Aet*_*tos 4 python oauth google-oauth google-cloud-platform google-cloud-composer
google-cloud-composer我已经在环境(dlkpipelinesv1 :composer-1.13.0-airflow-1.10.12)上创建并运行了 dags 。我可以手动触发这些 dag,并使用调度程序,但是当我通过cloud-functions检测存储桶中的更改来触发它们时,我陷入了困境google-cloud-storage。
请注意,我有另一个 GC-Composer 环境(管道:composer-1.7.5-airflow-1.10.2),它使用相同的谷歌云功能来触发相关的 dags,并且它正在工作。
我按照本指南创建了触发 dags 的函数。所以我检索了以下变量:
PROJECT_ID = <project_id>
CLIENT_ID = <client_id_retrieved_by_running_the_code_in_the_guide_within_my_gcp_console>
WEBSERVER_ID = <airflow_webserver_id>
DAG_NAME = <dag_to_trigger>
WEBSERVER_URL = f"https://{WEBSERVER_ID}.appspot.com/api/experimental/dags/{DAG_NAME}/dag_runs"
def file_listener(event, context):
"""Entry point of the cloud function: Triggered by a change to a Cloud Storage bucket.
Args:
event (dict): Event payload.
context (google.cloud.functions.Context): Metadata for the event.
"""
logging.info("Running the file listener process")
logging.info(f"event : {event}")
logging.info(f"context : {context}")
file = event
if file["size"] == "0" or "DTM_DATALAKE_AUDIT_COMPTAGE" not in file["name"] or ".filepart" in file["name"].lower():
logging.info("no matching file")
exit(0)
logging.info(f"File listener detected the presence of : {file['name']}.")
# id_token = authorize_iap()
# make_iap_request({"file_name": file["name"]}, id_token)
make_iap_request(url=WEBSERVER_URL, client_id=CLIENT_ID, method="POST")
def make_iap_request(url, client_id, method="GET", **kwargs):
"""Makes a request to an application protected by Identity-Aware Proxy.
Args:
url: The Identity-Aware Proxy-protected URL to fetch.
client_id: The client ID used by Identity-Aware Proxy.
method: The request method to use
('GET', 'OPTIONS', 'HEAD', 'POST', 'PUT', 'PATCH', 'DELETE')
**kwargs: Any of the parameters defined for the request function:
https://github.com/requests/requests/blob/master/requests/api.py
If no timeout is provided, it is set to 90 by default.
Returns:
The page body, or raises an exception if the page couldn't be retrieved.
"""
# Set the default timeout, if missing
if "timeout" not in kwargs:
kwargs["timeout"] = 90
# Obtain an OpenID Connect (OIDC) token from metadata server or using service account.
open_id_connect_token = id_token.fetch_id_token(Request(), client_id)
logging.info(f"Retrieved open id connect (bearer) token {open_id_connect_token}")
# Fetch the Identity-Aware Proxy-protected URL, including an authorization header containing "Bearer " followed by a
# Google-issued OpenID Connect token for the service account.
resp = requests.request(method, url, headers={"Authorization": f"Bearer {open_id_connect_token}"}, **kwargs)
if resp.status_code == 403:
raise Exception("Service account does not have permission to access the IAP-protected application.")
elif resp.status_code != 200:
raise Exception(f"Bad response from application: {resp.status_code} / {resp.headers} / {resp.text}")
else:
logging.info(f"Response status - {resp.status_code}")
return resp.json
Run Code Online (Sandbox Code Playgroud)
这是在 GC 函数中运行的代码,我使用以下代码分别检查了dlkpipelinesv1和piplines中的环境详细信息:
credentials, _ = google.auth.default(
scopes=['https://www.googleapis.com/auth/cloud-platform'])
authed_session = google.auth.transport.requests.AuthorizedSession(
credentials)
# project_id = 'YOUR_PROJECT_ID'
# location = 'us-central1'
# composer_environment = 'YOUR_COMPOSER_ENVIRONMENT_NAME'
environment_url = (
'https://composer.googleapis.com/v1beta1/projects/{}/locations/{}'
'/environments/{}').format(project_id, location, composer_environment)
composer_response = authed_session.request('GET', environment_url)
environment_data = composer_response.json()
Run Code Online (Sandbox Code Playgroud)
并且两者使用相同的服务帐户来运行,即相同的 IAM 角色。尽管我注意到以下不同的细节:
在旧环境中:
"airflowUri": "https://p5<hidden_value>-tp.appspot.com",
"privateEnvironmentConfig": { "privateClusterConfig": {} },
Run Code Online (Sandbox Code Playgroud)
在新环境中:
"airflowUri": "https://da<hidden_value>-tp.appspot.com",
"privateEnvironmentConfig": {
"privateClusterConfig": {},
"webServerIpv4CidrBlock": "<hidden_value>",
"cloudSqlIpv4CidrBlock": "<hidden_value>"
}
Run Code Online (Sandbox Code Playgroud)
我用来发出发布请求的服务帐户具有以下角色:
Cloud Functions Service Agent
Composer Administrator
Composer User
Service Account Token Creator
Service Account User
Run Code Online (Sandbox Code Playgroud)
运行我的 Composer 环境的服务帐户具有以下角色:
BigQuery Admin
Composer Worker
Service Account Token Creator
Storage Object Admin
Run Code Online (Sandbox Code Playgroud)
但当向气流 API 发出请求时,403 - Forbidden我仍然收到。Log Explorerpost
编辑 2020-11-16 :
我已经更新到最新的make_iap_request代码了。我在安全服务中修改了 IAP,但我找不到将接受HTTP: post来自我的云功能的请求的网络服务器...请参见下图,无论如何,我将服务帐户添加到默认和 CRM IAP 资源以防万一,但是我仍然收到此错误:
Exception: Service account does not have permission to access the IAP-protected application.
Run Code Online (Sandbox Code Playgroud)
主要问题是:这里的 IAP 是什么?以及如何将我的服务帐户添加为该 IAP 的用户。
我缺少什么?
有一个配置参数会导致对 API 的所有请求被拒绝...
在文档中,提到我们需要覆盖以下气流配置:
[api]
auth_backend = airflow.api.auth.backend.deny_all
Run Code Online (Sandbox Code Playgroud)
进入
[api]
auth_backend = airflow.api.auth.backend.default
Run Code Online (Sandbox Code Playgroud)
这个细节非常重要,谷歌的文档中没有提到......
有用的链接:
| 归档时间: |
|
| 查看次数: |
5893 次 |
| 最近记录: |