Skip to content

Commit 7e9876e

Browse files
authored
feat: Use self-signed JWTs when non-default Universe Domains (#1722)
* feat: Use self-signed JWTs when non-default Universe Domains * feat: AL-9 * fix: remove unused
1 parent bcefe96 commit 7e9876e

File tree

2 files changed

+76
-1
lines changed

2 files changed

+76
-1
lines changed

src/auth/jwtclient.ts

+10-1
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ import {
2424
OAuth2ClientOptions,
2525
RequestMetadataResponse,
2626
} from './oauth2client';
27+
import {DEFAULT_UNIVERSE} from './authclient';
2728

2829
export interface JWTOptions extends OAuth2ClientOptions {
2930
email?: string;
@@ -119,7 +120,15 @@ export class JWT extends OAuth2Client implements IdTokenProvider {
119120
url = this.defaultServicePath ? `https://${this.defaultServicePath}/` : url;
120121
const useSelfSignedJWT =
121122
(!this.hasUserScopes() && url) ||
122-
(this.useJWTAccessWithScope && this.hasAnyScopes());
123+
(this.useJWTAccessWithScope && this.hasAnyScopes()) ||
124+
this.universeDomain !== DEFAULT_UNIVERSE;
125+
126+
if (this.subject && this.universeDomain !== DEFAULT_UNIVERSE) {
127+
throw new RangeError(
128+
`Service Account user is configured for the credential. Domain-wide delegation is not supported in universes other than ${DEFAULT_UNIVERSE}`
129+
);
130+
}
131+
123132
if (!this.apiKey && useSelfSignedJWT) {
124133
if (
125134
this.additionalClaims &&

test/test.jwt.ts

+66
Original file line numberDiff line numberDiff line change
@@ -1007,6 +1007,72 @@ describe('jwt', () => {
10071007
);
10081008
});
10091009

1010+
it('signs JWT with audience if: user scope = true, default scope = true, audience = truthy, universeDomain = not default universe', async () => {
1011+
const stubGetRequestHeaders = sandbox.stub().returns({});
1012+
const stubJWTAccess = sandbox.stub(jwtaccess, 'JWTAccess').returns({
1013+
getRequestHeaders: stubGetRequestHeaders,
1014+
});
1015+
const jwt = new JWT({
1016+
1017+
key: fs.readFileSync(PEM_PATH, 'utf8'),
1018+
scopes: ['scope1', 'scope2'],
1019+
universeDomain: 'my-universe.com',
1020+
});
1021+
jwt.defaultScopes = ['scope1', 'scope2'];
1022+
await jwt.getRequestHeaders('https//beepboop.googleapis.com');
1023+
sandbox.assert.calledOnce(stubJWTAccess);
1024+
sandbox.assert.calledWith(
1025+
stubGetRequestHeaders,
1026+
'https//beepboop.googleapis.com',
1027+
undefined,
1028+
undefined
1029+
);
1030+
});
1031+
1032+
it('signs JWT with audience if: user scope = true, default scope = true, audience = truthy, useJWTAccessWithScope = true, universeDomain = not default universe', async () => {
1033+
const stubGetRequestHeaders = sandbox.stub().returns({});
1034+
const stubJWTAccess = sandbox.stub(jwtaccess, 'JWTAccess').returns({
1035+
getRequestHeaders: stubGetRequestHeaders,
1036+
});
1037+
const jwt = new JWT({
1038+
1039+
key: fs.readFileSync(PEM_PATH, 'utf8'),
1040+
scopes: ['scope1', 'scope2'],
1041+
universeDomain: 'my-universe.com',
1042+
});
1043+
jwt.useJWTAccessWithScope = true;
1044+
jwt.defaultScopes = ['scope1', 'scope2'];
1045+
await jwt.getRequestHeaders('https//beepboop.googleapis.com');
1046+
sandbox.assert.calledOnce(stubJWTAccess);
1047+
sandbox.assert.calledWith(
1048+
stubGetRequestHeaders,
1049+
'https//beepboop.googleapis.com',
1050+
undefined,
1051+
['scope1', 'scope2']
1052+
);
1053+
});
1054+
1055+
it('throws on domain-wide delegation on non-default universe', async () => {
1056+
const stubGetRequestHeaders = sandbox.stub().returns({});
1057+
sandbox.stub(jwtaccess, 'JWTAccess').returns({
1058+
getRequestHeaders: stubGetRequestHeaders,
1059+
});
1060+
const jwt = new JWT({
1061+
1062+
key: fs.readFileSync(PEM_PATH, 'utf8'),
1063+
scopes: ['scope1', 'scope2'],
1064+
subject: '[email protected]',
1065+
universeDomain: 'my-universe.com',
1066+
});
1067+
jwt.useJWTAccessWithScope = true;
1068+
jwt.defaultScopes = ['scope1', 'scope2'];
1069+
1070+
await assert.rejects(
1071+
() => jwt.getRequestHeaders('https//beepboop.googleapis.com'),
1072+
/Domain-wide delegation is not supported in universes other than/
1073+
);
1074+
});
1075+
10101076
it('does not use self signed JWT if target_audience provided', async () => {
10111077
const JWTAccess = sandbox.stub(jwtaccess, 'JWTAccess').returns({
10121078
getRequestHeaders: sinon.stub().returns({}),

0 commit comments

Comments
 (0)