_creds = self.generate_sts_session_token(self.transport_options.get('sts_role_arn'),
self.transport_options.get('sts_token_timeout', 900))
self.sts_expiration = sts_creds['Expiration']
c = self._predefined_queue_clients[queue] = self.new_sqs_client(
region=q.get('region', self.region),
access_key_id=sts_creds['AccessKeyId'],
secret_access_key=sts_creds['SecretAccessKey'],
session_token=sts_creds['SessionToken'],
)
return c
elif self.sts_expiration.replace(tzinfo=None) < datetime.utcnow(): # STS token - refresh if expired
sts_creds = self.generate_sts_session_token(self.transport_options.get('sts_role_arn'),
self.transport_options.get('sts_token_timeout', 900))
self.sts_expiration = sts_creds['Expiration']
c = self._predefined_queue_clients[queue] = self.new_sqs_client(
region=q.get('region', self.region),
access_key_id=sts_creds['AccessKeyId'],
secret_access_key=sts_creds['SecretAccessKey'],
session_token=sts_creds['SessionToken'],
)
return c
else: # STS token - ruse existing
return self._predefined_queue_clients[queue]

def generate_sts_session_token(self, role_arn, token_expiry_seconds):
sts_client = boto3.client('sts')
sts_policy = sts_client.assume_role(
RoleArn=role_arn,
RoleSessionName='Celery',
DurationSeconds=token_expiry_seconds
)
return sts_policy['Credentials']

def asynsqs(self, queue=None):
if queue is not None and self.predefined_queues:
if queue in self._predefined_queue_async_clients:
if queue in self._predefined_queue_async_clients and not hasattr(self, 'sts_expiration'):
return self._predefined_queue_async_clients[queue]
if queue not in self.predefined_queues:
raise UndefinedQueueException((
Expand Down
77 changes: 77 additions & 0 deletions t/unit/transport/test_SQS.py
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,8 @@
"""
import base64
import os
from datetime import datetime, timedelta

import pytest
import random
import string
Expand Down Expand Up @@ -712,3 +714,78 @@ def extract_task_name_and_number_of_retries(delivery_tag):
sqs_queue_mock.change_message_visibility.assert_called_once_with(QueueUrl='https://sqs.us-east-1.amazonaws.com/xxx/queue-1',
ReceiptHandle='test_message_id',
VisibilityTimeout=20)

def test_sts_new_session(self):
# Arrange
connection = Connection(transport=SQS.Transport, transport_options={
'predefined_queues': example_predefined_queues,
'sts_role_arn': 'test::arn'
})
channel = connection.channel()
sqs = SQS_Channel_sqs.__get__(channel, SQS.Channel)
queue_name = 'queue-1'

exchange = Exchange('test_SQS', type='direct')
queue = Queue(queue_name, exchange, queue_name)
mock_generate_sts_session_token = Mock()
mock_new_sqs_client = Mock()
channel.new_sqs_client = mock_new_sqs_client
mock_generate_sts_session_token.side_effect = [{'Expiration': 123, 'SessionToken': 123, 'AccessKeyId': 123, 'SecretAccessKey': 123}]
channel.generate_sts_session_token = mock_generate_sts_session_token

# Act
sqs(queue=queue_name)

# Assert
mock_generate_sts_session_token.assert_called_once()

def test_sts_session_expired(self):
# Arrange
connection = Connection(transport=SQS.Transport, transport_options={
'predefined_queues': example_predefined_queues,
'sts_role_arn': 'test::arn'
})
channel = connection.channel()
sqs = SQS_Channel_sqs.__get__(channel, SQS.Channel)
channel.sts_expiration = datetime.utcnow() - timedelta(days=1)
queue_name = 'queue-1'

exchange = Exchange('test_SQS', type='direct')
queue = Queue(queue_name, exchange, queue_name)
mock_generate_sts_session_token = Mock()
mock_new_sqs_client = Mock()
channel.new_sqs_client = mock_new_sqs_client
mock_generate_sts_session_token.side_effect = [{'Expiration': 123, 'SessionToken': 123, 'AccessKeyId': 123, 'SecretAccessKey': 123}]
channel.generate_sts_session_token = mock_generate_sts_session_token

# Act
sqs(queue=queue_name)

# Assert
mock_generate_sts_session_token.assert_called_once()

def test_sts_session_not_expired(self):
# Arrange
connection = Connection(transport=SQS.Transport, transport_options={
'predefined_queues': example_predefined_queues,
'sts_role_arn': 'test::arn'
})
channel = connection.channel()
channel.sts_expiration = datetime.utcnow() + timedelta(days=1)
queue_name = 'queue-1'

exchange = Exchange('test_SQS', type='direct')
queue = Queue(queue_name, exchange, queue_name)
mock_generate_sts_session_token = Mock()
mock_new_sqs_client = Mock()
channel.new_sqs_client = mock_new_sqs_client
channel._predefined_queue_clients = {queue_name: 'mock_client'}
mock_generate_sts_session_token.side_effect = [{'Expiration': 123, 'SessionToken': 123, 'AccessKeyId': 123, 'SecretAccessKey': 123}]
channel.generate_sts_session_token = mock_generate_sts_session_token

# Act
channel.sqs(queue=queue_name)

# Assert
mock_generate_sts_session_token.assert_not_called()