Files
kubevela/pkg/apiserver/rest/usecase/authentication.go
Tianxin Dong 3ea2ac6d0f Feat: add user management apis (#3458)
* Feat: add user management apis

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* Feat: add e2e test and some nit fix

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* Feat: add password validate

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* Feat: add email modification in update user

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* Fix: fix user detail to user base

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* Fix: fix ut

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* Fix: fix test

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* Fix: fix rebase

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* Fix: add password check in create user

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>

* Fix: fix bcode confilt

Signed-off-by: FogDong <dongtianxin.tx@alibaba-inc.com>
2022-03-19 15:51:32 +08:00

207 lines
5.7 KiB
Go

/*
Copyright 2022 The KubeVela Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package usecase
import (
"context"
"encoding/json"
"fmt"
"net/http"
"github.com/coreos/go-oidc"
"github.com/emicklei/go-restful/v3"
"golang.org/x/oauth2"
v1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/types"
"sigs.k8s.io/controller-runtime/pkg/client"
velatypes "github.com/oam-dev/kubevela/apis/types"
"github.com/oam-dev/kubevela/pkg/apiserver/clients"
"github.com/oam-dev/kubevela/pkg/apiserver/datastore"
"github.com/oam-dev/kubevela/pkg/apiserver/log"
"github.com/oam-dev/kubevela/pkg/apiserver/model"
apisv1 "github.com/oam-dev/kubevela/pkg/apiserver/rest/apis/v1"
"github.com/oam-dev/kubevela/pkg/apiserver/rest/utils/bcode"
)
const (
secretDexConfig = "dex-config"
)
// AuthenticationUsecase is the usecase of authentication
type AuthenticationUsecase interface {
Login(ctx context.Context, req *restful.Request) (*apisv1.LoginResponse, error)
GetDexConfig(ctx context.Context) (*apisv1.DexConfigResponse, error)
}
type authenticationUsecaseImpl struct {
sysUsecase SystemInfoUsecase
ds datastore.DataStore
kubeClient client.Client
}
// NewAuthenticationUsecase new authentication usecase
func NewAuthenticationUsecase(ds datastore.DataStore, sysUsecase SystemInfoUsecase) AuthenticationUsecase {
kubecli, err := clients.GetKubeClient()
if err != nil {
log.Logger.Fatalf("failed to get kube client: %s", err.Error())
}
return &authenticationUsecaseImpl{
sysUsecase: sysUsecase,
ds: ds,
kubeClient: kubecli,
}
}
type authHandler interface {
login(ctx context.Context) (*apisv1.LoginResponse, error)
}
type dexHandlerImpl struct {
token *oauth2.Token
idToken *oidc.IDToken
ds datastore.DataStore
}
func (a *authenticationUsecaseImpl) newDexHandler(ctx context.Context, req *restful.Request) (*dexHandlerImpl, error) {
dexConfig, err := a.GetDexConfig(ctx)
if err != nil {
return nil, err
}
provider, err := oidc.NewProvider(ctx, dexConfig.Issuer)
if err != nil {
return nil, err
}
idTokenVerifier := provider.Verifier(&oidc.Config{ClientID: dexConfig.ClientID})
code := req.HeaderParameter("code")
oauth2Config := &oauth2.Config{
ClientID: dexConfig.ClientID,
ClientSecret: dexConfig.ClientSecret,
Endpoint: provider.Endpoint(),
RedirectURL: dexConfig.RedirectURL,
}
oidcCtx := oidc.ClientContext(ctx, http.DefaultClient)
token, err := oauth2Config.Exchange(oidcCtx, code)
if err != nil {
return nil, err
}
idToken, err := idTokenVerifier.Verify(ctx, token.Extra("id_token").(string))
if err != nil {
return nil, err
}
return &dexHandlerImpl{
token: token,
idToken: idToken,
ds: a.ds,
}, nil
}
func (a *authenticationUsecaseImpl) Login(ctx context.Context, req *restful.Request) (*apisv1.LoginResponse, error) {
var handler authHandler
var err error
sysInfo, err := a.sysUsecase.GetSystemInfo(ctx)
if err != nil {
return nil, err
}
loginType := sysInfo.LoginType
switch loginType {
case model.LoginTypeDex:
handler, err = a.newDexHandler(ctx, req)
if err != nil {
return nil, err
}
case model.LoginTypeLocal:
default:
return nil, bcode.ErrUnsupportedLoginType
}
return handler.login(ctx)
}
func (a *authenticationUsecaseImpl) GetDexConfig(ctx context.Context) (*apisv1.DexConfigResponse, error) {
secret := &v1.Secret{}
if err := a.kubeClient.Get(ctx, types.NamespacedName{
Name: secretDexConfig,
Namespace: velatypes.DefaultKubeVelaNS,
}, secret); err != nil {
log.Logger.Errorf("failed to get dex config: %s", err.Error())
return nil, err
}
var config struct {
Issuer string `json:"issuer"`
StaticClients []struct {
ID string `json:"id"`
Secret string `json:"secret"`
RedirectURIs []string `json:"redirectURIs"`
} `json:"staticClients"`
}
if err := json.Unmarshal(secret.Data[secretDexConfig], &config); err != nil {
log.Logger.Errorf("failed to unmarshal dex config: %s", err.Error())
return nil, err
}
if len(config.StaticClients) < 1 || len(config.StaticClients[0].RedirectURIs) < 1 {
return nil, fmt.Errorf("invalid dex config")
}
return &apisv1.DexConfigResponse{
Issuer: config.Issuer,
ClientID: config.StaticClients[0].ID,
ClientSecret: config.StaticClients[0].Secret,
RedirectURL: config.StaticClients[0].RedirectURIs[0],
}, nil
}
func (d *dexHandlerImpl) login(ctx context.Context) (*apisv1.LoginResponse, error) {
var claims struct {
Email string `json:"email"`
Name string `json:"name"`
}
if err := d.idToken.Claims(&claims); err != nil {
return nil, err
}
user := &model.User{Email: claims.Email}
users, err := d.ds.List(ctx, user, &datastore.ListOptions{})
if err != nil {
return nil, err
}
if len(users) > 0 {
u := users[0].(*model.User)
if u.Name != claims.Name {
u.Name = claims.Name
if err := d.ds.Put(ctx, u); err != nil {
return nil, err
}
}
} else if err := d.ds.Add(ctx, &model.User{
Email: claims.Email,
Name: claims.Name,
}); err != nil {
return nil, err
}
return &apisv1.LoginResponse{
UserInfo: apisv1.DetailUserResponse{
UserBase: apisv1.UserBase{
Name: claims.Name,
Email: claims.Email,
},
},
AccessToken: d.token.AccessToken,
RefreshToken: d.token.RefreshToken,
}, nil
}