代码拉取完成,页面将自动刷新
package saml
import (
"context"
"fmt"
"net/http"
"strings"
"github.com/crewjam/saml"
"github.com/crewjam/saml/samlsp"
"github.com/mitchellh/mapstructure"
"github.com/pkg/errors"
"github.com/rancher/norman/types"
"github.com/rancher/rancher/pkg/api/store/auth"
"github.com/rancher/rancher/pkg/auth/providers/common"
"github.com/rancher/rancher/pkg/auth/tokens"
corev1 "github.com/rancher/types/apis/core/v1"
"github.com/rancher/types/apis/management.cattle.io/v3"
"github.com/rancher/types/apis/management.cattle.io/v3public"
"github.com/rancher/types/client/management/v3"
publicclient "github.com/rancher/types/client/management/v3public"
"github.com/rancher/types/config"
"github.com/rancher/types/user"
"github.com/sirupsen/logrus"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
)
const (
PingName = "ping"
ADFSName = "adfs"
KeyCloakName = "keycloak"
OKTAName = "okta"
loginAction = "login"
testAndEnableAction = "testAndEnable"
)
type Provider struct {
ctx context.Context
authConfigs v3.AuthConfigInterface
secrets corev1.SecretInterface
userMGR user.Manager
tokenMGR *tokens.Manager
serviceProvider *saml.ServiceProvider
name string
userType string
groupType string
clientState samlsp.ClientState
}
var SamlProviders = make(map[string]*Provider)
func Configure(ctx context.Context, mgmtCtx *config.ScaledContext, userMGR user.Manager, tokenMGR *tokens.Manager, name string) common.AuthProvider {
samlp := &Provider{
ctx: ctx,
authConfigs: mgmtCtx.Management.AuthConfigs(""),
secrets: mgmtCtx.Core.Secrets(""),
userMGR: userMGR,
tokenMGR: tokenMGR,
name: name,
userType: name + "_user",
groupType: name + "_group",
}
SamlProviders[name] = samlp
return samlp
}
func (s *Provider) GetName() string {
return s.name
}
func (s *Provider) CustomizeSchema(schema *types.Schema) {
schema.ActionHandler = s.actionHandler
schema.Formatter = s.formatter
}
func (s *Provider) TransformToAuthProvider(authConfig map[string]interface{}) map[string]interface{} {
p := common.TransformToAuthProvider(authConfig)
switch s.name {
case PingName:
p[publicclient.PingProviderFieldRedirectURL] = formSamlRedirectURLFromMap(authConfig, s.name)
case ADFSName:
p[publicclient.ADFSProviderFieldRedirectURL] = formSamlRedirectURLFromMap(authConfig, s.name)
case KeyCloakName:
p[publicclient.KeyCloakProviderFieldRedirectURL] = formSamlRedirectURLFromMap(authConfig, s.name)
case OKTAName:
p[publicclient.OKTAProviderFieldRedirectURL] = formSamlRedirectURLFromMap(authConfig, s.name)
}
return p
}
func (s *Provider) AuthenticateUser(input interface{}) (v3.Principal, []v3.Principal, string, error) {
return v3.Principal{}, nil, "", fmt.Errorf("SAML providers do not implement Authenticate User API")
}
func PerformSamlLogin(name string, apiContext *types.APIContext, input interface{}) error {
//input will contain the FINAL redirect URL
login, ok := input.(*v3public.SamlLoginInput)
if !ok {
return errors.New("unexpected input type")
}
finalRedirectURL := login.FinalRedirectURL
if provider, ok := SamlProviders[name]; ok {
provider.clientState.SetState(apiContext.Response, apiContext.Request, "Rancher_FinalRedirectURL", finalRedirectURL)
provider.clientState.SetState(apiContext.Response, apiContext.Request, "Rancher_Action", loginAction)
idpRedirectURL, err := provider.HandleSamlLogin(apiContext.Response, apiContext.Request)
if err != nil {
return err
}
data := map[string]interface{}{
"idpRedirectUrl": idpRedirectURL,
"type": "samlLoginOutput",
}
apiContext.WriteResponse(http.StatusOK, data)
return nil
}
return nil
}
func (s *Provider) getSamlConfig() (*v3.SamlConfig, error) {
authConfigObj, err := s.authConfigs.ObjectClient().UnstructuredClient().Get(s.name, metav1.GetOptions{})
if err != nil {
return nil, fmt.Errorf("SAML: failed to retrieve SamlConfig, error: %v", err)
}
u, ok := authConfigObj.(runtime.Unstructured)
if !ok {
return nil, fmt.Errorf("SAML: failed to retrieve SamlConfig, cannot read k8s Unstructured data")
}
storedSamlConfigMap := u.UnstructuredContent()
storedSamlConfig := &v3.SamlConfig{}
mapstructure.Decode(storedSamlConfigMap, storedSamlConfig)
if enabled, ok := storedSamlConfigMap["enabled"].(bool); ok {
storedSamlConfig.Enabled = enabled
}
metadataMap, ok := storedSamlConfigMap["metadata"].(map[string]interface{})
if !ok {
return nil, fmt.Errorf("SAML: failed to retrieve SamlConfig metadata, cannot read k8s Unstructured data")
