Table of Contents
Table of Contents |
---|
...
As a framework Apache HttpComponents HttpClient is be used, a successor of Commons HttpClient.
It seems the most widely used/supported by community framework. It is very simple to find all kind of solutions and workaround already implemented, which makes plugin development and maintenance easy. Framework has a built in support for compession, https tunneling, digest auth and lot of other functions.
...
2.1 STEP 1 - Get XML by XPath
XML parsing is done by default Java DOM parser. Which is able to get items by a specified XPath. XPath is super flexible it allows user to get nodes by attribute value, as well as to group nodes from different parents into single result, as well as chose nodes conditionally etc. etc.
Some XPath examples:
Code Block |
---|
/bookstores/bookstore/book[position()<3] //title[@lang] //title[@lang='en'] /bookstores/bookstore/book/price[text()] # convert all subelements to string /bookstores/bookstore/book[price>35.00]/title |
...
Will use the functionality from cdap-formats/TextRecordFormat.java to validate schema and convert input text to StructuredRecord.
OAuth2
1.1 General concepts
Before using OAuth2 usually user has to create an application via service site (e.g. Twitter) and register redirect uri, than receive a client_id and client_secret. Which will be used by an application during authentication.
The further steps are shown in the diagram below:
We are implementing grant types "Authorization Code Grant" and "Refresh Token". Other types are not suitable or rarely used. Click here for some context.
Properties:
...
CDAP will start a local server on the given url. Only localhost urls are allowed. For more info click here.
This is a URL where service callbacks with authCode after user enters username and password and agrees to grant the permissions.
...
Moved design information into a separate doc: Plugin OAuth2 Common Module
Properties:
Name | Description | Default | Widget | Validations | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
OAuth2 Enabled | True or false. | false | Radio group | |||||||||||||||
Callback URL | CDAP will start a local server on the given url. Only localhost urls are allowed. For more info click here. This is a URL where service callbacks with authCode after user enters username and password and agrees to grant the permissions. This URL is also usually configured when registering the OAuth2 application in the service (e.g. Twitter). If the URL registered there is not equal to the one we send, OAuth2 will get denied. | http://localhost:27435 | Text Box | Fail is hostname does not resolve to loopback address or if port is already in use. | ||||||||||||||
Auth URL | A page, where the user is directed to enter his credentials. Example: https://www.facebook.com/dialog/oauth | Text Box | Assert to be empty if OAuth2 is disabled and the not empty if enabled. | |||||||||||||||
Token URL | A page, where CDAP can exchange authCode for accessToken and refreshToken. Or refresh the accessToken. | Text Box | Assert to be empty if OAuth2 is disabled and the not empty if enabled. | |||||||||||||||
Client ID | User should obtain this when registering the OAuth2 application in the service (e.g. Twitter). | Text Box | Assert to be empty if OAuth2 is disabled and the not empty if enabled. | |||||||||||||||
Client Secret | User should obtain this when registering the OAuth2 application in the service (e.g. Twitter). | If the URL registered there is not equal to the one we send, OAuth2 will get denied.http://localhost:27435 | Text Box | Fail is hostname does not resolve to loopback address or if port is already in use. | Auth URL | Password | Assert to be empty if OAuth2 is disabled and the not empty if enabled. | |||||||||||
Scope | This is optional. Scope is a mechanism in OAuth 2.0 to limit an application's access to a user's account. An application can request one or more scopes, this information is then presented to the user in the consent screen, and the access token issued to the application will be limited to the scopes granted. | Text Box | Assert to be empty if OAuth2 is disabled | and the not empty if enabled. | ||||||||||||||
Refresh Token | URLA page, where CDAP can exchange authCode for accessToken and refreshToken. Or refresh the accessToken. | Text Box | Assert to be empty if OAuth2 is disabled and the not empty if enabled. | Client ID | User should obtain this when registering the OAuth2 application in the service (e.g. Twitter). | Text Box | Assert to be empty if OAuth2 is disabled and the not empty if enabled. | Client Secret | User should obtain this when registering the OAuth2 application in the service (e.g. Twitter). | Password | Assert to be empty if OAuth2 is disabled and the not empty if enabled. | Scope | This is optional. Scope is a mechanism in OAuth 2.0 to limit an application's access to a user's account. An application can request one or more scopes, this information is then presented to the user in the consent screen, and the access token issued to the application will be limited to the scopes granted. | Text Box | Assert to be empty if OAuth2 is disabled. | Refresh Token | This is populated by the button "Login via OAuth 2.0". Since we save Refresh Token (not an access token which is short lived), this should be done only once, during initial pipeline deployment. For more information click here. | Fail is empty and OAuth2 is enabled. |
Note: OAuth2 implementation will reside in one of CDAP core modules, since this will need to be re-used by different plugins.
