Files
kubevela/pkg/apiserver/rest/usecase/authentication.go
Tianxin Dong 6c5a40d768 Feat: add dex login in apiserver (#3417)
* Feat: add dex login in apiserver

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* resolve comments

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* Fix: get dex config from secret

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* Fix: delete cache for dex config

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* fix ci

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>
2022-03-16 14:37:41 +08:00

205 lines
5.6 KiB
Go

/*
Copyright 2022 The KubeVela Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package usecase
import (
"context"
"encoding/json"
"fmt"
"net/http"
"github.com/coreos/go-oidc"
"github.com/emicklei/go-restful/v3"
"golang.org/x/oauth2"
v1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/types"
"sigs.k8s.io/controller-runtime/pkg/client"
velatypes "github.com/oam-dev/kubevela/apis/types"
"github.com/oam-dev/kubevela/pkg/apiserver/clients"
"github.com/oam-dev/kubevela/pkg/apiserver/datastore"
"github.com/oam-dev/kubevela/pkg/apiserver/log"
"github.com/oam-dev/kubevela/pkg/apiserver/model"
apisv1 "github.com/oam-dev/kubevela/pkg/apiserver/rest/apis/v1"
"github.com/oam-dev/kubevela/pkg/apiserver/rest/utils/bcode"
)
const (
secretDexConfig = "dex-config"
)
// AuthenticationUsecase is the usecase of authentication
type AuthenticationUsecase interface {
Login(ctx context.Context, req *restful.Request) (*apisv1.LoginResponse, error)
GetDexConfig(ctx context.Context) (*apisv1.DexConfigResponse, error)
}
type authenticationUsecaseImpl struct {
sysUsecase SystemInfoUsecase
ds datastore.DataStore
kubeClient client.Client
}
// NewAuthenticationUsecase new authentication usecase
func NewAuthenticationUsecase(ds datastore.DataStore, sysUsecase SystemInfoUsecase) AuthenticationUsecase {
kubecli, err := clients.GetKubeClient()
if err != nil {
log.Logger.Fatalf("failed to get kube client: %s", err.Error())
}
return &authenticationUsecaseImpl{
sysUsecase: sysUsecase,
ds: ds,
kubeClient: kubecli,
}
}
type authHandler interface {
login(ctx context.Context) (*apisv1.LoginResponse, error)
}
type dexHandlerImpl struct {
token *oauth2.Token
idToken *oidc.IDToken
ds datastore.DataStore
}
func (a *authenticationUsecaseImpl) newDexHandler(ctx context.Context, req *restful.Request) (*dexHandlerImpl, error) {
dexConfig, err := a.GetDexConfig(ctx)
if err != nil {
return nil, err
}
provider, err := oidc.NewProvider(ctx, dexConfig.Issuer)
if err != nil {
return nil, err
}
idTokenVerifier := provider.Verifier(&oidc.Config{ClientID: dexConfig.ClientID})
code := req.HeaderParameter("code")
oauth2Config := &oauth2.Config{
ClientID: dexConfig.ClientID,
ClientSecret: dexConfig.ClientSecret,
Endpoint: provider.Endpoint(),
RedirectURL: dexConfig.RedirectURL,
}
oidcCtx := oidc.ClientContext(ctx, http.DefaultClient)
token, err := oauth2Config.Exchange(oidcCtx, code)
if err != nil {
return nil, err
}
idToken, err := idTokenVerifier.Verify(ctx, token.Extra("id_token").(string))
if err != nil {
return nil, err
}
return &dexHandlerImpl{
token: token,
idToken: idToken,
ds: a.ds,
}, nil
}
func (a *authenticationUsecaseImpl) Login(ctx context.Context, req *restful.Request) (*apisv1.LoginResponse, error) {
var handler authHandler
var err error
sysInfo, err := a.sysUsecase.GetSystemInfo(ctx)
if err != nil {
return nil, err
}
loginType := sysInfo.LoginType
switch loginType {
case model.LoginTypeDex:
handler, err = a.newDexHandler(ctx, req)
if err != nil {
return nil, err
}
case model.LoginTypeLocal:
default:
return nil, bcode.ErrUnsupportedLoginType
}
return handler.login(ctx)
}
func (a *authenticationUsecaseImpl) GetDexConfig(ctx context.Context) (*apisv1.DexConfigResponse, error) {
secret := &v1.Secret{}
if err := a.kubeClient.Get(ctx, types.NamespacedName{
Name: secretDexConfig,
Namespace: velatypes.DefaultKubeVelaNS,
}, secret); err != nil {
log.Logger.Errorf("failed to get dex config: %s", err.Error())
return nil, err
}
var config struct {
Issuer string `json:"issuer"`
StaticClients []struct {
ID string `json:"id"`
Secret string `json:"secret"`
RedirectURIs []string `json:"redirectURIs"`
} `json:"staticClients"`
}
if err := json.Unmarshal(secret.Data[secretDexConfig], &config); err != nil {
log.Logger.Errorf("failed to unmarshal dex config: %s", err.Error())
return nil, err
}
if len(config.StaticClients) < 1 || len(config.StaticClients[0].RedirectURIs) < 1 {
return nil, fmt.Errorf("invalid dex config")
}
return &apisv1.DexConfigResponse{
Issuer: config.Issuer,
ClientID: config.StaticClients[0].ID,
ClientSecret: config.StaticClients[0].Secret,
RedirectURL: config.StaticClients[0].RedirectURIs[0],
}, nil
}
func (d *dexHandlerImpl) login(ctx context.Context) (*apisv1.LoginResponse, error) {
var claims struct {
Email string `json:"email"`
Name string `json:"name"`
}
if err := d.idToken.Claims(&claims); err != nil {
return nil, err
}
user := &model.User{Email: claims.Email}
users, err := d.ds.List(ctx, user, &datastore.ListOptions{})
if err != nil {
return nil, err
}
if len(users) > 0 {
u := users[0].(*model.User)
if u.Name != claims.Name {
u.Name = claims.Name
if err := d.ds.Put(ctx, u); err != nil {
return nil, err
}
}
} else if err := d.ds.Add(ctx, &model.User{
Email: claims.Email,
Name: claims.Name,
}); err != nil {
return nil, err
}
return &apisv1.LoginResponse{
UserInfo: apisv1.DetailUserResponse{
Name: claims.Name,
Email: claims.Email,
},
AccessToken: d.token.AccessToken,
RefreshToken: d.token.RefreshToken,
}, nil
}