}
objectMeta := &metav1.ObjectMeta{}
mapstructure.Decode(metadataMap, objectMeta)
storedSamlConfig.ObjectMeta = *objectMeta
if storedSamlConfig.SpKey != "" {
value, err := common.ReadFromSecret(s.secrets, storedSamlConfig.SpKey,
strings.ToLower(auth.TypeToField[client.PingConfigType]))
if err != nil {
return nil, err
}
storedSamlConfig.SpKey = value
}
return storedSamlConfig, nil
}
func (s *Provider) saveSamlConfig(config *v3.SamlConfig) error {
var configType string
storedSamlConfig, err := s.getSamlConfig()
if err != nil {
return err
}
switch s.name {
case PingName:
configType = client.PingConfigType
case ADFSName:
configType = client.ADFSConfigType
case KeyCloakName:
configType = client.KeyCloakConfigType
case OKTAName:
configType = client.OKTAConfigType
}
config.APIVersion = "management.cattle.io/v3"
config.Kind = v3.AuthConfigGroupVersionKind.Kind
config.Type = configType
storedSamlConfig.Annotations = config.Annotations
config.ObjectMeta = storedSamlConfig.ObjectMeta
field := strings.ToLower(auth.TypeToField[configType])
if err := common.CreateOrUpdateSecrets(s.secrets, config.SpKey,
field, strings.ToLower(config.Type)); err != nil {
return err
}
config.SpKey = common.GetName(config.Type, field)
logrus.Debugf("updating samlConfig %s", s.name)
_, err = s.authConfigs.ObjectClient().Update(config.ObjectMeta.Name, config)
if err != nil {
return err
}
return nil
}
func (s *Provider) toPrincipal(principalType string, princ v3.Principal, token *v3.Token) v3.Principal {
if principalType == s.userType {
princ.PrincipalType = "user"
if token != nil {
princ.Me = s.isThisUserMe(token.UserPrincipal, princ)
if princ.Me {
princ.LoginName = token.UserPrincipal.LoginName
princ.DisplayName = token.UserPrincipal.DisplayName
}
}
} else {
princ.PrincipalType = "group"
if token != nil {
princ.MemberOf = s.tokenMGR.IsMemberOf(*token, princ)
}
}
return princ
}
func (s *Provider) RefetchGroupPrincipals(principalID string, secret string) ([]v3.Principal, error) {
// This should never be called
return nil, errors.New("Not implemented")
}
func (s *Provider) SearchPrincipals(searchKey, principalType string, token v3.Token) ([]v3.Principal, error) {
var principals []v3.Principal
if principalType == "" {
principalType = "user"
}
p := v3.Principal{
ObjectMeta: metav1.ObjectMeta{Name: s.userType + "://" + searchKey},
DisplayName: searchKey,
LoginName: searchKey,
PrincipalType: principalType,
Provider: s.name,
}
principals = append(principals, p)
return principals, nil
}
func (s *Provider) GetPrincipal(principalID string, token v3.Token) (v3.Principal, error) {
parts := strings.SplitN(principalID, ":", 2)
if len(parts) != 2 {
return v3.Principal{}, fmt.Errorf("SAML: invalid id %v", principalID)
}
principalType := parts[0]
externalID := strings.TrimPrefix(parts[1], "//")
if principalType != s.userType && principalType != s.groupType {
return v3.Principal{}, fmt.Errorf("SAML: Invalid principal type")
}
p := v3.Principal{
ObjectMeta: metav1.ObjectMeta{Name: principalType + "://" + externalID},
DisplayName: externalID,
LoginName: externalID,
Provider: s.name,
}
p = s.toPrincipal(principalType, p, &token)
return p, nil
}
func (s *Provider) isThisUserMe(me v3.Principal, other v3.Principal) bool {
if me.ObjectMeta.Name == other.ObjectMeta.Name && me.PrincipalType == other.PrincipalType {
return true
}
return false
}
func formSamlRedirectURLFromMap(config map[string]interface{}, name string) string {
var hostname string
switch name {
case PingName:
hostname, _ = config[client.PingConfigFieldRancherAPIHost].(string)
case ADFSName:
hostname, _ = config[client.ADFSConfigFieldRancherAPIHost].(string)
case KeyCloakName:
hostname, _ = config[client.KeyCloakConfigFieldRancherAPIHost].(string)
case OKTAName:
hostname, _ = config[client.OKTAConfigFieldRancherAPIHost].(string)
}
path := hostname + "/v1-saml/" + name + "/login"
return path
}
func (s *Provider) CanAccessWithGroupProviders(userPrincipalID string, groupPrincipals []v3.Principal) (bool, error) {
config, err := s.getSamlConfig()
if err != nil {
logrus.Errorf("Error fetching saml config: %v", err)
return false, err
}
allowed, err := s.userMGR.CheckAccess(config.AccessMode, config.AllowedPrincipalIDs, userPrincipalID, groupPrincipals)
if err != nil {
return false, err
}
return allowed, nil
}
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。