1.2 UI Changes Required. Need to expose an authentication dialog pop-up window to a user
We need to show authentication dialog from the service where user enters his username and passwords, as well as agrees to grant a certain access to our application.
This will require change to UI. We can implement this as plugin-function:
Code Block |
---|
"plugin-function": {
"method": "POST",
"widget": "showPageToUser",
"output-property": "void",
"plugin-method": "showPageToUser"
} |
...
Once the user clicks the button, UI runs showPageToUser to get url and headers from plugin using post-function. Example of return from plugin:
Code Block url = https://www.facebook.com/v3.3/dialog/oauth? client_id=3MVG96_7YM2sI9wT6c13RTPp6RDeRBPFc0F5sYfIrKBZPdTK2Yr7jiTwq8u3ykXyBHtlf3lnNMWSN1rqfjA_y &redirect_uri=http://localhost:27435 headers = {} # empty
On the side note: The url syntax is established by an RFC: https://tools.ietf.org/html/rfc6749#section-4.1.1
IMPORTANT: During this call plugin will also start a callback server (for more information click here)
- UI shows the page.
- Once the page is closed, ui does another call to plugin.
During this call plugin waits for a callback to be complete. Than exchanges received authCode to pair accessToken, refreshToken and return it back to UI. - UI populates the widget field refreshToken with the value.
refreshToken usually has a permanent lifetime (unlike accessToken), unless invalidated manually by user. With this token during every pipeline run we can ask for an accessToken from tokenUrl. No need for callback server or UI/user involvement at this point.
If OAuth2 is enabled and refreshToken field is not populated. Pipeline deployment will fail. So effectively user will be asked to authenticate once and the information for further authentication will be saved in widget.
...
We will need to start an HTTP callback server on localhost. Let's say http://localhost:27435. The port should be statically configured via widget, we cannot get a random ephemeral port, since callback_url needs to be constant. It is saved on service provider (e.g. Facebook) as a static configuration of OAuth2 application.
After user enters his credentials on authentication page (of let's say Facebook), browser will redirect the response authCode to this server. Since this request is done by client browser (not remote server), this address is not required to be public IP address and we can safely use localhost.
1.4 Refreshing access tokens
Since we save refresh token. instead of access token token (which are short-lived). During every pipeline we will need to get an access token. This is a very simple process. We have to execute only one request. Which will return an access token.
Code Block |
---|
POST /token HTTP/1.1
Host: server.example.com
Content-Type: application/x-www-form-urlencoded
grant_type=refresh_token&refresh_token=tGzv3JOkF0XG5Qx2TlKWIA
&client_id=s6BhdRkqt3&client_secret=7Fjfp0ZBr1KtDRbnfVdmIw |
Facebook case
...
This is populated by the button "Login via OAuth 2.0". Since we save Refresh Token (not an access token which is short lived), this should be done only once, during initial pipeline deployment. For more information click here. UI should put an actual value into secure store and put macro function ${secure(key)} a value for extra safety. | Fail is empty and OAuth2 is enabled. |
TLS/SSL
Some general definitions for more context:
...
Name | Description | Default | Widget | Validations |
---|---|---|---|---|
Keystore File | Path to a keystore file | Text Box | Check if file exists | |
Keystore Type | According to Oracle docs. There are 3 supported keystore types. Possible values:
| JKS | Radio Group | |
Keystore Password | Leave empty if keystore is not password protected | Password | Try to load keystore with given password | |
Keystore Key Algorithm | SunX509 is default in Java. | SunX509 | Text Box | |
TrustStore File | Path to a truststore file. If empty use default Java truststores. | Text Box | Check if file exists | |
TrustStore Type | According to Oracle docs. There are 3 supported truststore types. Possible values:
| JKS | Radio Group | |
TrustStore Password | Leave empty if keystore is not password protected | Password | Try to load truststore with given password | |
Truststore Trust Algorithm | SunX509 | Text Box | ||
Transport Protocols | User can add multiple protocols. Which will be offered by client during handshake. | TLSv1.2 | Array | Validate if names are correct |
Cipher Suites | User can add multiple cipher suites. They will be offered by client during handshake. If empty use default cipher suites. This is textBox with comma separated list of ciphers. Since sometimes there can be 20, 30 or more ciphers it is not usable for user to add every one of them manually into an array. | Text Box | Validate if supported by current java implementation |
...